Please donate here to support this vital work.
Revealing News For a Better World

Privacy Media Articles
Excerpts of Key Privacy Media Articles in Major Media


Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.


Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


Drones over America. Are they spying on you?
2012-06-16, Christian Science Monitor
http://www.csmonitor.com/USA/2012/0616/Drones-over-America.-Are-they-spying-o...

Most Americans have gotten used to regular news reports about military and CIA drones attacking terrorist suspects – including US citizens – in Pakistan, Yemen, and elsewhere abroad. But picture thousands of drone aircraft buzzing around the United States. By some government estimates, as many as 30,000 drones could be part of intelligence gathering and law enforcement here in the United States within the next ten years. Operated by agencies down to the local level, this would be in addition to the 110 current and planned drone activity sites run by the military services in 39 states, reported this week by the Federation of American Scientists, a non-government research project. Civil libertarians warn that “unmanned aircraft carrying cameras raise the prospect of a significant new avenue for the surveillance of American life,” as the American Civil Liberties Union put it in a report last December. “The technology is quickly becoming cheaper and more powerful, interest in deploying drones among police departments is increasing, and our privacy laws are not strong enough to ensure that the new technology will be used responsibly and consistently with democratic values,” reported the ACLU. “In short, all the pieces appear to be lining up for the eventual introduction of routine aerial surveillance in American life.”

Note: For deeper analysis of the threats posed to American citizens by military and police drones in the skies, click here. For information on a federal recent law compelling the Federal Aviation Administration to allow drones to fly in US skies, click here. For more information on the use of drones by police in the US, click here. For lots more from reliable sources on surveillance in the US, click here.


Drones, computers new weapons of US shadow wars
2012-06-16, MSNBC/Associated Press
http://www.msnbc.msn.com/id/47842756/ns/technology_and_science-security/t/dro...

Drone aircraft spy on and attack terrorists with no pilot in harm's way. Small teams of special operations troops quietly train and advise foreign forces. Viruses sent from computers to foreign networks strike silently, with no American fingerprint. It's war in the shadows, with the U.S. public largely in the dark. The high-tech warfare allows Obama to target what the administration sees as the greatest threats to U.S. security, without the cost and liabilities of sending a swarm of ground troops to capture territory; some of them almost certainly would come home maimed or dead. But it also raises questions about accountability and the implications for international norms regarding the use of force outside of traditional armed conflict. "Congressional oversight of these operations appears to be cursory and insufficient," said Steven Aftergood, an expert on government secrecy issues for the Federation of American Scientists, a private group. "It is Congress' responsibility to declare war under the Constitution, but instead it appears to have adopted a largely passive role while the executive takes the initiative in war fighting," Aftergood said in an interview. That's partly because lawmakers relinquished their authority by passing a law just after the Sept. 11 [attacks]. In this shroud of secrecy, leaks to the news media of classified details about certain covert operations have led to charges that the White House orchestrated the revelations to bolster Obama's national security credentials and thereby improve his re-election chances.

Note: For deeper analysis of the threats posed to American citizens by military and police drones in the skies, click here. For information on a federal recent law compelling the Federal Aviation Administration to allow drones to fly in US skies, click here. For more information on the use of drones by police in the US, click here. For lots more from reliable sources on surveillance in the US, click here.


Cispa will give US unprecedented access, internet privacy advocates warn
2012-04-18, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/world/2012/apr/18/cispa-unprecedented-access-intern...

Washington looks set to wave through new cybersecurity legislation next week that opponents fear will wipe out decades of privacy protections at a stroke. The Cyber Intelligence Sharing and Protection Act (Cispa) will be discussed in the House of Representatives next week and already has the support of 100 House members. It will be the first such bill to go to a vote since the collapse of the Stop Online Piracy Act (Sopa) in January after global protests and a concerted campaign by internet giants such as Google, Wikipedia and Twitter. The author of the new bill, Mike Rogers, the Republican chair of the House intelligence committee, has said it is aimed at tracking the nefarious activities of hackers, terrorists and foreign states, especially China. But its critics charge the bill will affect ordinary citizens and overturn the privacy protections they now enjoy. Opponents fear the way it is currently drafted will open up ordinary citizens to unprecedented scrutiny. The bill uses the wording: "Notwithstanding any other provision of law," a phrase that if it became law would trump all existing legislation, according to critics. In one section, the bill defines "efforts to degrade, disrupt or destroy" a network as an area that would trigger a Cispa investigation. Opponents argue something as simple as downloading a large file – a movie for example – could potentially be defined as an effort to "degrade" a network. The bill also exempts companies from any liability for handing over private information.

Note: For lots more on government and corporate threats to civil liberties, click here.


Supreme Court Ruling Allows Strip Searches for Any Arrest
2012-04-02, New York Times
http://www.nytimes.com/2012/04/03/us/justices-approve-strip-searches-for-any-...

The Supreme Court on Monday ruled by a 5-to-4 vote that officials may strip-search people arrested for any offense, however minor, before admitting them to jails even if the officials have no reason to suspect the presence of contraband. Justice Anthony M. Kennedy, joined by the court’s conservative wing, wrote that courts are in no position to second-guess the judgments of correctional officials. The procedures endorsed by the majority are forbidden by statute in at least 10 states. According to a supporting brief filed by the American Bar Association, international human rights treaties also ban the procedures. Justice Stephen G. Breyer, writing for the four dissenters, said the strip searches the majority allowed were “a serious affront to human dignity and to individual privacy” and should be used only when there was good reason to do so. Justice Breyer said that the Fourth Amendment should be understood to bar strip searches of people arrested for minor offenses not involving drugs or violence, unless officials had a reasonable suspicion that they were carrying contraband. People have been subjected to “the humiliation of a visual strip search” after being arrested for driving with a noisy muffler, failing to use a turn signal and riding a bicycle without an audible bell. A nun was strip-searched ... after an arrest for trespassing during an antiwar demonstration. In a study of 23,000 people admitted to a correctional facility in Orange County, N.Y., using that standard, there was at most one instance of contraband detected that would not otherwise have been found.

Note: For an abundance of major media articles showing severe erosion of civil liberties, click here.


Email and web use 'to be monitored' under new laws
2012-04-01, BBC News
http://www.bbc.co.uk/news/uk-politics-17576745

The government will be able to monitor the calls, emails, texts and website visits of everyone in the UK under new legislation set to be announced soon. Internet firms will be required to give intelligence agency GCHQ access to communications on demand, in real time. The Home Office says the move is key to tackling crime and terrorism, but civil liberties groups have criticised it. Tory MP David Davis called it "an unnecessary extension of the ability of the state to snoop on ordinary people". A new law ... would not allow GCHQ to access the content of emails, calls or messages without a warrant. But it would enable intelligence officers to identify who an individual or group is in contact with, how often and for how long. They would also be able to see which websites someone had visited. Conservative MP and former shadow home secretary David Davis said it would make it easier for the government "to eavesdrop on vast numbers of people". "What this is talking about doing is not focusing on terrorists or criminals, it's absolutely everybody's emails, phone calls, web access..." He said that until now anyone wishing to monitor communications had been required to gain permission from a magistrate. Nick Pickles, director of the Big Brother Watch campaign group, called the move "an unprecedented step that will see Britain adopt the same kind of surveillance seen in China and Iran". The previous Labour government attempted to introduce a central, government-run database of everyone's phone calls and emails, but eventually dropped the bid after widespread anger.

Note: For more on this from BBC, click here. Though this is interesting news, many know that the government has had easy access to all people's emails, phone calls, and more for many years through systems like echelon and more. For an abundance of major media articles showing how many of the power elite want to create a big-brother society, click here.


U.S. Relaxes Limits on Use of Data in Terror Analysis
2012-03-23, New York Times
https://www.nytimes.com/2012/03/23/us/politics/us-moves-to-relax-some-restric...

The Obama administration is moving to relax restrictions on how counterterrorism analysts may retrieve, store and search information about Americans gathered by government agencies for purposes other than national security threats. Attorney General Eric H. Holder Jr. [has] signed new guidelines for the National Counterterrorism Center. The guidelines will lengthen to five years — from 180 days — the amount of time the center can retain private information about Americans when there is no suspicion that they are tied to terrorism, intelligence officials said. The guidelines are also expected to result in the center making more copies of entire databases and “data mining them.” They also set off civil-liberties concerns among privacy advocates who invoked the “Total Information Awareness” program. That program, proposed early in the George W. Bush administration and partially shut down by Congress after an outcry, proposed fusing vast archives of electronic records — like travel records, credit card transactions, phone calls and more. “We’re all in the dark, and for all we know it could be a rerun of Total Information Awareness, which would have allowed the government to make a computerized database of everything on everybody,” said Kate Martin, the director of the Center for National Security Studies, who criticized the administration for not making the draft guidelines public for scrutiny ahead of time.

Note: For excellent and insightful analyses of the disturbing growth of government surveillance and secrecy described in this NYT report, click here and here and here and here.


Drones Set Sights on U.S. Skies
2012-02-18, New York Times
http://www.nytimes.com/2012/02/18/technology/drones-with-an-eye-on-the-public...

A new federal law, signed by the president on [February 14], compels the Federal Aviation Administration to allow drones to be used for all sorts of commercial endeavors. Local police and emergency services will also be freer to send up their own drones. But while businesses, and drone manufacturers especially, are celebrating the opening of the skies to these unmanned aerial vehicles, the law raises new worries about how much detail the drones will capture about lives down below — and what will be done with that information. Some questions likely to come up: Can a drone flying over a house pick up heat from a lamp used to grow marijuana inside, or take pictures from outside someone’s third-floor fire escape? Can images taken from a drone be sold to a third party, and how long can they be kept? The American Civil Liberties Union and other advocacy groups are calling for new protections against what the A.C.L.U. has said could be “routine aerial surveillance of American life.” The new law, part of a broader financing bill for the F.A.A., came after intense lobbying by drone makers and potential customers. These manufacturers have been awaiting lucrative new opportunities at home. The market for drones is valued at $5.9 billion and is expected to double in the next decade, according to industry figures. Drones can cost millions of dollars for the most sophisticated varieties to as little as $300 for one that can be piloted from an iPhone.

Note: For more information on the use of drones by police in the US, click here. For more on the threats to civil liberties created by this new law, click here. For lots more from reliable sources on surveillance in the US, click here.


The History Of The FBI's Secret 'Enemies' List
2012-02-14, NPR
https://www.npr.org/2012/02/14/146862081/the-history-of-the-fbis-secret-enemi...

Even before he became director of the FBI, [J. Edgar] Hoover was conducting secret intelligence operations against U.S. citizens he suspected were anarchists, radical leftists or communists. After a series of anarchist bombings went off across the United States in 1919, Hoover sent five agents to infiltrate the newly formed Communist Party. "From that day forward, he planned a nationwide dragnet of mass arrests to round up subversives, round up communists, round up Russian aliens," [author Tim] Weiner says. On Jan. 1, 1920, Hoover sent out the arrest orders, and at least 6,000 people were arrested and detained throughout the country. "When the dust cleared, maybe 1 in 10 was found guilty of a deportable offense," says Weiner. Hoover, Attorney General Mitchell Palmer and Secretary of the Navy Franklin Delano Roosevelt all came under attack for their role in the raids. Hoover started amassing secret intelligence on "enemies of the United States" – a list that included terrorists, communists, spies – or anyone Hoover or the FBI had deemed subversive. Later on, anti-war protesters and civil rights leaders were added to Hoover's list. "Hoover saw the civil rights movement from the 1950s onward and the anti-war movement from the 1960s onward, as presenting the greatest threats to the stability of the American government since the Civil War," [Weiner] says. "These people were enemies of the state, and in particular Martin Luther King [Jr.] was an enemy of the state."

Note: Read more about the FBI's COINTELPRO program. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the erosion of civil liberties from reliable major media sources.


Governments turn to hacking techniques for surveillance of citizens
2011-11-01, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/technology/2011/nov/01/governments-hacking-techniqu...

In a luxury Washington, DC, hotel last month, governments from around the world gathered to discuss surveillance technology they would rather you did not know about. The annual Intelligence Support Systems (ISS) World Americas conference is a mecca for representatives from intelligence agencies and law enforcement. But to the media or members of the public, it is strictly off limits. Behind the cloak of secrecy at the ISS World conference, tips are shared about the latest advanced ... methods used to spy on citizens – computer hacking, covert bugging and GPS tracking. The use of such methods is more commonly associated with criminal hacking groups, who have used spyware and trojan viruses to infect computers and steal bank details or passwords. But as the internet has grown, intelligence agencies and law enforcement have adopted similar techniques. "The current method of choice would seem to be spyware, or trojan horses," said Chris Soghoian, a Washington-based surveillance and privacy expert. "When there are five or six conferences held in closed locations every year, where telecommunications companies, surveillance companies and government ministers meet in secret to cut deals, buy equipment, and discuss the latest methods to intercept their citizens' communications – that I think meets the level of concern," he said. "Decades of history show that surveillance powers are abused – usually for political purposes."

Note: For more on corporate and government threats to privacy and civil liberties, click here and here.


How the US government secretly reads your email
2011-10-11, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/cifamerica/2011/oct/11/us-government-...

Somewhere, a US government official is reading through a list of those who sent or received an email from Jacob Appelbaum, a 28-year-old computer science researcher at the University of Washington who volunteered for WikiLeaks. Among those listed will be my name, a journalist who interviewed Appelbaum for a book about the digital revolution. Appelbaum is a spokesman for Tor, a free internet anonymising software that helps people defend themselves against internet surveillance. He's spent five years teaching activists around the world how to install and use the service to avoid being monitored by repressive governments. Now, Appelbaum finds himself a target of his own government as a result of his friendship with Julian Assange and the fact WikiLeaks used the Tor software. Appelbaum has not been charged with any wrongdoing; nor has the government shown probable cause that he is guilty of any criminal offence. That matters not a jot, because, as the law stands, government officials don't need a search warrant to access our digital data. Searching someone's home requires a warrant that can only be obtained by proving probable cause, but digital searches require no such burden of proof. Most people are not aware of the ease with which governments – free, open and so-called democratic – can access and peruse our private communications.

Note: For key reports on government threats to privacy from major media sources, click here.


Government Aims to Build a ‘Data Eye in the Sky'
2011-10-10, New York Times
https://www.nytimes.com/2011/10/11/science/11predict.html?pagewanted=all

More than 60 years ago, in his "Foundation" series, the science fiction novelist Isaac Asimov invented a new science – psychohistory – that combined mathematics and psychology to predict the future. Now social scientists are trying to mine the vast resources of the Internet – Web searches and Twitter messages, Facebook and blog posts, the digital location trails generated by billions of cellphones – to do the same thing. The government is showing interest in the idea. This summer a little-known intelligence agency began seeking ideas from academic social scientists and corporations for ways to automatically scan the Internet in 21 Latin American countries for "big data," according to a research proposal. The three-year experiment ... is being financed by the Intelligence Advanced Research Projects Activity, or Iarpa. The automated data collection system is to focus on patterns of communication, consumption and movement of populations. It will use publicly accessible data, including Web search queries, blog entries, Internet traffic flow, financial market indicators, traffic webcams and changes in Wikipedia entries. It is intended to be an entirely automated system, a "data eye in the sky" without human intervention. Some social scientists and advocates of privacy rights are deeply skeptical of the project, saying it evokes queasy memories of Total Information Awareness, a post-9/11 Pentagon program that proposed hunting for potential attackers by identifying patterns in vast collections of public and private data.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


OnStar's 'brazen' data tracking comes under fire
2011-09-26, CNN
http://money.cnn.com/2011/09/26/technology/schumer_onstar_investigation/index...

Your OnStar-equipped car can share an awful lot about your driving habits -- even if you're no longer an OnStar customer. A senator from New York has asked the Federal Trade Commission to open an investigation into vehicle tracking by General Motors' OnStar division. Two other senators issued calls for the company to explain and reconsider its tracking policies. OnStar, which provides a variety of services including vehicle diagnostics, driving directions and automated 911 calls to owners of mostly GM vehicles, recently announced that it reserves the right to track and sell information about vehicles' location and speed even after the driver has stopped subscribing to the service. OnStar, which has around 6 million subscribers, relies on GPS tracking and other systems built into the car. Senator Charles Schumer, a Democrat from New York,... called the tracking "one of the most brazen invasions of privacy in recent memory." Senators Al Franken and Christopher Coons, both Democrats, sent a letter to OnStar last week saying that the company's actions "appear to violate basic principles of privacy and fairness." OnStar reserves the right to sell "anonymized" information collected from vehicles to outside companies. "Anonymized" data is aggregated on cannot be traced back to any individual vehicle or person. But hackers have been able to tease out individual user information from supposedly anonymized data, Schumer noted in his announcement.

Note: For more on corporate and government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


Social Media History Becomes a New Job Hurdle
2011-07-21, New York Times
http://www.nytimes.com/2011/07/21/technology/social-media-history-becomes-a-n...

Companies have long used criminal background checks, credit reports and even searches on Google and LinkedIn to probe the previous lives of prospective employees. Now, some companies are requiring job candidates to also pass a social media background check. A year-old start-up, Social Intelligence, scrapes the Internet for everything prospective employees may have said or done online in the past seven years. Then it assembles a dossier with examples of professional honors and charitable work, along with negative information that meets specific criteria: online evidence of racist remarks; references to drugs; sexually explicit photos, text messages or videos; flagrant displays of weapons or bombs and clearly identifiable violent activity. The service ... alarms privacy advocates who say that it invites employers to look at information that may not be relevant to job performance. And what relevant unflattering information has led to job offers being withdrawn or not made? Marc S. Rotenberg, president of the Electronic Privacy Information Center, ... said that employers were entitled to gather information to make a determination about job-related expertise, but he expressed concern that “employers should not be judging what people in their private lives do away from the workplace.”

Note: For key reports from major media sources on government threats to privacy and civil liberties, click here and here.


Police to begin iPhone iris scans amid privacy concerns
2011-07-20, Chicago Tribune/Reuters News
http://www.chicagotribune.com/news/sns-rt-us-crime-identificatre76j4a1-201107...

Dozens of police departments nationwide are gearing up to use a tech company's already controversial iris- and facial-scanning device that slides over an iPhone and helps identify a person or track criminal suspects. Its use has set off alarms with some who are concerned about possible civil liberties and privacy issues. The smartphone-based scanner, named Mobile Offender Recognition and Information System, or MORIS, is made by BI2 Technologies in Plymouth, Massachusetts. An iris scan, which detects unique patterns in a person's eyes, can reduce to seconds the time it takes to identify a suspect in custody. When attached to an iPhone, MORIS can photograph a person's face and run the image through software that hunts for a match in a BI2-managed database of U.S. criminal records. Constitutional rights advocates are concerned, in part because the device can accurately scan an individual's face from up to four feet away, potentially without a person's being aware of it. Experts also say that before police administer an iris scan, they should have probable cause a crime has been committed. "What we don't want is for them to become a general surveillance tool, where the police start using them routinely on the general public, collecting biometric information on innocent people," said Jay Stanley, senior policy analyst with the national ACLU in Washington, D.C.

Note: For key reports from major media sources on government threats to privacy and civil liberties, click here and here.


To Track Militants, U.S. Has System That Never Forgets a Face
2011-07-14, New York Times
http://www.nytimes.com/2011/07/14/world/asia/14identity.html

With little notice and only occasional complaints, the American military and local authorities have been engaged in an ambitious effort to record biometric identifying information on a remarkable number of people in Afghanistan and Iraq, particularly men of fighting age. Information about more than 1.5 million Afghans has been put in databases operated by American, NATO and local forces. In Iraq, an even larger number of people, and a larger percentage of the population, have been registered. Data have been gathered on roughly 2.2 million Iraqis. A citizen in Afghanistan or Iraq would almost have to spend every minute in a home village and never seek government services to avoid ever crossing paths with a biometric system. What is different from traditional fingerprinting is that the government can scan through millions of digital files in a matter of seconds. While the systems are attractive to American law enforcement agencies, there is serious legal and political opposition to imposing routine collection on American citizens. Various federal, state and local law enforcement agencies have discussed biometric scanning, and many have even spent money on hand-held devices. But the proposed uses are much more limited, with questions being raised about constitutional rights of privacy and protection from warrantless searches.

Note: Many new technologies for domestic population control are developed, deployed, and tested by the US military in war theaters abroad, and then shared with police agencies in the US. For many examples see our "Non-lethal" Weapons article archive available here.


War Evolves With Drones, Some Tiny as Bugs
2011-06-20, New York Times
http://www.nytimes.com/2011/06/20/world/20drones.html

Military researchers are at work on another revolution in the air: shrinking unmanned drones ... to the size of insects and birds. The drones in development ... are designed to replicate the flight mechanics of moths, hawks and other inhabitants of the natural world. “We’re looking at how you hide in plain sight,” said Greg Parker, an aerospace engineer, as he held up a prototype of a mechanical hawk that in the future might carry out espionage or kill. An explosion in aerial drones is transforming the way America fights and thinks about its wars. Predator drones ... are by now a brand name, known and feared around the world. But far less known is the sheer size, variety and audaciousness of a rapidly expanding drone universe, along with the dilemmas that come with it. The Pentagon now has some 7,000 aerial drones, compared with fewer than 50 a decade ago. Within the next decade the Air Force anticipates a decrease in manned aircraft but expects its number of “multirole” aerial drones like the Reaper — the ones that spy as well as strike — to nearly quadruple, to 536. Already the Air Force is training more remote pilots, 350 this year alone, than fighter and bomber pilots combined. “It’s a growth market,” said Ashton B. Carter, the Pentagon’s chief weapons buyer. The Pentagon has asked Congress for nearly $5 billion for drones next year, and by 2030 envisions ever more stuff of science fiction: “spy flies” equipped with sensors and microcameras to detect enemies

Note: Ashton B. Carter, CIA director John Deutch, and executive director of the 9/11 Commission Philip Zelikow co-authored a 1998 article in the journal of the Council on Foreign Relations, Foreign Affairs, titled "Catastrophic Terrorism". It predicted, years in advance, a massive attack on the World Trade Center that would result in loss of civil liberties, detention without charge, torture, and endless wars abroad. The Pentagon's weapons-buying spree, now including billions of dollars for drones to be used over US soil, and for which Carter is the "chief weapons buyer," would have been impossible without the 9/11 attacks.


Senators sound alarm over Patriot Act extension
2011-06-02, Chicago Tribune
http://www.chicagotribune.com/news/politicsnow/la-pn-patriot-act-alarm-201106...

When two senators warned that the Patriot Act is being interpreted in a secret way that would alarm Americans if they knew the details, civil liberties activists could only speculate about what they meant. The activists' fear: that the government is using the anti-terrorism law to collect vast troves of personal information, including cellphone records, on Americans who have no link to terrorism. Sens. Ron Wyden of Oregon and Mark Udall of Colorado, both Democrats, proclaimed that the Patriot Act's surveillance powers are being used far more expansively than most Americans realize. "Today the American people do not know how their government interprets the language of the Patriot Act," Wyden said. "Someday they are going to find out, and a lot of them are going to be stunned. Some of them will undoubtedly ask their senators: 'Did you know what this law actually did? Why didn't you know? Wasn't it your job to know, before you voted on it?'" The warnings by two lawmakers with access to secret information underscore the extent to which government surveillance is shielded from view, in an age when nearly every American leaves a digital trail through the Internet and mobile devices. A clue about Wyden's concerns may be found in a separate bill he is proposing, to forbid the government from tracking, without a court order, the location of Americans through the GPS signals given out by their cellphones.

Note: For key reports from major media sources on government surveillance and other threats to privacy and civil liberties, click here and here.


Turning camera on police activities is good thing
2011-05-20, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2011/05/19/ED6L1JICLV.DTL

What's good for the police apparently isn't good for the people - or so the law enforcement community would have us believe when it comes to surveillance. That's a concise summary of a new trend noted by National Public Radio last week - the trend whereby law enforcement officials have been trying to prevent civilians from using cell phone cameras in public places as a means of deterring police brutality. Oddly, the effort - which employs both forcible arrests of videographers and legal proceedings against them - comes at a time when the American Civil Liberties Union reports that "an increasing number of American cities and towns are investing millions of taxpayer dollars in surveillance camera systems." The assault on civil liberties in America is a very real problem. As USA Today reported under the headline "Police brutality cases on rise since 9/11," situations "in which police, prison guards and other law enforcement authorities have used excessive force or other tactics to violate victims' civil rights increased 25 percent" between 2001 and 2007. Last year alone, more than 1,500 officers were involved in excessive force complaints, according to the National Police Misconduct Statistics and Reporting Project.

Note: For lots more from major media sources on government and police threats to civil liberties and privacy, click here and here.


Former Miss USA: I was 'molested' by the TSA
2011-04-29, USA Today
http://travel.usatoday.com/flights/post/2011/04/susie-castillo-dallas-fort-wo...

Weeks after generating an uproar for the aggressive screening of a six-year-old child in New Orleans, the TSA is again facing criticism for an enhanced pat-down. Former Miss USA Susie Castillo says she was "molested" by a TSA screener at Dallas/Fort Worth International Airport after declining to go through a body scanner due to radiation concerns. According to a detailed account from the Dallas Morning News, Castillo wrote "My private area was grazed four times!" on a complaint card after the screening. Castillo immediately shot a tearful video recounting the episode more explicitly and posted it on YouTube. The Boston Herald quotes from the video: "That's why I'm crying, that's why I'm so upset. They're making me choose to either get molested, because that's what I feel like, or go through this machine that's completely unhealthy and dangerous." TSA spokesman Luis Casanova defended the screening procedure. "Everything [the screener] did was according to protocol," Casanova said.

Note: For key articles on increasing reductions of civil liberties by governments, click here.


iPhone keeps record of everywhere you go
2011-04-20, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/technology/2011/apr/20/iphone-tracking-prompts-priv...

Security researchers have discovered that Apple's iPhone keeps track of where you go – and saves every detail of it to a secret file on the device which is then copied to the owner's computer when the two are synchronised. The file contains the latitude and longitude of the phone's recorded coordinates along with a timestamp, meaning that anyone who stole the phone or the computer could discover details about the owner's movements using a simple program. For some phones, there could be almost a year's worth of data stored, as the recording of data seems to have started with Apple's iOS 4 update to the phone's operating system, released in June 2010. "Apple has made it possible for almost anybody – a jealous spouse, a private detective – with access to your phone or computer to get detailed information about where you've been," said Pete Warden, one of the researchers. Only the iPhone records the user's location in this way, say Warden and Alasdair Allan, the data scientists who discovered the file and are presenting their findings at the Where 2.0 conference in San Francisco on [April 20]. "Alasdair has looked for similar tracking code in [Google's] Android phones and couldn't find any," said Warden.

Note: For key reports from reliable sources on threats to privacy, click here.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"