Please donate here to support this vital work.
Revealing News For a Better World

Privacy Media Articles
Excerpts of Key Privacy Media Articles in Major Media


Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.


Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


Undercover cops break Facebook rules to track protesters, ensnare criminals
2018-10-05, NBC News
https://www.nbcnews.com/news/us-news/undercover-cops-break-facebook-rules-tra...

In the summer of 2015, as Memphis exploded with protests over the police killing of a 19-year-old man, activists began hearing on Facebook from someone called Bob Smith. His profile picture [was] a Guy Fawkes mask, the symbol of anti-government dissent. Smith acted as if he supported the protesters. Over the next three years, dozens of them accepted his friend requests, allowing him to observe private discussions. He described himself as a far-left Democrat, a “fellow protester” and a “man of color.” But Smith was not real. He was the creation of a white detective in the Memphis Police Department’s Office of Homeland Security whose job was to keep tabs on local activists. The detective, Tim Reynolds, outed himself in August under questioning by the American Civil Liberties Union of Tennessee, which sued the police department for allegedly violating a 1978 agreement that prohibited police from conducting surveillance of lawful protests. The revelation validated many activists’ distrust of local authorities. It also provided a rare look into the ways American law enforcement operates online. Social media monitoring - including the use of software to crunch data about people’s online activity - illustrates a policing “revolution” that has allowed authorities to not only track people but also map out their networks, said Rachel Levinson-Waldman, senior counsel at [the] Brennan Center for Justice. But there are few laws governing this kind of monitoring.

Note: Memphis police were recently reported to have systematically spied on community activists. For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the erosion of civil liberties.


'Treating protest as terrorism': US plans crackdown on Keystone XL activists
2018-09-20, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/environment/2018/sep/20/keystone-pipeline-protest...

Angeline Cheek is preparing for disaster. The indigenous organizer from the Fort Peck reservation in Montana fears that the proposed Keystone XL pipeline could break and spill. But environmental catastrophe is not the most immediate threat. The government has characterized pipeline opponents like her as “extremists” and violent criminals and warned of potential “terrorism”. Recently released records [suggest] that police were organizing to launch an aggressive response to possible Keystone protests, echoing the actions against the Standing Rock movement in North Dakota. There, officers engaged in intense surveillance and faced widespread accusations of excessive force. Documents obtained by the ACLU ... have renewed concerns from civil rights advocates about the government’s treatment of indigenous activists known as water protectors. Notably, one record revealed that authorities hosted a recent “anti-terrorism” training session in Montana. The Department of Homeland Security (DHS) and the Federal Emergency Management Agency also organized a “field force operations” training to teach “mass-arrest procedures”, “riot-control formations” and other “crowd-control methods”.

Note: For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.


Governments Can Spy on Journalists in the U.S. Using Invasive Foreign Intelligence Process
2018-09-17, The Intercept
https://theintercept.com/2018/09/17/journalists-fisa-court-spying/

The U.S. government can monitor journalists under a foreign intelligence law that allows invasive spying and operates outside the traditional court system, according to newly released documents. Targeting members of the press under the law, known as the Foreign Intelligence Surveillance Act, requires approval from the Justice Department’s highest-ranking officials. Prior to the release of these documents, little was known about the use of FISA court orders against journalists. Previous attention had been focused on the use of National Security Letters against members of the press; the letters are administrative orders with which the FBI can obtain certain ... records without a judge’s oversight. FISA court orders can authorize much more invasive searches and collection, including the content of communications, and do so through hearings conducted in secret and outside the sort of ... judicial process that allows journalists and other targets of regular criminal warrants to eventually challenge their validity. The rules apply to media entities or journalists who are thought to be agents of a foreign government, or ... possess foreign intelligence information. “There’s a lack of clarity on the circumstances when the government might consider a journalist an agent of a foreign power,” said [Knight Institute staff attorney Ramya] Krishnan. “Think about WikiLeaks; the government has said they are an intelligence operation.”

Note: In its latest instruction manual for federal prosecutors, the US Justice Department removed a subsection titled “Need for Free Press and Public Trial”. For more along these lines, see concise summaries of deeply revealing news articles on judicial system corruption and the erosion of civil liberties.


Smart Dust Is Coming. Are You Ready?
2018-09-16, Forbes
https://www.forbes.com/sites/bernardmarr/2018/09/16/smart-dust-is-coming-are-...

Imagine a world where wireless devices are as small as a grain of salt. These miniaturized devices have sensors, cameras and communication mechanisms to transmit the data they collect back to a base in order to process. Today, you no longer have to imagine it: microelectromechanical systems (MEMS), often called motes, are real and they very well could be coming to a neighborhood near you. With such a small size, these devices can stay suspended in an environment just like a particle of dust. They can: Collect data including acceleration, stress, pressure, humidity, sound and more from sensors; Process the data with what amounts to an onboard computer system; Store the data in memory; Wirelessly communicate the data to the cloud, a base or other MEMs. Since smart dust devices are miniature sensors they can record anything that they are programmed to record. Since they are so small, they are difficult to detect. Your imagination can run wild regarding the negative privacy implications when smart dust falls into the wrong hands. Once billions of smart dust devices are deployed over an area it would be difficult to retrieve or capture them if necessary. The volume of smart dust that could be engaged by a rogue individual, company or government to do harm would make it challenging for the authorities to control. Many of the applications for smart dust are still in the concept stage. We might not know when it will progress to the point of wide-scale adoption, but ... its a question of when rather than if.

Note: This takes privacy issues to an entirely new level. This AP article states the supermicro chips are "just 0.002 inches by 0.002 inches and look like bits of powder. They're thin enough to be embedded in a piece of paper." They are also small enough to slip into a vaccine unnoticed. And check out another Forbes article titled "Stratospheric Balloons Will Rain Tiny Electronic Spies From The Sky." For more along these lines, see concise summaries of deeply revealing news articles on the disappearance of privacy from reliable major media sources.


Google found to track the location of users who have opted out
2018-08-13, NBC/AP
https://www.nbcnews.com/tech/tech-news/google-tracks-your-movements-it-or-not...

Google wants to know where you go so badly that it records your movements even when you explicitly tell it not to. An Associated Press investigation found that many Google services on Android devices and iPhones store your location data even if you've used privacy settings that say they will prevent it from doing so. Computer-science researchers at Princeton confirmed these findings at the AP's request. Storing your minute-by-minute travels carries privacy risks. So the company will let you "pause" a setting called Location History. Google's support page on the subject states: "You can turn off Location History at any time. With Location History off, the places you go are no longer stored." That isn't true. Even with Location History paused, some Google apps automatically store time-stamped location data without asking. For example, Google stores a snapshot of where you are when you merely open its Maps app. And some searches that have nothing to do with location, like "chocolate chip cookies," or "kids science kits," pinpoint your precise latitude and longitude - accurate to the square foot - and save it to your Google account. Since 2014, Google has let advertisers track the effectiveness of online ads at driving foot traffic, a feature that Google has said relies on user location histories. The company is pushing further into such location-aware tracking to drive ad revenue, which rose 20 percent last year to $95.4 billion.

Note: This article instructs you how to effectively delete Google's tracking of your movements. For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy.


‘Supervillain-Level’ Cyberattack Test on Cities Uncovers Shocking Flaws
2018-08-09, Newsweek
https://www.newsweek.com/supervillain-level-cyberattacks-cities-test-uncovers...

Research unveiled today shows how vulnerabilities in “smart city” technology could be compromised by hackers. Bugs were found in major cities in the U.S. and Europe, with teams from IBM and Threatcare disclosing a series of “disturbing” scenarios that could soon play out for real. These included the abuse of flood warnings, radiation alarms and, yes, traffic networks. “If someone ... were to abuse vulnerabilities like the ones we documented in smart city systems, the effects could range from inconvenient to catastrophic,” a report said. The experts were inspired by the recent incident in Hawaii in which an alert warned citizens that a ballistic missile was inbound. The blaring island alarms, made in error, caused mass panic. Research found 17 major flaws in four smart city systems, eight of which were labeled “critical.” They spotted basic errors, including weak passwords and basic authentication flaws. “Security around these sensors and controls must be a lot more stringent,” wrote IBM’s Daniel Crowley. “Attackers could manipulate water level sensor responses to report flooding in an area where there is none - creating panic, evacuations and destabilization,” Crowley wrote. In another example, he said: “Controlling additional systems could enable an attacker to set off a string of building alarms or trigger gunshot sounds on audio sensors across town, further fueling panic.”

Note: This 2015 New York Times article calls 'smart' devices, "a train wreck in privacy and security." Watch an excellent documentary uncovering the serious dangers of smart meters. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and the disappearance of privacy.


Memphis police accused of using fake accounts to surveil black activists
2018-08-01, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/us-news/2018/aug/01/memphis-police-black-lives-ma...

A trove of documents released by the city of Memphis late last week appear to show that its police department has been systematically using fake social media profiles to surveil local Black Lives Matter activists, and that it kept dossiers and detailed power point presentations on dozens of Memphis-area activists. The surveillance project was operated through the Memphis police department’s office of homeland security. In a deposition for a lawsuit filed by the American Civil Liberties Union over the information gathering, officials said it ... began to focus on “local individuals or groups that were staging protests” [around 2016]. This included the publication of daily joint information briefings on potential protests and known protesters. The briefings regularly included information about meetings on private property, panel discussions, town halls, and even innocuous events like “Black Owned Food Truck Sunday”. A good deal of that information appears to have been obtained by a fake MPD Facebook profile for a “Bob Smith”, which the ACLU said was used “to view private posts, join private groups, and otherwise pose as a member of the activist community”. The briefings, which contained ... photographs, dates of birth, addresses, and mental health histories were distributed beyond the department according to the ACLU lawsuit, to a number of local businesses including the region’s largest employer FedEx and the county school district.

Note: For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the erosion of civil liberties.


The cashless society is a con – and big finance is behind it
2018-07-19, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/commentisfree/2018/jul/19/cashless-society-con-bi...

All over the western world banks are shutting down cash machines and branches. They are trying to push you into using their digital payments and digital banking infrastructure. Financial institutions ... are trying to nudge us towards a cashless society and digital banking. The true motive is corporate profit. Payments companies such as Visa and Mastercard want to increase the volume of digital payments services they sell, while banks want to cut costs. The nudge requires two parts. First, they must increase the inconvenience of cash. Second, they must vigorously promote the alternative. But a cashless society is not in your interest. It is in the interest of banks and payments companies. Their job is to make you believe that it is in your interest too, and they are succeeding in doing that. The recent Visa chaos, during which millions of people who have become dependent on digital payment suddenly found themselves stranded when the monopolistic payment network crashed, was a temporary setback. Digital systems may be “convenient”, but they often come with central points of failure. Cash, on the other hand, does not crash. It does not rely on external data centres, and is not subject to remote control or remote monitoring. The cash system allows for an unmonitored “off the grid” space. This is also the reason why financial institutions and financial technology companies want to get rid of it. Cash transactions are outside the net that such institutions cast to harvest fees and data.

Note: For more on this questionable trend, see this article and this one in the UK's Guardian. For more along these lines, see concise summaries of deeply revealing news articles on financial industry corruption and the disappearance of privacy.


Inside China’s Dystopian Dreams: A.I., Shame and Lots of Cameras
2018-07-08, New York Times
https://www.nytimes.com/2018/07/08/business/china-surveillance-technology.html

China is reversing the commonly held vision of technology as a great democratizer, bringing people more freedom and connecting them to the world. In China, it has brought control. Cameras scan train stations for China’s most wanted. Billboard-size displays ... list the names of people who don’t pay their debts. Facial recognition scanners guard the entrances to housing complexes. Already, China has an estimated 200 million surveillance cameras. Such efforts supplement other systems that track internet use and communications, hotel stays, train and plane trips and even car travel. Invasive mass-surveillance software has been set up in the west to track members of the Uighur Muslim minority and map their relations with friends and family. [At] the intersection south of Changhong Bridge in the city of Xiangyang ... police put up cameras linked to facial recognition technology and a big, outdoor screen. Photos of lawbreakers were displayed alongside their names and government I.D. numbers. China’s surveillance companies are also looking to test the appetite for high-tech surveillance abroad. At home, China is preparing its people for next-level surveillance technology. A recent state-media propaganda film called “Amazing China” showed off a ... virtual map that provided police with records of utility use. “If there are anomalies, the system sends an alert,” a narrator says, as Chinese police officers pay a visit to an apartment with a record of erratic utility use.

Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy.


The NSA’s Hidden Spy Hubs in Eight U.S. Cities
2018-06-25, The Intercept
https://theintercept.com/2018/06/25/att-internet-nsa-spy-hubs/

Thousands of people pass by the buildings each day and rarely give them a second glance, because their function is not publicly known. They are an integral part of one of the world’s largest telecommunications networks – and they are also linked to a controversial National Security Agency surveillance program. Atlanta, Chicago, Dallas, Los Angeles, New York City, San Francisco, Seattle, and Washington, D.C.. In each of these cities, The Intercept has identified an AT&T facility containing networking equipment that transports large quantities of internet traffic across the United States and the world. A body of evidence – including classified NSA documents, public records, and interviews with several former AT&T employees – indicates that the buildings are central to an NSA spying initiative that has for years monitored billions of emails, phone calls, and online chats passing across U.S. territory. The NSA considers AT&T to be one of its most trusted partners and has lauded the company’s “extreme willingness to help.” Little known, however, is that its scope is not restricted to AT&T’s customers. According to the NSA’s documents, it values AT&T not only because it “has access to information that transits the nation,” but also because it maintains unique relationships with other phone and internet providers. The NSA exploits these relationships for surveillance purposes, commandeering AT&T’s massive infrastructure and using it as a platform to covertly tap into communications processed by other companies.

Note: The NSA was authorized in 2016 to share communications data it collected without warrants on Americans with 16 intelligence and law enforcement agencies. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


Supreme Court rules that police generally need a warrant to access cell phone data
2018-06-22, ABC News
https://abcnews.go.com/Politics/supreme-court-rules-police-warrant-access-cel...

The Supreme Court ruled that police generally need a search warrant to review cell phone records that include data like a user's location, which will impose a higher bar for law enforcement to access data collected on the millions of people who use smartphones on a daily basis. The plaintiff in the case, Timothy Carpenter, was convicted of multiple robbery and gun offenses in 2010 but challenged the conviction saying that officers investigating the case didn't get a warrant for his cell phone records. The government argued that law enforcement doesn't need a warrant to get cell phone records from the service provider since it's a third party. The Court ruled that the government's search, in this case, did not meet the bar for probable cause for a warrant. Chief Justice John Roberts wrote in the majority decision that the government is obligated to get a warrant before compelling a wireless provider to provide cell phone records in an investigation. "We decline to grant the state unrestricted access to a wireless carrier's database of physical location information," Roberts said.

Note: While this ruling limits police powers, the NSA was authorized in 2016 to freely share communications data it collected without warrants on Americans with 16 intelligence and law enforcement agencies. For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the disappearance of privacy.


What 7 Creepy Patents Reveal About Facebook
2018-06-21, New York Times
https://www.nytimes.com/interactive/2018/06/21/opinion/sunday/facebook-patent...

A review of hundreds of Facebook’s patent applications reveals that the company has considered tracking almost every aspect of its users’ lives: where you are, who you spend time with, whether you’re in a romantic relationship, which brands and politicians you’re talking about. The company has even attempted to patent a method for predicting when your friends will die. Taken together, Facebook’s patents show a commitment to collecting personal information, despite widespread public criticism of the company’s privacy policies and a promise from its chief executive to “do better.” “A patent portfolio is a map of how a company thinks about where its technology is going,” said Jason M. Schultz, a law professor at New York University. One patent application discusses predicting whether you’re in a romantic relationship using information such as how many times you visit another user’s page [and] the number of people in your profile picture. Another proposes using your posts and messages to infer personality traits ... then using those characteristics to select which news stories or ads to display. Another patent application discusses tracking your weekly routine and sending notifications to other users of deviations from the routine. In addition, it describes using your phone’s location in the middle of the night to establish where you live. As long as Facebook keeps collecting personal information, we should be wary.

Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy.


Edward Snowden: 'The people are still powerless, but now they're aware'
2018-06-04, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/us-news/2018/jun/04/edward-snowden-people-still-p...

Edward Snowden has no regrets five years on from leaking the biggest cache of top-secret documents in history. He is wanted by the US. He is in exile in Russia. But he is satisfied with the way his revelations of mass surveillance have rocked governments, intelligence agencies and major internet companies. What has happened in the five years since? The most important change, he said, was public awareness. “The government and corporate sector preyed on our ignorance. But now we know. People are aware now. People are still powerless to stop it but we are trying. The revelations made the fight more even.” He said he had no regrets. His own life is uncertain, perhaps now more than ever, he said. His sanctuary in Russia depends on the whims of the Putin government, and the US and UK intelligence agencies have not forgiven him. For them, the issue is as raw as ever. One of the disclosures to have most impact was around the extent of collaboration between the intelligence agencies and internet companies. In 2013, the US companies were outsmarting the EU in negotiations over data protection. Snowden landed like a bomb in the middle of the negotiations and the data protection law that took effect last month is a consequence. But he will not be marking the anniversary with a “victory lap”. There is still much to be done. “The fightback is just beginning,” said Snowden. “The governments and the corporates have been in this game a long time and we are just getting started.”

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


Facebook Gave Device Makers Deep Access to Data on Users and Friends
2018-06-03, New York Times
https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-par...

As Facebook sought to become the world’s dominant social media service, it struck agreements allowing phone and other device makers access to vast amounts of its users’ personal information. Facebook has reached data-sharing partnerships with at least 60 device makers - including Apple, Amazon, BlackBerry, Microsoft and Samsung. The partnerships ... raise concerns about the company’s privacy protections and compliance with a 2011 consent decree with the Federal Trade Commission. Facebook allowed the device companies access to the data of users’ friends without their explicit consent, even after declaring that it would no longer share such information with outsiders. Some device makers could retrieve personal information even from users’ friends who believed they had barred any sharing. In interviews, several former Facebook software engineers and security experts said they were surprised at the ability to override sharing restrictions. “It’s like having door locks installed, only to find out that the locksmith also gave keys to all of his friends so they can come in and rifle through your stuff without having to ask you for permission,” said Ashkan Soltani, a research and privacy consultant who formerly served as the F.T.C.’s chief technologist.

Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy.


Employers are monitoring computers, toilet breaks – even emotions. Is your boss watching you?
2018-05-14, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/world/2018/may/14/is-your-boss-secretly-or-not-so...

Last year an American company microchipped dozens of its workers. Of the 90 people who work at [Three Square Market] headquarters, 72 are now chipped. Two months ago, the company ... started chipping people with dementia. If someone wanders off and gets lost, police can scan the chip “and they will know all their medical information, what drugs they can and can’t have, they’ll know their identity.” So far, Three Square Market has chipped 100 people, but plans to do 10,000. The company has just launched a mobile phone app that pairs the chip with the phone’s GPS, enabling the implantee’s location to be tracked. Last week, it started using it with people released from prison on probation. Some Chinese companies are using sensors in helmets and hats to scan workers’ brainwaves. There are tech companies selling products that can ... monitor keystrokes and web usage, and even photograph [employees] using their computers’ webcams. All this can be done remotely. Monitoring is built into many of the jobs that form the so-called “gig economy”. It’s not easy to object to the constant surveillance when you’re desperate for work. What has surprised [Cass Business School professor André Spicer] is how willingly people in better-paid jobs have taken to it. Spicer has watched the shift away from “monitoring something like emails to monitoring people’s bodies – the rise of bio-tracking basically. The monitoring of your vital signs, emotions, moods.”

Note: Author James Bloodworth describes the high tech monitoring of workers at Amazon warehouses in his new book, "Hired: Six Months Undercover in Low-Wage Britain". For more along these lines, see concise summaries of deeply revealing news articles on microchip implants and the disappearance of privacy.


DNA of every baby born in California is stored. Who has access to it?
2018-05-12, CBS News
https://www.cbsnews.com/news/california-biobank-dna-babies-who-has-access/

The Newborn Genetic Screening test is required in all 50 states. Nearly every baby born in the United States gets a heel prick shortly after birth. Their newborn blood fills six spots on a special filter paper card. It is used to test baby for dozens of congenital disorders. Some states destroy the blood spots after a year, 12 states store them for at least 21 years. California, however, is one of a handful of states that stores the remaining blood spots for research indefinitely in a state-run biobank. The child's leftover blood spots become property of the state and may be sold to outside researchers without the parent's knowledge or consent. "I just didn't realize there was a repository of every baby born in the state. It's like fingerprints," new mom Soniya Sapre responded. In California ... you do have the right to ask the biobank to destroy the leftovers after the fact, though the agency's website states it "may not be able to comply with your request." You also have the right to find out if your child's blood spots have been used for research, but you would have to know they were being used in the first place and we've discovered that most parents don't. But researchers with the California Genetic Disease Screening Program aren't the only ones with access to samples stored in the biobank. Blood spots are given to outside researchers for $20 to $40 per spot. According to biobank records, the program sold about 16,000 blood spots over the past five years, totaling a little more than $700,000.

Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy.


Alexa and Siri Can Hear This Hidden Command. You Cant.
2018-05-10, New York Times
https://www.nytimes.com/2018/05/10/technology/alexa-siri-hidden-command-audio...

Over the last two years, researchers in China and the United States have begun demonstrating that they can send hidden commands that are undetectable to the human ear to Apples Siri, Amazons Alexa and Googles Assistant. Researchers have been able to secretly activate the artificial intelligence systems on smartphones and smart speakers, making them dial phone numbers or open websites. In the wrong hands, the technology could be used to unlock doors, wire money or buy stuff online - simply with music playing over the radio. A group of students from University of California, Berkeley, and Georgetown University showed in 2016 that they could hide commands in white noise played over loudspeakers and through YouTube videos to get smart devices to turn on airplane mode or open a website. This month, some of those Berkeley researchers published a research paper that went further, saying they could embed commands directly into recordings of music or spoken text. So while a human listener hears someone talking or an orchestra playing, Amazons Echo speaker might hear an instruction to add something to your shopping list. There is no American law against broadcasting subliminal messages to humans, let alone machines. The Federal Communications Commission discourages the practice as counter to the public interest, and the Television Code of the National Association of Broadcasters bans transmitting messages below the threshold of normal awareness.

Note: Read how a hacked vehicle may have resulted in journalist Michael Hastings' death in 2013. A 2015 New York Times article titled "Why Smart Objects May Be a Dumb Idea" describes other major risks in creating an "Internet of Things". Vulnerabilities like those described in the article above make it possible for anyone to spy on you with these objects, accelerating the disappearance of privacy.


Palantir Knows Everything About You
2018-04-19, Bloomberg
https://www.bloomberg.com/features/2018-palantir-peter-thiel/

A former U.S. Secret Service agent named Peter Cavicchia III ran special ops for JPMorgan Chase & Co. His insider threat group ... used computer algorithms to monitor the bank’s employees. Aided by as many as 120 “forward-deployed engineers” from the data mining company Palantir Technologies Inc., which JPMorgan engaged in 2009, Cavicchia’s group vacuumed up emails and browser histories, GPS locations ... and transcripts of digitally recorded phone conversations. It all ended when the bank’s senior executives learned that they, too, were being watched. [The] spying scandal ... which has never been reported, also marked an ominous turn for Palantir. An intelligence platform designed for the global War on Terror was weaponized against ordinary Americans at home. Founded in 2004 by Peter Thiel and some fellow PayPal alumni, Palantir cut its teeth working for the Pentagon and the CIA. The U.S. Department of Health and Human Services uses Palantir. The FBI uses it. The Department of Homeland Security deploys it. Police and sheriff’s departments in New York, New Orleans, Chicago, and Los Angeles have also used it, frequently ensnaring in the digital dragnet people who aren’t suspected of committing any crime. JPMorgan’s experience remains instructive. “The world changed when it became clear everyone could be targeted using Palantir,” says a former JPMorgan cyber expert who worked with Cavicchia at one point on the insider threat team. “Everyone’s a suspect, so we monitored everything.”

Note: Palantir was one of the private intelligence firms that reportedly conspired to discredit activists and journalist Glenn Greenwald, in part by submitting fake documents to WikiLeaks. For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy.


I Downloaded the Information That Facebook Has on Me. Yikes.
2018-04-11, New York Times
https://www.nytimes.com/2018/04/11/technology/personaltech/i-downloaded-the-i...

I downloaded a copy of my Facebook data last week. I didn’t expect to see much. But when I opened my file, it was like opening Pandora’s box. I learned that about 500 advertisers - many that I had never heard of, like Bad Dad, a motorcycle parts store, and Space Jesus, an electronica band - had my contact information, which could include my email address, phone number and full name. Facebook also had my entire phone book, including the number to ring my apartment buzzer. The social network had even kept a permanent record of the roughly 100 people I had deleted from my friends list over the last 14 years. Facebook said unfamiliar advertisers might appear [in the file] because they might have obtained my contact information from elsewhere, compiled it into a list of people they wanted to target and uploaded that list into Facebook. Brands can obtain your information [by] buying ... from a data provider like Acxiom, which has amassed one of the world’s largest commercial databases on consumers. Let’s be clear: Facebook is just the tip of the iceberg when it comes to what information tech companies have collected on me. Knowing this, I also downloaded copies of my Google data with a tool called Google Takeout. The data sets were exponentially larger than my Facebook data. Here was the biggest surprise: In a folder labeled Ads, Google kept a history of many news articles I had read. Be warned: Once you see the vast amount of data that has been collected about you, you won’t be able to unsee it.

Note: Those who want to download their own Facebook data can use this link. For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy.


Department Of Homeland Security Compiling Database Of Journalists And 'Media Influencers'
2018-04-06, Forbes
https://www.forbes.com/sites/michellefabio/2018/04/06/department-of-homeland-...

Bloomberg Government reports on a FedBizOpps.gov posting by the Department of Homeland Security (DHS) with the relatively benign-sounding subject “Media Monitoring Services.” The details of the attached Statement of Work, however, outline a plan to gather and monitor the public activities of media professionals and influencers and are enough to cause nightmares of constitutional proportions, particularly as the freedom of the press is under attack worldwide. As part of its "media monitoring," the DHS seeks to track more than 290,000 global news sources as well as social media. The successful contracting company will have "24/7 access to a password protected, media influencer database" ... in order to "identify any and all media coverage related to the Department of Homeland Security or a particular event." The database will be browsable by "location, beat and type of influencer," and for each influencer, the chosen contractor should "present contact details and ... an overview of the previous coverage published by the media influencer." Increasing government encroachment on the freedom of the press is the sinister backdrop to all of this. Freedom House ... recently concluded that global media freedom has reached its lowest level in the past 13 years. The independent watchdog organization blames "new threats to journalists and media outlets in major democracies" as well as "further crackdowns on independent media in authoritarian countries like Russia and China."

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the manipulation of public perception.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"