Please donate here to support this vital work.
Revealing News For a Better World

Privacy Media Articles
Excerpts of Key Privacy Media Articles in Major Media


Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.


Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


FBI Prepares Vast Database Of Biometrics
2007-12-22, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/12/21/AR20071221025...

The FBI is embarking on a $1 billion effort to build the world's largest computer database of peoples' physical characteristics, a project that would give the government unprecedented abilities to identify individuals in the United States and abroad. Digital images of faces, fingerprints and palm patterns are already flowing into FBI systems. Next month, the FBI intends to award a 10-year contract that would significantly expand the amount and kinds of biometric information it receives. And in the coming years, law enforcement authorities around the world will be able to rely on iris patterns, face-shape data, scars and perhaps even the unique ways people walk and talk, to ... identify [people]. The increasing use of biometrics for identification is raising questions about the ability of Americans to avoid unwanted scrutiny. It is drawing criticism from those who worry that people's bodies will become de facto national identification cards. "It's going to be an essential component of tracking," said Barry Steinhardt, director of the Technology and Liberty Project of the American Civil Liberties Union. "It's enabling the Always On Surveillance Society." The FBI's biometric database ... communicates with the Terrorist Screening Center's database of suspects and the National Crime Information Center database, which is the FBI's master criminal database of felons, fugitives and terrorism suspects. At the West Virginia University Center for Identification Technology Research (CITeR) ... researchers are working on capturing images of people's irises at distances of up to 15 feet, and of faces from as far away as 200 yards. Soon, those researchers will do biometric research for the FBI. Covert iris- and face-image capture is several years away, but it is of great interest to government agencies.

Note: For many important major-media reports on threats to privacy, click here.


The Court That May Not Be Heard
2007-12-15, New York Times
http://www.nytimes.com/2007/12/15/opinion/15sat2.html?ex=1355374800&en=722ead...

The Foreign Intelligence Surveillance Court, the special court that reviews government requests for warrants to spy on suspected foreign agents in the United States, seems to have forgotten that its job is to ensure that the government is accountable for following the law — not to help the Bush administration keep its secrets. Last week, the court denied a request by the American Civil Liberties Union to release portions of past rulings that would explain how it has interpreted the Foreign Intelligence Surveillance Act, or FISA. The court should share its legal reasoning with the public. After the 9/11 attacks, the National Security Agency for years engaged in domestic spying that violated both FISA and the Constitution. Earlier this year, after a court ruled that the program was illegal, the Bush administration said that in the future it would conduct surveillance with the approval of the intelligence court. At the same time, it announced that a judge of the court had issued orders setting out how the program could proceed. The administration has repeatedly referred to these orders, but has refused to make them public. As a result, it is impossible for the American people — and even some members of Congress — to know how the court reached its conclusions, or the state of the law with respect to domestic surveillance. The idea of courts developing law in secret and handing down legal principles that the public cannot know about should not be part of the American legal system. That is especially true when the subject matter is as important as the government spying on its citizens, an issue the founders — who drafted the Fourth Amendment — cared about deeply. The people have a right to know how the act, which is in the process of being revised, is being interpreted so they can tell their elected representatives what they think the law should be.


"A Blow at the Core of Fourth Amendment Protections"
2007-11-28, New York Times
http://www.nytimes.com/2007/11/28/opinion/28wed2.html

The Constitution protects individuals against unreasonable searches, but for this protection to have practical meaning, the courts must enforce it. This week, the Supreme Court let stand a disturbing ruling out of California that allows law enforcement to barge into people’s homes without a warrant. The case has not prompted much outrage, perhaps because the people whose privacy is being invaded are welfare recipients, but it is a serious setback for the privacy rights of all Americans. San Diego County’s district attorney has a program called Project 100% that is intended to reduce welfare fraud. Applicants for welfare benefits are visited by law enforcement agents, who show up unannounced and examine the family’s home, including the insides of cabinets and closets. The program does not meet the standards set out by the Fourth Amendment. For a search to be reasonable, there generally must be some kind of individualized suspicion of wrongdoing. These searches are done in the homes of people who have merely applied for welfare and have done nothing to arouse suspicion. The United States Court of Appeals for the Ninth Circuit, based in San Francisco, rejected a challenge brought by welfare recipients. In ruling that the program does not violate the Constitution, the majority made the bizarre assertion that the home visits are not “searches.” It is a fun-house mirrors version of constitutional analysis for a court to say that government agents are not conducting a search when they show up unannounced in a person’s home and rifle through her bedroom dresser. Judge Harry Pregerson, writing for himself and six other Ninth Circuit judges who voted to reconsider the case, got it right. The majority decision upholding Project 100%, Judge Pregerson wrote, “strikes an unprecedented blow at the core of Fourth Amendment protections.” When the government is allowed to show up unannounced without a warrant and search people’s homes, it is bad news for all of us.


Houston Police Drone Aircraft
2007-11-23, CNN
http://edition.cnn.com/TRANSCRIPTS/0711/23/sitroom.02.html

Transcript: [Suzanne] MALVEAUX: A Texas mystery solved -- at least partially. We now know Houston police are going to start using unmanned drone aircraft. But the question remains, well, for what? Stephen Dean of CNN affiliate KPRC has got an exclusive look. STEPHEN DEAN, KPRC CORRESPONDENT (voice-over): HPD [Houston Police Dept.], the federal Department of Homeland Security and other invited guests all watching to see how this drone could be used for police work in and around Houston. We tracked that drone from News Chopper 2. And that drone was able to use a high-powered camera to track us. Those cameras can actually look into people's homes or even follow them in moving cars -- which raises all sorts of new questions. HPD quickly hustled together a news conference when it realized our cameras were there for the entire secret test. Executive Assistant Chief Martha Mantabo admits that could mean covert police action. But she says it's too early to tell what else HPD will do with the aircraft. We asked, are these drones headed for ticketing speeders from the sky? MONTALVO: I'm not ruling anything out. DEAN: Back at the secret test site, police helicopter pilots claimed the entire air space was restricted and even threatened our local 2 Investigates pilot with action from the FAA if we didn't leave. But we checked with FAA several times and there never was a flight restriction. That leaves some to wonder whether the police are now ready to use terrorism fears since 911 to push the envelope further into our private lives.

Note: To watch the video of secret police work in action, click here.


Cellphone Tracking Powers on Request
2007-11-23, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/11/22/AR20071122014...

Federal officials are routinely asking courts to order cellphone companies to furnish real-time tracking data so they can pinpoint the whereabouts of drug traffickers, fugitives and other criminal suspects, according to judges and industry lawyers. In some cases, judges have granted the requests without requiring the government to demonstrate that there is probable cause to believe that a crime is taking place or that the inquiry will yield evidence of a crime. Privacy advocates fear such a practice may expose average Americans to a new level of government scrutiny of their daily lives. The requests and orders are sealed at the government's request, so it is difficult to know how often the orders are issued or denied. "Most people don't realize it, but they're carrying a tracking device in their pocket," said Kevin Bankston of the privacy advocacy group Electronic Frontier Foundation. "Cellphones can reveal very precise information about your location, and yet legal protections are very much up in the air." In a stinging opinion this month, a federal judge in Texas denied a request by a Drug Enforcement Administration agent for data that would identify a drug trafficker's phone location by using the carrier's E911 tracking capability. E911 tracking systems read signals sent to satellites from a phone's Global Positioning System (GPS) chip or triangulated radio signals sent from phones to cell towers. "Law enforcement routinely now requests carriers to continuously 'ping' wireless devices of suspects to locate them when a call is not being made . . . so law enforcement can triangulate the precise location of a device and [seek] the location of all associates communicating with a target," wrote Christopher Guttman-McCabe, vice president of regulatory affairs for CTIA -- the Wireless Association.

Note: For many major media reports on serious new threats to civil liberties, click here.


Big Brother Spying on Americans' Internet Data?
2007-11-07, ABC News
http://abcnews.go.com/Politics/Story?id=3833172

According to a former AT&T employee, the government has warrantless access to a great deal of Internet traffic should they care to take a peek. As information is traded between users it flows also into a locked, secret room on the sixth floor of AT&T's San Francisco offices and other rooms around the country -- where the U.S. government can sift through and find the information it wants, former AT&T employee Mark Klein alleged Wednesday at a press conference on Capitol Hill. "An exact copy of all Internet traffic that flowed through critical AT&T cables -- e-mails, documents, pictures, Web browsing, voice-over-Internet phone conversations, everything -- was being diverted to equipment inside the secret room," he said. Klein ... said that as an AT&T technician overseeing Internet operations in San Francisco, he helped maintain optical splitters that diverted data en route to and from AT&T customers. One day he found that the splitters were hard-wired into a secret room on the sixth floor. Documents he obtained [from] AT&T showed that highly sophisticated data mining equipment was kept there. Conversations he had with other technicians and the AT&T documents led Klein to believe there are 15 to 20 such sites nationwide, including in Seattle, Los Angeles, San Jose, San Diego and Atlanta, he said. Brian Reid, a former Stanford electrical engineering professor who appeared with Klein, said the NSA would logically collect phone and Internet data simultaneously because of the way fiber optic cables are intertwined. He said ... the system described by Klein suggests a "wholesale, dragnet surveillance." Of the major telecom companies, only Qwest is known to have rejected government requests for access to data. Former Qwest CEO Joseph Nacchio, appealing an insider trading conviction last month, said the government was seeking access to data even before Sept. 11.


Librarians Say Surveillance Bills Lack Adequate Oversight
2007-11-02, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/11/01/AR20071101022...

A little-remarked feature of pending legislation on domestic surveillance has provoked alarm among university and public librarians who say it could allow federal intelligence-gathering on library patrons without sufficient court oversight. Draft House and Senate bills would allow the government to compel any "communications service provider" to provide access to e-mails and other electronic information within the United States. The Justice Department has previously said that "providers" may include libraries, causing three major university and library groups to worry that the government's ability to monitor people targeted for surveillance without a warrant would chill students' and faculty members' online research activities. "It is fundamental that when a user enters the library, physically or electronically," said Jim Neal, the head librarian at Columbia University, "their use of the collections, print or electronic, their communications on library servers and computers, is not going to be subjected to surveillance unless the courts have authorized it." The librarians said their concern about such monitoring is rooted in recent history. In the summer of 2005, FBI agents handed an administrative subpoena called a national security letter (NSL) to a Connecticut librarian, and demanded subscriber, billing and other information on patrons who used a specific computer at a branch library. NSLs can be approved by certain FBI agents without court approval. The agents ordered the librarian to keep the demand secret. But he refused to produce the records, and his employer filed suit, challenging the gag order. A federal judge in September 2005 declared the gag order unconstitutional. The Association of Research Libraries, ... the American Library Association ... and the Association of American Universities ... each say they seek to amend the draft bills to make clear that the term "communications provider" does not include libraries.

Note: For more eye-opening reports from major media sources on the erosion of civil liberties, click here.


Companies Seeking Immunity Donate to Senator
2007-10-23, New York Times
http://www.nytimes.com/2007/10/23/washington/23nsa.html?ex=1350792000&en=f9b3...

Executives at the two biggest phone companies contributed more than $42,000 in political donations to Senator John D. Rockefeller IV this year while seeking his support for legal immunity for businesses participating in National Security Agency eavesdropping. The surge in contributions came from a Who’s Who of executives at the companies, AT&T and Verizon, starting with the chief executives and including at least 50 executives and lawyers at the two utilities, according to campaign finance reports. The money came primarily from a fund-raiser that Verizon held for Mr. Rockefeller in March in New York and another that AT&T sponsored for him in May in San Antonio. Mr. Rockefeller, chairman of the Senate Intelligence Committee, [has emerged] as the most important supporter of immunity in [the Senate]. Mr. Rockefeller’s office said ... that the sharp increases in contributions from the telecommunications executives had no influence on his support for the immunity provision. “Any suggestion that Senator Rockefeller would make policy decisions based on campaign contributions is patently false,” Wendy Morigi, a spokeswoman for him, said. AT&T and Verizon have been lobbying hard to insulate themselves from suits over their reported roles in the security agency program by gaining legal immunity from Congress. The effort included meetings with Mr. Rockefeller and other members of the intelligence panels. Mr. Rockefeller received little in the way of contributions from AT&T or Verizon executives before this year, reporting $4,050 from 2002 through 2006. From last March to June, he collected a total of $42,850 from executives at the two companies. The increase was first reported by the online journal Wired, using data compiled by the Web site OpenSecrets.org. [Telecommunications] industry executives have given significant contributions to a number of other Washington politicians, including two presidential contenders, Senators Hillary Rodham Clinton and John McCain.


Privacy Lost: These Phones Can Find You
2007-10-23, New York Times
http://www.nytimes.com/2007/10/23/technology/23mobile.html?ex=1350792000&en=e...

Two new questions arise, courtesy of the latest advancement in cellphone technology: Do you want your friends, family, or colleagues to know where you are at any given time? And do you want to know where they are? Obvious benefits come to mind. Parents can take advantage of the Global Positioning System chips embedded in many cellphones to track the whereabouts of their phone-toting children. And for teenagers and 20-somethings, who are fond of sharing their comings and goings on the Internet, youth-oriented services like Loopt and Buddy Beacon are a natural next step. But ... if G.P.S. [makes] it harder to get lost, new cellphone services are now making it harder to hide. “There are massive changes going on in society, particularly among young people who feel comfortable sharing information in a digital society,” said Kevin Bankston, a staff lawyer at the Electronic Frontier Foundation. “We seem to be getting into a period where people are closely watching each other,” he said. “There are privacy risks we haven’t begun to grapple with.” What if a boss asks an employee to use the service? Almost 55 percent of all mobile phones sold today in the United States have the technology that makes such friend- and family-tracking services possible. Consumers can turn off their service, making them invisible to people in their social-mapping network. Still, the G.P.S. service embedded in the phone means that your whereabouts are not a complete mystery. “There is a Big Brother component,” said Charles S. Golvin, a wireless analyst. “The thinking goes that if my friends can find me, the telephone company knows my location all the time, too.”

Note: For revealing major media reports of privacy risks and invasions, click here.


Immunity for Telecoms May Set Bad Precedent, Legal Scholars Say
2007-10-22, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/10/21/AR20071021010...

When previous Republican administrations were accused of illegality in the FBI and CIA spying abuses of the 1970s or the Iran-Contra affair of the 1980s, Democrats in Congress launched investigations or pushed for legislative reforms. But last week, faced with admissions by several telecommunication companies that they assisted the Bush administration in warrantless spying on Americans, leaders of the Senate intelligence committee took a much different tack -- proposing legislation that would grant those companies retroactive immunity from prosecution or lawsuits. The proposal marks the second time in recent years that Congress has moved toward providing legal immunity for past actions that may have been illegal. The Military Commissions Act, passed by a GOP-led Congress in September 2006, provided retroactive immunity for CIA interrogators who could have been accused of war crimes for mistreating detainees. Legal experts say the granting of such retroactive immunity by Congress is unusual, particularly in a case involving private companies. "It's particularly unusual in the case of the telecoms because you don't really know what you're immunizing," said Louis Fisher, a specialist in constitutional law with the Law Library of the Library of Congress. Civil liberties groups and many academics argue that Congress is allowing the government to cover up possible wrongdoing and is inappropriately interfering in disputes that the courts should decide. The American Civil Liberties Union [said] in a news release Friday that "the administration is trying to cover its tracks."


From Casinos to Counterterrorism
2007-10-22, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/10/21/AR20071021015...

[Las Vegas], famous for being America's playground, has also become its security lab. Like nowhere else in the United States, Las Vegas has embraced the twin trends of data mining and high-tech surveillance, with arguably more cameras per square foot than any airport or sports arena in the country. Even the city's cabs and monorail have cameras. Some privacy advocates view the city as a harbinger of things to come. In secret rooms in casinos across Las Vegas, surveillance specialists are busy analyzing information about players and employees. Relying on thousands of cameras in nearly every cranny of the casinos, they evaluate ... behavior. They ping names against databases that share information with other casinos, sometimes using facial-recognition software to validate a match. And in the marketing suites, casino staffers track players' every wager, every win or loss, the better to target high-rollers for special treatment and low- and middle-rollers for promotions. "You could almost look at Vegas as the incubator of a whole host of surveillance technologies," said James X. Dempsey, policy director for the Center for Democracy and Technology. Those technologies, he said, have spread to other commercial venues: malls, stadiums, amusement parks. After Sept. 11, 2001, several airports tested facial-recognition software, with little success. But the government is continuing to invest in biometric technologies. "We often hear of the surveillance technology du jour, but what we're seeing now in America is a collection of surveillance technologies that work together," said Barry Steinhardt, the American Civil Liberties Union's technology and liberty project director. "It isn't just video surveillance or face recognition or license plate readers or RFID chips. It's that all these technologies are converging to create a surveillance society."

Note: For revealing major media reports of privacy risks and invasions, click here.


Strict Visa Regulations Discourage Visiting Artists
2007-10-20, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/10/19/AR20071019025...

The Halle Orchestra, one of Great Britain's oldest symphony orchestras, has not toured the United States in more than a decade, so spirits were high when the group secured dates at Lincoln Center and in Upstate New York for performances last winter. But when the orchestra learned that to get their entry visas, all 85 musicians -- every last cellist, oboist and piccolo player -- would have to travel from their Manchester headquarters to the U.S. Embassy in London for personal interviews, electronic fingerprinting and facial-recognition scans, it scrapped the trip. Budgeting for airfare and travel costs to New York was one thing, but simply getting everyone to the embassy at the same time, along with hotel bills and fees for the visas themselves, would have cost an additional $80,000, said marketing director Andy Ryans. "It was very simply money that we didn't have," Ryans explained. "We were desperate to go to the States, but our hands were absolutely tied." Theirs aren't the only ones. To perform in this country, foreign artists of all stripes -- punk rockers, ballet dancers, folk musicians, acrobats -- are funneled through a one-size-fits-all "nonimmigrant" visa process whose costs and complications have become prohibitive, according to booking agents, managers and presenters, such as the Kennedy Center, who program and market the performers. Visiting businesspeople face similar security hurdles put in place since Sept. 11, 2001. But artists' visa petitions also require substantial documentation to satisfy the "sustained international recognition" requirement for the type of visa (called a "P-1") issued to many performing artists. Arts organizations say they have become reluctant to book foreign performers because of the risk of bureaucratic snags. Soon after Sept. 11, the State Department rolled out its Biometric Visa Program, requiring all applicants to undergo fingerprinting and have photographs taken at the nearest U.S. consulate each time they apply.


Pentagon Review Faults Bank Record Demands
2007-10-14, New York Times
http://www.nytimes.com/2007/10/14/washington/14letter.html?ex=1350014400&en=b...

An internal Pentagon review this year found systemic problems ... in the military’s efforts to obtain records from American banks and consumer credit agencies in terrorism and espionage investigations, according to Pentagon documents. The newly disclosed documents, totaling more than 1,000 pages, provide additional confirmation of the military’s expanding use of what are known as national security letters under powers claimed under the Patriot Act. The documents show that the military has issued at least 270 of the letters since 2005, and about 500 in all since 2001. The documents were obtained through the Freedom of Information Act by two private advocacy groups, the American Civil Liberties Union and the Electronic Frontier Foundation. The New York Times first disclosed the military’s use of the letters in January, and senior members of Congress and civil liberties groups criticized the practice on grounds that it seemed to conflict with traditional Pentagon rules against domestic law enforcement operations. The documents raise a number of apparent discrepancies between the Defense Department’s internal practices and what officials have said publicly and to Congress about their use of the letters. The documents suggest, for instance, that military officials used the F.B.I. to collect records for what started as purely military investigations. And the documents also leave open the possibility that records could be gathered on nonmilitary personnel in the course of the investigations. Civil liberties advocates said recent controversy over the Department of Defense’s collection of information on antiwar protesters made them suspicious of the assertion that the letters had been used exclusively to focus on military personnel. “We are very skeptical that the D.O.D. is voluntarily limiting its own surveillance power,” said Melissa Goodman, a staff attorney for the A.C.L.U..


Former CEO Says U.S. Punished Phone Firm
2007-10-13, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/10/12/AR20071012024...

A former Qwest Communications International executive, appealing a conviction for insider trading, has alleged that the government withdrew opportunities for contracts worth hundreds of millions of dollars after Qwest refused to participate in an unidentified National Security Agency program that the company thought might be illegal. Former chief executive Joseph P. Nacchio, convicted in April of 19 counts of insider trading, said the NSA approached Qwest more than six months before the Sept. 11, 2001, attacks ... about participating in a warrantless surveillance program to gather information about Americans' phone records. In the court filings disclosed this week, Nacchio suggests that Qwest's refusal to take part in that program led the government to cancel a separate, lucrative contract with the NSA in retribution. He is using the allegation to try to show why his stock sale should not have been considered improper. He has claimed in court papers that he had been optimistic that Qwest would overcome weak sales because of the expected top-secret contract with the government. Nacchio's account, which places the NSA proposal at a meeting on Feb. 27, 2001, suggests that the Bush administration was seeking to enlist telecommunications firms in programs without court oversight before the terrorist attacks on New York and the Pentagon. The Sept. 11 attacks have been cited by the government as the main impetus for its warrantless surveillance efforts. In May 2006, USA Today reported that the NSA had been secretly collecting the phone-call records of tens of millions of Americans, using data provided by major telecom firms. Qwest, it reported, declined to participate because of fears that the program lacked legal standing.

Note: The Bush Administration has claimed that the NSA surveillance of the American public was a necessary response to the attacks of 9/11. But this story reveals that the surveillance began before 9/11, shortly after Bush took office. The obvious question is, why? For many other reliable, verifiable reports that suggest the official explanation of the events of 9/11 is false, click here.


Dragonfly or Insect Spy? Scientists at Work on Robobugs
2007-10-09, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/10/08/AR20071008014...

Vanessa Alarcon saw them while working at an antiwar rally in Lafayette Square last month. "I heard someone say, 'Oh my god, look at those,' " the college senior from New York recalled. "I look up and I'm like, 'What the hell is that?' They looked kind of like dragonflies or little helicopters. But I mean, those are not insects." Out in the crowd, Bernard Crane saw them, too. "I'd never seen anything like it in my life," the Washington lawyer said. "They were large for dragonflies. I thought, 'Is that mechanical, or is that alive?' " Some suspect the insectlike drones are high-tech surveillance tools, perhaps deployed by the Department of Homeland Security. No agency admits to having deployed insect-size spy drones. But a number of U.S. government and private entities acknowledge they are trying. So what was seen by Crane, Alarcon and a handful of others at the D.C. march -- and as far back as 2004, during the Republican National Convention in New York, when one observant ... peace-march participant described on the Web "a jet-black dragonfly hovering about 10 feet off the ground, precisely in the middle of 7th Avenue . . . watching us?" Three people at the D.C. event independently described a row of spheres, the size of small berries, attached along the tails of the big dragonflies -- an accoutrement that [Jerry Louton, an entomologist at the National Museum of Natural History,] could not explain. And all reported seeing at least three maneuvering in unison. "Dragonflies never fly in a pack," he said. Mara Verheyden-Hilliard of the Partnership for Civil Justice said her group is investigating witness reports and has filed Freedom of Information Act requests with several federal agencies. If such devices are being used to spy on political activists, she said, "it would be a significant violation of people's civil rights."

Note: To read further reliable reports of threats to our civil liberties, click here.


Spies Prep Reporters on Protecting Secrets
2007-09-27, New York Sun
http://www.nysun.com/article/63465

Frustrated by press leaks about its most sensitive electronic surveillance work, the secretive National Security Agency convened an unprecedented series of off-the-record "seminars" in recent years to teach reporters about the damage caused by such leaks and to discourage reporting that could interfere with the agency's mission to spy on America's enemies. The half-day classes featured high-ranking NSA officials highlighting objectionable passages in published stories and offering "an innocuous rewrite" that officials said maintained the "overall thrust" of the articles but omitted details that could disclose the agency's techniques, according to course outlines obtained by The New York Sun. Dubbed "SIGINT 101," using the NSA's shorthand for signals intelligence, the seminar was presented "a handful of times" between approximately 2002 and 2004. The syllabi make clear that the sessions, which took place at NSA headquarters in Fort Meade, Md., were conceived of ... as part of a campaign to limit the damage caused by leaks of sensitive intelligence. During one sensitive discussion, journalists were to be told they could not take any notes. The exact substitutions of language that the NSA proposed were deleted from the syllabi released to the Sun under the Freedom of Information Act. In 2005, following the publication of a New York Times story on a secret program for warrantless wiretapping ... Director of Central Intelligence Porter Goss crusaded against leaks at the CIA and later told a Senate committee that he hoped reporters would be called before grand juries to identify their sources. Attorney General Gonzales also discussed the "possibility" of prosecuting journalists who wrote stories based on leaked intelligence. The syllabi, which are marked as drafts, list presenters including the director of the NSA at the time, General Michael Hayden, [now director of the CIA].


Collecting of Details on Travelers Documented
2007-09-22, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/09/21/AR20070921023...

The U.S. government is collecting electronic records on the travel habits of millions of Americans who fly, drive or take cruises abroad, retaining data on the persons with whom they travel or plan to stay, the personal items they carry during their journeys, and even the books that travelers have carried, according to documents obtained by a group of civil liberties advocates and statements by government officials. The personal travel records are meant to be stored for as long as 15 years, [by] the Department of Homeland Security's ... Automated Targeting System. But new details about the information being retained suggest that the government is monitoring the personal habits of travelers more closely than it has previously acknowledged. The details were learned when a group of activists requested copies of official records on their own travel. Those records included a description of a book on marijuana that one of them carried and small flashlights bearing the symbol of a marijuana leaf. Civil liberties advocates have alleged that the type of information preserved by the department raises alarms about the government's ability to intrude into the lives of ordinary people. The millions of travelers whose records are kept by the government are generally unaware of what their records say, and the government has not created an effective mechanism for reviewing the data and correcting any errors, activists said. The activists alleged that the data collection effort, as carried out now, violates the Privacy Act, which bars the gathering of data related to Americans' exercise of their First Amendment rights, such as their choice of reading material or persons with whom to associate. They also expressed concern that such personal data could one day be used to impede their right to travel.


Case Dismissed?
2007-09-20, Newsweek
http://www.msnbc.msn.com/id/20884696/site/newsweek/from/ET/

The nation’s biggest telecommunications companies, working closely with the White House, have mounted a secretive lobbying campaign to get Congress to quickly approve a measure wiping out all private lawsuits against them for assisting the U.S. intelligence community’s warrantless surveillance programs. The campaign — which involves some of Washington's most prominent lobbying and law firms — has taken on new urgency in recent weeks because of fears that a U.S. appellate court in San Francisco is poised to rule that the lawsuits should be allowed to proceed. If that happens, the telecom companies say, they may be forced to terminate their cooperation with the U.S. intelligence community — or risk potentially crippling damage awards for allegedly turning over personal information about their customers to the government without a judicial warrant. But critics say the language proposed by the White House — drafted in close cooperation with the industry officials — is so extraordinarily broad that it would provide retroactive immunity for all past telecom actions related to the surveillance program. Its practical effect, they argue, would be to shut down any independent judicial or state inquires into how the companies have assisted the government in eavesdropping on the telephone calls and e-mails of U.S. residents in the aftermath of the September 11 terror attacks. “It’s clear the goal is to kill our case," said Cindy Cohn, legal director of the Electronic Frontier Foundation, [which] filed the main lawsuit against the telecoms after The New York Times first disclosed, in December 2005, that President Bush had approved a secret program to monitor the phone conversations of U.S. residents without first seeking judicial warrants. “I find it a little shocking that Congress would participate in the covering up of what has been going on," added Cohn.


Searching Passengers' Faces For Subtle Cues to Terror
2007-09-19, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/09/18/AR20070918018...

Looking for signs of "stress, fear and deception" among the hundreds of passengers shuffling past him at Orlando International Airport one day last month, security screener Edgar Medina immediately focused on four casually dressed men trying to catch a flight to Minneapolis. One of the men, in particular, was giving obvious signs of trying to hide something, Medina said. After obtaining the passengers' ID cards and boarding passes, the Transportation Security Administration officer quickly determined the men were illegal immigrants traveling with fake Florida driver's licenses. They were detained. The otherwise mundane arrests Aug. 13 illustrated an increasingly popular tactic in the government's effort to fight terrorism: detecting lawbreakers or potential terrorists by their behavior. The TSA has embraced the strategy, training 600 of its screeners ... in detection techniques. The TSA's teams are the most publicly acknowledged effort by the government or the private sector to come up with strategies and technology to detect lawbreakers or terrorists before they commit a crime. Other technologies under development or being deployed include machines that detect stress in voices and software that scans video images to match the faces of passengers with those of known terrorists. The government is testing other technology that can see through clothing with ... electromagnetic waves. TSA's growing reliance on detecting behavior and the close study of passengers' expressions concerns civil liberties groups and members of Congress. "The problem is behavioral characteristics will be found where you look for them," said John Reinstein, legal director of the American Civil Liberties Union of Massachusetts.


An Opportunity for Wall St. in China’s Surveillance Boom
2007-09-07, New York Times
http://www.nytimes.com/2007/09/11/business/worldbusiness/11security.html?ex=1...

Li Runsen, the powerful technology director of China’s ministry of public security, is best known for leading Project Golden Shield, China’s intensive effort to strengthen police control over the Internet. But last month Mr. Li took an additional title: director for China Security and Surveillance Technology, a fast-growing company that installs and sometimes operates surveillance systems for Chinese police agencies, jails and banks, among other customers. The company has just been approved for a listing on the New York Stock Exchange. The company’s listing and Mr. Li’s membership on its board are just the latest signs of ever-closer ties among Wall Street, surveillance companies and the Chinese government’s security apparatus. Wall Street analysts now follow the growth of companies that install surveillance systems providing Chinese police stations with 24-hour video feeds from nearby Internet cafes. Hedge fund money from the United States has paid for the development of not just better video cameras, but face-recognition software and even newer behavior-recognition software designed to spot the beginnings of a street protest and notify police. Executives of Chinese surveillance companies say they are helping their government reduce street crime, preserve social stability and prevent terrorism. They note that London has a more sophisticated surveillance system, although the Chinese system will soon be far more extensive. Wall Street executives also defend the industry as necessary to keep the peace at a time of rapid change in China. They point out that New York has begun experimenting with surveillance cameras in Lower Manhattan and other areas of the city.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"