Privacy Media ArticlesExcerpts of Key Privacy Media Articles in Major Media
Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
The National Security Agency is facing renewed scrutiny over the extent of its domestic surveillance program, with critics in Congress saying its recent intercepts of the private telephone calls and e-mail messages of Americans are broader than previously acknowledged, current and former officials said. Since April, when it was disclosed that the intercepts of some private communications of Americans went beyond legal limits in late 2008 and early 2009, several Congressional committees have been investigating. Those inquiries have led to concerns in Congress about the agency’s ability to collect and read domestic e-mail messages of Americans on a widespread basis, officials said. Supporting that conclusion is the account of a former N.S.A. analyst who, in a series of interviews, described being trained in 2005 for a program in which the agency routinely examined large volumes of Americans’ e-mail messages without court warrants. Two intelligence officials confirmed that the program was still in operation. Both the former analyst’s account and the rising concern among some members of Congress about the N.S.A.’s recent operation are raising fresh questions about the spy agency. Representative Rush Holt, Democrat of New Jersey and chairman of the House Select Intelligence Oversight Panel, has been investigating the incidents and said he had become increasingly troubled by the agency’s handling of domestic communications. In an interview, Mr. Holt disputed assertions by Justice Department and national security officials that the overcollection was inadvertent. “Some actions are so flagrant that they can’t be accidental,” Mr. Holt said.
Note: For lots more from major media sources on the ever-increasing government and coroporate threats to privacy, click here.
The Pentagon plans to create a new military command for cyberspace ... stepping up preparations by the armed forces to conduct both offensive and defensive computer warfare. White House officials say Mr. Obama has not yet been formally presented with the Pentagon plan. But he is expected to sign a classified order in coming weeks that will create the military cybercommand, officials said. It is a recognition that the United States already has a growing number of computer weapons in its arsenal and must prepare strategies for their use — as a deterrent or alongside conventional weapons — in a wide variety of possible future conflicts. [A] main dispute has been over whether the Pentagon or the National Security Agency should take the lead in preparing for and fighting cyberbattles. Under one proposal still being debated, parts of the N.S.A. would be integrated into the military command so they could operate jointly. A classified set of presidential directives is expected to lay out the military’s new responsibilities and how it coordinates its mission with that of the N.S.A., where most of the expertise on digital warfare resides today. The decision to create a cybercommand is a major step beyond the actions taken by the Bush administration, which authorized several computer-based attacks but never resolved the question of how the government would prepare for a new era of warfare fought over digital networks. Officials declined to describe potential offensive operations, but said they now viewed cyberspace as comparable to more traditional battlefields.
Note: Combine this with the BBC's revealing article on US plans to fight the Internet, and there is reason for concern. For lots more on new developments in modern war planning, click here.
A San Francisco federal judge rejected on Friday the Obama administration's attempt to derail a challenge to former President George W. Bush's electronic surveillance program by withholding a critical wiretap document. President Obama's Justice Department had appeared to defy a previous order by Chief U.S. District Judge Vaughn Walker to allow lawyers for an Islamic organization to see the classified document, which reportedly showed that the group had been wiretapped. The document, which the government accidentally sent to the Al-Haramain Islamic Foundation, could establish its right to sue over the legality of the program. Justice Department lawyers told Walker in February that he had no power to enforce his order, and indicated they would remove the document from his files if he planned to disclose it to Al-Haramain's lawyers. But after a federal appeals court denied the department's request to intervene, Walker told the government Friday to cooperate. "The United States should now comply with the court's orders," the judge said. He told lawyers for the administration and Al-Haramain to work out a protective order by May 8 that would maintain the document's secrecy after it had been shown to the Islamic group's lawyers. If the two sides can't agree, Walker said, he will issue his own protective order "under which this case may resume forward progress." The case is one of two before Walker challenging the constitutionality of the program that Bush secretly authorized in 2001 to intercept phone calls and e-mails between Americans and suspected foreign terrorists without seeking a court warrant, as required by a 1978 law.
Note: For more reports on government secrecy from reliable sources, click here.
The National Security Agency has been campaigning to lead the government’s rapidly growing cybersecurity programs, raising privacy and civil liberties concerns among some officials who fear that the move could give the spy agency too much control over government computer networks. The security agency’s interest in taking over the dominant role has met resistance, including the resignation of the Homeland Security Department official who was until last month in charge of coordinating cybersecurity efforts throughout the government. Rod Beckstrom, who resigned in March as director of the National Cyber Security Center at the Homeland Security Department, said ... that he feared that the N.S.A.’s push for a greater role in guarding the government’s computer systems could give it the power to collect and analyze every e-mail message, text message and Google search conducted by every employee in every federal agency. Mr. Beckstrom said he believed that an intelligence service that is supposed to focus on foreign targets should not be given so much control over the flow of information within the United States government. To detect threats against the computer infrastructure — including hackers, viruses and intrusions by foreign agents and terrorists — cybersecurity guardians must have virtually unlimited access to networks. Mr. Beckstrom argues that those responsibilities should be divided among agencies. “I have very serious concerns about the concentration of too much power in one agency,” he said. “Power over information is so important, and it is so difficult to monitor, that we need to have checks and balances.”
Note: For further disturbing reports from reliable sources on government efforts to establish total surveillance systems, click here.
The National Security Agency intercepted private e-mail messages and phone calls of Americans in recent months on a scale that went beyond the broad legal limits established by Congress last year, government officials said in recent interviews. Several intelligence officials, as well as lawyers briefed about the matter, said the N.S.A. had been engaged in “overcollection” of domestic communications of Americans. They described the practice as significant and systemic. The legal and operational problems surrounding the N.S.A.’s surveillance activities have come under scrutiny from the Obama administration, Congressional intelligence committees and a secret national security court. Congressional investigators say they hope to determine if any violations of Americans’ privacy occurred. It is not clear to what extent the agency may have actively listened in on conversations or read e-mail messages of Americans without proper court authority, rather than simply obtained access to them. While the N.S.A.’s operations in recent months have come under examination, new details are also emerging about earlier domestic-surveillance activities, including the agency’s attempt to wiretap a member of Congress, without court approval, on an overseas trip. After a contentious three-year debate that was set off by the disclosure in 2005 of the program of wiretapping without warrants that President George W. Bush approved after the Sept. 11 attacks, Congress gave the N.S.A. broad new authority to collect, without court-approved warrants, vast streams of international phone and e-mail traffic as it passed through American telecommunications gateways.
Note: For further disturbing reports from reliable sources on government efforts to establish total surveillance systems, click here.
Despite President Barack Obama's vow to open government more than ever, the Justice Department is defending Bush administration decisions to keep secret many documents about domestic wiretapping, data collection on travelers and U.S. citizens, and interrogation of suspected terrorists. "The signs in the last few days are not ... encouraging," said Jameel Jaffer, an attorney for the American Civil Liberties Union, which filed several lawsuits seeking the Bush administration's legal rationales for warrantless domestic wiretapping and for its treatment of terrorism detainees. The documents sought in these lawsuits "are in many cases the documents that the public most needs to see," Jaffer said. "It makes no sense to say that these documents are somehow exempt from President Obama's directives." Groups that advocate open government, civil liberties and privacy were overjoyed that Obama on his first day in office reversed the FOIA policy imposed by Bush's first attorney general, John Ashcroft. Obama pledged "an unprecedented level of openness in government" and ordered new FOIA guidelines written with a "presumption in favor of disclosure." But Justice's actions in courts since then have cast doubt on how far the new administration will go. "This is not change," said ACLU executive director Anthony Romero. "President Obama's Justice Department has disappointingly reneged" on his promise to end "abuse of state secrets."
Note: For lots more on state secrecy from reliable, verifiable sources, click here.
Electronic surveillance and collection of personal data are "pervasive" in British society and threaten to undermine democracy, peers [in the House of Lords] have warned. CCTV cameras and the DNA database were two examples of threats to privacy, the Lords constitution committee said. It called for compensation for people subject to illegal surveillance. Civil liberties campaigners have warned about the risks of a "surveillance society" in which the state acquires ever-greater powers to track people's movements and retain personal data. In its report, the Lords constitution committee said growth in surveillance by both the state and the private sector risked threatening people's right to privacy, which it said was "an essential pre-requisite to the exercise of individual freedom". People were often unaware of the scale of personal information held and exchanged by public bodies, it said. "There can be no justification for this gradual but incessant creep towards every detail about us being recorded and pored over by the state," committee chairman and Tory peer Lord Goodlad said. "The huge rise in surveillance and data collection by the state and other organisations risks undermining the long-standing tradition of privacy and individual freedom which are vital for democracy," Lord Goodlad added. Human rights campaigners Liberty welcomed the report.
Note: For key reports from major media sources on growing threats to privacy from governments and corporations, click here.
OLBERMANN: It has taken less than 24 hours after the Bush presidency ended for a former analyst at the National Security Agency to come forward to reveal new allegations about how this nation was spied on by its own government. Russell Tice [reveals] that under the collar of fighting terrorism, the Bush administration was also targeting specific groups of Americans for surveillance. TICE: The National Security Agency had access to all Americans‘ communications, faxes, phone calls, and their computer communications. They monitored all communications. What was done was a sort of an ability to look at the meta data, the signaling data for communications, and ferret that information to determine what communications would ultimately be collected. Basically, filtering out sort of like sweeping everything with that meta data, and then cutting down ultimately what you are going to look at and what is going to be collected, and in the long run have an analyst look at, you know, needles in a haystack for what might be of interest. OLBERMANN: I mention that you say specific groups were targeted. What group or groups can you tell us about? TICE: [Some of the groups they] collected on were U.S. news organizations and reporters and journalists. The collection ... was 24/7, and you know, 365 days a year, and it made no sense.
Note: To watch this revealing clip on video, click here. For many reports on government surveillance and invasions of privacy, click here.
U.S. spy agencies' sensitive data should soon be linked by Google-like search systems. Director of National Intelligence Mike McConnell has launched a sweeping technology program to knit together the thousands of databases across all 16 spy agencies. After years of bureaucratic snafus, intelligence analysts will be able to search through secret intelligence files the same way they can search public data on the Internet. Linking up the 16 agencies is the challenge at the heart of the job of director of national intelligence, created after 9/11. The new information program also is designed to include Facebook-like social-networking programs and classified news feeds. It includes enhanced security measures to ensure that only appropriately cleared people can access the network. The price tag is expected to be in the billions of dollars. The impact for analysts, Mr. McConnell says, "will be staggering." Not only will analysts have vastly more data to examine, potentially inaccurate intelligence will stand out more clearly, he said. Today, an analyst's query might scan only 5% of the total intelligence data in the U.S. government, said a senior intelligence official. Even when analysts find documents, they sometimes can't read them without protracted negotiations to gain access. Under the new system, an analyst would likely search about 95% of the data, the official said.
Note: For key reports from reliable sources on the hidden realities of the War on Terror, click here.
This is the year when automated face-recognition finally goes mainstream, and it's about time we considered its social and political implications. Researchers are developing sharply accurate scanners that monitor faces in 3D and software that analyses skin texture to turn tiny wrinkles, blemishes and spots into a numerical formula. The strongest face-recognition algorithms are now considered more accurate than most humans - and already the Home Office and the Association of Chief Police Officers have held discussions about the possibility of linking such systems with automatic car-numberplate recognition and public-transport databases. Join everything together via the internet, and voilŕ - the nation's population, down to the individual Times reader, can be conveniently and automatically monitored in real time. So let's understand this: governments and police are planning to implement increasingly accurate surveillance technologies that are unnoticeable, cheap, pervasive, ubiquitous, and searchable in real time. And private businesses, from bars to workplaces, will also operate such systems, whose data trail may well be sold on or leaked to third parties - let's say, insurance companies that have an interest in knowing about your unhealthy lifestyle, or your ex-spouse who wants evidence that you can afford higher maintenance payments.
Note: For disturbing reports on threats to privacy from major media sources, click here.
The Maryland State Police surveillance of advocacy groups was far more extensive than previously acknowledged, with records showing that troopers monitored -- and labeled as terrorists -- activists devoted to such wide-ranging causes as promoting human rights and establishing bike lanes. Intelligence officers created a voluminous file on Norfolk-based People for the Ethical Treatment of Animals, calling the group a "security threat" because of concerns that members would disrupt the circus. Angry consumers fighting a 72 percent electricity rate increase in 2006 were targeted. The DC Anti-War Network, which opposes the Iraq war, was designated a white supremacist group, without explanation. One of the possible "crimes" in the file police opened on Amnesty International, a world-renowned human rights group: "civil rights." The [surveillance] ... confirmed the fears of civil liberties groups that have warned about domestic spying since the Sept. 11, 2001, attacks. "No one was thinking this was al-Qaeda," said Stephen H. Sachs, a former U.S. attorney and state attorney general appointed by Gov. Martin O'Malley (D) to review the case. "But 9/11 created an atmosphere where cutting corners was easier." Maryland has not been alone. The FBI and police departments in several cities, including Denver in 2002 and New York before the 2004 Republican National Convention, also responded to [dissent] by spying on activists.
Note: For wide coverage from reliable sources of disturbing threats to civil liberties, click here.
The National Security Agency (NSA) is developing a tool that George Orwell's Thought Police might have found useful: an artificial intelligence system designed to gain insight into what people are thinking. The device will be able to respond almost instantaneously to complex questions posed by intelligence analysts. As more and more data is collectedthrough phone calls, credit card receipts, social networks like Facebook and MySpace, GPS tracks, cell phone geolocation, Internet searches, Amazon book purchases, even E-Z Pass toll records - it may one day be possible to know not just where people are and what they are doing, but what and how they think. The system is so potentially intrusive that at least one researcher has quit, citing concerns over the dangers in placing such a powerful weapon in the hands of a top-secret agency with little accountability. Known as Aquaint, which stands for "Advanced QUestion Answering for INTelligence," the project was run for many years by John Prange, an NSA scientist at the Advanced Research and Development Activity. A supersmart search engine, capable of answering complex questions ... would be very useful for the public. But that same capability in the hands of an agency like the NSA - absolutely secret, often above the law, resistant to oversight, and with access to petabytes of private information about Americans - could be a privacy and civil liberties nightmare. "We must not forget that the ultimate goal is to transfer research results into operational use," said ... Prange.
Note: Watch a highly revealing PBS Nova documentary providing virtual proof that the NSA could have stopped 9/11 but chose not to. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Using technology originally developed for mass disasters, Boston disease trackers are embarking on a novel experiment - one of the first in the country - aimed at eventually creating a citywide registry of everyone who has had a flu vaccination. The resulting vaccination map would allow swift intervention in neighborhoods left vulnerable to the fast-moving respiratory illness. The trial starts this afternoon, when several hundred people are expected to queue up for immunizations at the headquarters of the Boston Public Health Commission. Each of them will get a bracelet printed with a unique identifier code. Information about the vaccine's recipients, and the shot, will be entered into handheld devices similar to those used by delivery truck drivers. Infectious disease specialists in Boston and elsewhere predicted that the registry approach could prove even more useful if something more sinister strikes: a bioterrorism attack or the long-feared arrival of a global flu epidemic. In such crises, the registry could be used to track who received a special vaccine or antidote to a deadly germ. "Anything you can do to better pinpoint who's vaccinated and who's not, that's absolutely vital," said Michael Osterholm, director of the Center for Infectious Disease Research & Policy at the University of Minnesota. "I wish more cities were doing this kind of thing." When people arrive for their shots, they will get an ID bracelet with a barcode. Next, basic information - name, age, gender, address - will be entered into the patient tracking database. There will be electronic records, too, of who gave the vaccine and whether it was injected into the right arm or the left, and time-stamped for that day.
Note: For more on the serious risks and dangers posed by vaccines, click here and here.
Imagine someone watching your every move, hearing everything you say and knowing where you are at every moment. If you have a cell phone, it could happen to you. After four months of harassing phone calls, Courtney Kuykendall was afraid to answer her cell phone. The Tacoma, Washington, teenager was receiving graphic, violent threats at all hours. And when she and her family changed their cell phone numbers and got new phones, the calls continued. Using deep scratchy voices, anonymous stalkers literally took control of the Kuykendall's cell phones, repeatedly threatened Courtney with murder and rape, and began following the family's every move. "They're listening to us and recording us," Courtney's mother, Heather Kuykendall, told NBC's Today Show. "We know that because they will record us and play it back as a voicemail." How is something like this possible? Just take a look on the internet. That's where you'll find the latest spy technology for cell phones. Spyware marketers claim you can tap into someone's calls, read their text messages and track their movements "anywhere, anytime." Security experts say it's no internet hoax."It's real, and it is pretty creepy," said Rick Mislan, a former military intelligence officer who now teaches cyber forensics at Purdue University's Department of Computer and Information Technology. Mislan has examined thousands of cell phones inside Purdue's Cyber Forensics Lab, and he says spy software can now make even the most high-tech cell phone vulnerable. "I think a lot of people think their cell phone calls are very secure but our privacy isn't always what we think it is."
Note: For lots more on increasing corporate and governmental threats to privacy, click here.
Internet "black boxes" will be used to collect every email and web visit in the UK under the Government's plans for a giant "big brother" database, The Independent has learnt. Home Office officials have told senior figures from the internet and telecommunications industries that the "black box" technology could automatically retain and store raw data from the web before transferring it to a giant central database controlled by the Government. Plans to create a database holding information about every phone call, email and internet visit made in the UK have provoked a huge public outcry. Richard Thomas, the Information Commissioner, described it as "step too far" and the Government's own terrorism watchdog said that as a "raw idea" it was "awful". News that the Government is already preparing the ground by trying to allay the concerns of the internet industry is bound to raise suspicions about ministers' true intentions. Further details of the database emerged on Monday at a meeting of internet service providers (ISPs) in London where representatives from BT, AOL Europe, O2 and BSkyB were given a PowerPoint presentation of the issues and the technology surrounding the Government's Interception Modernisation Programme (IMP), the name given by the Home Office to the database proposal. "It was clear the 'back box' is the technology the Government will use to hold all the data. But what isn't clear is what the Home Secretary, GCHQ and the security services intend to do with all this information in the future," said a source close to the meeting.
Note: For lots more on threats to privacy from reliable sources, click here.
Interpol is planning to expand its role into the mass screening of passengers moving around the world by creating a face recognition database. Every year more than 800 million international travellers fail to undergo "the most basic scrutiny" to check whether their identity documents have been stolen, the global policing cooperation body has warned. Senior figures want a system that lets immigration officials capture digital images of passengers and immediately cross-check them against a database of pictures of [alleged] terror suspects, international criminals and fugitives. The UK's first automated face recognition gates -- matching passengers to their digital image in the latest generation of passports -- began operating at Manchester airport in August. Mark Branchflower, head of Interpol's fingerprint unit, will this week unveil proposals in London for the creation of biometric identification systems that could be linked to such immigration checks. The civil liberties group No2ID, which campaigns against identity cards, expressed alarm at the plans. "This is a move away from seeking specific persons to GCHQ-style bulk interception of information," warned spokesman Michael Parker. "This is the next step. Law enforcement agencies want the most efficient systems but there has to be a balance between security and privacy."
Note: For many disturbing reports on increasing threats to privacy, click here.
Everyone who buys a mobile telephone will be forced to register their identity on a national database under government plans to extend massively the powers of state surveillance. Phone buyers would have to present a passport or other official form of identification at the point of purchase. Privacy campaigners fear it marks the latest government move to create a surveillance society. A compulsory national register for the owners of all 72m mobile phones in Britain would be part of a much bigger database. Whitehall officials have raised the idea of a register containing the names and addresses of everyone who buys a phone in recent talks with Vodafone and other telephone companies, insiders say. The move is targeted at monitoring the owners of Britain’s estimated 40m prepaid mobile phones. They can be purchased with cash by customers who do not wish to give their names, addresses or credit card details. The pay-as-you-go phones are popular with criminals ... because their anonymity shields their activities from the authorities. But they are also used by thousands of law-abiding citizens who wish to communicate in private. The move aims to close a loophole in plans being drawn up by GCHQ, the government’s eavesdropping centre in Cheltenham, to create a huge database to monitor and store the internet browsing habits, e-mail and telephone records of everyone in Britain.
Note: For many disturbing reports on increasing threats to privacy, click here.
Civil liberties groups started a legal challenge ... to the new federal law designed to dismiss their wiretapping suits against telecommunications companies, saying the statute violates phone customers' constitutional rights and tramples on judicial authority. The law ... granted retroactive protection to AT&T, Verizon and other companies against lawsuits accusing them of illegally sharing their telephone and e-mail networks and millions of customer records with the National Security Agency. Almost 40 such suits from around the nation are pending before Chief U.S. District Judge Vaughn Walker in San Francisco. The law requires him to dismiss the cases if the Justice Department tells him the companies had cooperated in a surveillance program authorized by President Bush. Details of the department's filing and the judge's dismissal order are to be kept secret. The American Civil Liberties Union and the Electronic Frontier Foundation attacked the secrecy requirements and argued that Congress and President Bush lack authority to order courts to whitewash constitutional violations. "If Congress can give the executive the power to exclude the judiciary from considering the constitutional claims of millions of Americans ... then the judiciary will no longer be functioning as a coequal branch of government," Cindy Cohn, the foundation's legal director, said in court papers. She said the law's secrecy makes the proceedings one-sided. "Due process requires more than the chance to shadow-box with the government," Cohn wrote.
Note: For many reports from reliable, verifiable sources on threats to civil liberties, click here.
By exploring the current, post-9/11 operations of the NSA [National Security Agency, James] Bamford ... goes where congressional oversight committees and investigative journalists still struggle to go. [When] the Bush administration declared its ... global war on terror, Congress agreed to most of the White House's demands. According to Bamford, the NSA's expanded powers and resources enabled it to collect communications both inside and outside the United States. He quotes a former NSA employee as a witness to the agency's spying on the conversations of Americans who have no connection to terrorism. After suing the NSA for documents, [Bamford] obtained considerable evidence that telecommunication companies (with the notable exception of Qwest) knowingly violated U.S. law by cooperating with the NSA to tap fiber optic lines. In impressive detail, The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America tells how private contractors, including some little-known entities with foreign owners, have done the sensitive work of storing and processing the voices and written data of Americans and non-Americans alike. In the book, he offers new revelations about the National Security Agency's counterterrorism tactics, including its controversial domestic surveillance programs. Bamford warns of worse to come: 'There is now the capacity to make tyranny total in America. Only law ensures that we never fall into that abyss -- the abyss from which there is no return.'"
Note: Bamford is the author of two other books on the NSA: Body of Secrets and The Puzzle Palace.
Hundreds of US citizens overseas have been eavesdropped on as they called friends and family back home, according to two former military intercept operators who worked at the giant National Security Agency (NSA) center in Fort Gordon, Georgia. "These were just really everyday, average, ordinary Americans who happened to be in the Middle East, in our area of intercept and happened to be making these phone calls on satellite phones," said Adrienne Kinne, a 31-year old US Army Reserves Arab linguist assigned to a special military program at the NSA's Back Hall at Fort Gordon from November 2001 to 2003. She said US military officers, American journalists and American aid workers were routinely intercepted and "collected on" as they called their offices or homes in the United States. Another intercept operator, former Navy Arab linguist, David Murfee Faulk, 39, said he and his fellow intercept operators listened into hundreds of Americans picked up using phones in Baghdad's Green Zone from late 2003 to November 2007. Both former intercept operators came forward at first to speak with investigative journalist [James] Bamford for a book on the NSA, The Shadow Factory, to be published next week. "It's extremely rare," said Bamford, who has written two previous books on the NSA, including the landmark Puzzle Palace which first revealed the existence of the super secret spy agency. "Both of them felt that what they were doing was illegal and improper, and immoral, and it shouldn't be done, and that's what forces whistleblowers."
Note: For many reports from major media sources of disturbing threats to privacy, click here.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.