Please donate here to support this vital work.
Revealing News For a Better World

Privacy News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


Crackdown on dangerous dogs to make microchips compulsory for all
2010-03-09, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/world/2010/mar/09/dangerous-dogs-microchips-insurance

All dogs are to be compulsorily microchipped so that their owners can be more easily traced under a crackdown on dangerous dogs. Under the scheme a microchip the size of a grain of rice is injected under the skin of the dog between its shoulder blades. The chip contains a unique code number, the dog's name, age, breed and health as well as the owner's name, address and phone number. When the chip is "read" by a handheld scanner the code number is revealed and the details can be checked on a national database. The measures will be set out by the home secretary, Alan Johnson, who will point to rising public concern that "status dogs" are being used by some irresponsible owners to intimidate communities or as a weapon by gangs. If the scheme were made compulsory owners would face a fine for failing to microchip their dogs.

Note: Once all dogs are required to be microchipped, what will come next? To be informed of some disturbing plans to microchip all of us, click here. For lots more on microchipping from reliable sources, click here.


The future of brain-controlled devices
2010-01-04, CNN
http://www.cnn.com/2009/TECH/12/30/brain.controlled.computers/index.html

Researchers are already using brain-computer interfaces to aid the disabled, treat diseases like Parkinson's and Alzheimer's, and provide therapy for depression and post-traumatic stress disorder. Work is under way on devices that may eventually let you communicate with friends telepathically, give you superhuman hearing and vision or even let you download data directly into your brain, a la "The Matrix." Researchers are practically giddy over the prospects. "We don't know what the limits are yet," says Melody Moore Jackson, director of Georgia Tech University's BrainLab. At the root of all this technology is the 3-pound generator we all carry in our head. It produces electricity at the microvolt level. But the signals are strong enough to move robots, wheelchairs and prosthetic limbs -- with the help of an external processor. One of the more controversial uses under development is telepathy. It would require at least two people to be implanted with electrodes that send and receive signals. DARPA, the Pentagon's technology research division, is currently working on an initiative called "Silent Talk," which would let soldiers on secret missions communicate with their thoughts alone. This stealth component is attractive, but naysayers fear that such soldiers could become manipulated for evil means.

Note: Remember that secret military research such as that undertaken by DARPA is often years ahead of capabilities publicly acknowledged.


Who's in Big Brother's Database?
2009-11-05, New York Review of Books
http://www.nybooks.com/articles/23231

On a remote edge of Utah's dry and arid high desert ... hard-hatted construction workers with top-secret clearances are preparing to build [a] mammoth $2 billion structure. It's being built by the ultra-secret National Security Agency ... to house trillions of phone calls, e-mail messages, and [electronic data trails of all kinds]. The NSA is also completing work on another data archive, this one in San Antonio, Texas, which will be nearly the size of the Alamodome. Just how much information will be stored in these windowless cybertemples? A recent report prepared by the MITRE Corporation, a Pentagon think tank, [states] "Sensor data volume could potentially increase to the level of Yottabytes [10-to-the-24th-power bytes] by 2015." Once vacuumed up and stored in these near-infinite "libraries," the data are then analyzed by powerful infoweapons, supercomputers running complex algorithmic programs, to determine who among us may be — or may one day become — a terrorist. Emerging [after 9/11] as the most powerful chief the spy world has ever known was the director of the NSA. He is in charge of an organization three times the size of the CIA and empowered in 2008 by Congress to spy on Americans to an unprecedented degree. These new centers in Utah, Texas, and possibly elsewhere will likely become the centralized repositories for the data intercepted by the NSA in America's version of the "big brother database."

Note: James Bamford, the author of this review of a new book on the history of the NSA, has himself written three important books on the agency. For many revealing reports from reliable sources on the developing capacity by government and corporate surveillance to construct a "Big Brother" states, click here.


Patriot Act Provisions Get Obama Support
2009-09-15, ABC News
http://abcnews.go.com/Politics/obama-supports-extending-patriot-act/story?id=...

The Justice Department has indicated that the Obama administration is in support of renewing [three] controversial sections of the USA Patriot Act that expire later this year. The provisions that will expire in December include Section 206, that allows "roving" wiretaps so FBI agents can tap multiple phones or computers (with court authorization) that a specific person (target) may use. Another expiring provision, Section 215, is the so-called "library provision," which allows investigators to obtain [library, medical, business, banking and other] records with approval from the Foreign Intelligence Surveillance Court. And the final provision which was nicknamed the "Lone Wolf" authorization, allows intelligence gathering of people not suspected of being part of a foreign government or known terrorist organization. Critics of the Patriot Act protested loudly that the FBI could obtain individuals' library records under the legislation. [But] section 215 is much more expansive than reviewing a suspected terrorist's summer reading list. [It] allows the FBI to obtain any business record, "any tangible things," like credit card and bank statements and also allows access to medical and mental health records. The provision has been used to obtain communication and subscriber information to help set up surveillance and monitoring of computers and telephones.

Note: The American Library Association, the national organization of professional librarians, was the first and strongest defender of civil liberties after the passage of the PATRIOT Act. For a discussion of the concerns of professional librarians over this decision by the Obama administration, click here.


Control of Cybersecurity Becomes Divisive Issue
2009-04-17, New York Times
http://www.nytimes.com/2009/04/17/us/politics/17cyber.html?partner=rss&emc=rs...

The National Security Agency has been campaigning to lead the government’s rapidly growing cybersecurity programs, raising privacy and civil liberties concerns among some officials who fear that the move could give the spy agency too much control over government computer networks. The security agency’s interest in taking over the dominant role has met resistance, including the resignation of the Homeland Security Department official who was until last month in charge of coordinating cybersecurity efforts throughout the government. Rod Beckstrom, who resigned in March as director of the National Cyber Security Center at the Homeland Security Department, said ... that he feared that the N.S.A.’s push for a greater role in guarding the government’s computer systems could give it the power to collect and analyze every e-mail message, text message and Google search conducted by every employee in every federal agency. Mr. Beckstrom said he believed that an intelligence service that is supposed to focus on foreign targets should not be given so much control over the flow of information within the United States government. To detect threats against the computer infrastructure — including hackers, viruses and intrusions by foreign agents and terrorists — cybersecurity guardians must have virtually unlimited access to networks. Mr. Beckstrom argues that those responsibilities should be divided among agencies. “I have very serious concerns about the concentration of too much power in one agency,” he said. “Power over information is so important, and it is so difficult to monitor, that we need to have checks and balances.”

Note: For further disturbing reports from reliable sources on government efforts to establish total surveillance systems, click here.


The New Thought Police
2009-01-01, PBS
http://www.pbs.org/wgbh/nova/military/nsa-police.html

The National Security Agency (NSA) is developing a tool that George Orwell's Thought Police might have found useful: an artificial intelligence system designed to gain insight into what people are thinking. The device will be able to respond almost instantaneously to complex questions posed by intelligence analysts. As more and more data is collectedthrough phone calls, credit card receipts, social networks like Facebook and MySpace, GPS tracks, cell phone geolocation, Internet searches, Amazon book purchases, even E-Z Pass toll records - it may one day be possible to know not just where people are and what they are doing, but what and how they think. The system is so potentially intrusive that at least one researcher has quit, citing concerns over the dangers in placing such a powerful weapon in the hands of a top-secret agency with little accountability. Known as Aquaint, which stands for "Advanced QUestion Answering for INTelligence," the project was run for many years by John Prange, an NSA scientist at the Advanced Research and Development Activity. A supersmart search engine, capable of answering complex questions ... would be very useful for the public. But that same capability in the hands of an agency like the NSA - absolutely secret, often above the law, resistant to oversight, and with access to petabytes of private information about Americans - could be a privacy and civil liberties nightmare. "We must not forget that the ultimate goal is to transfer research results into operational use," said ... Prange.

Note: Watch a highly revealing PBS Nova documentary providing virtual proof that the NSA could have stopped 9/11 but chose not to. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


Prosecutor turned up on U.S. terror watch list
2008-07-14, USA Today/Associated Press
http://www.usatoday.com/news/washington/2008-07-14-justice-terror-list_N.htm

The Justice Department's former top criminal prosecutor says the U.S. government's terror watch list likely has caused thousands of innocent Americans to be questioned, searched or otherwise hassled. Former Assistant Attorney General Jim Robinson would know: he is one of them. Robinson joined [with] the American Civil Liberties Union on Monday to urge fixing the list that's supposed to identify suspected terrorists. "It's a pain in the neck, and significantly interferes with my travel arrangements," said Robinson, the head of the Justice Department's criminal division during the Clinton administration. He believes his name matches that of someone who was put on the list in early 2005, and is routinely delayed while flying — despite having his own government top-secret security clearances renewed last year. He [said] "I expect my story is similar to hundreds of thousands of people who are on this list who find themselves inconvenienced." [The watch list] was created after the Sept. 11, 2001 attacks to consolidate 12 existing lists. Audits of the watch list over the last several years ... have concluded that it has mistakenly flagged innocent people whose names are similar to those on it. More than 30,000 airline passengers had asked the Homeland Security Department to clear their names from the list as of October 2006. The ACLU predicted the watch list would include 1 million names as early as Monday. The civil liberties group reached that number by citing the 700,000 records on the watch list as of last September and adding 20,000 names each month, as forecast by the Justice Department's inspector general.

Note: For many disturbing reports on threats to civil liberties, click here.


Civil liberties group criticizes new FBI authority
2008-07-02, Boston Globe/Associated Press
http://www.boston.com/news/nation/washington/articles/2008/07/02/civil_libert...

Nearly 40 years ago, the FBI was roundly criticized for investigating Americans without evidence [that] they had broken any laws. Now, critics fear the FBI may be gearing up to do it again. Tentative Justice Department guidelines, to be released later this summer, would let agents investigate people whose backgrounds -- and potentially their race or ethnicity -- match the traits of terrorists. Such profiling ... echoes the FBI's now-defunct COINTELPRO, an operation under Director J. Edgar Hoover in the 1950s and 1960s to monitor and disrupt groups with communist and socialist ties. Before it was shut down in 1971, the domestic spying operation -- formally known as Counterintelligence Programs -- had expanded to include civil rights groups, anti-war activists, ... state legislators and journalists. Among the FBI's targets were Martin Luther King Jr., Malcolm X, and John Lennon, along with members of black [political] groups ... and student protesters. The new proposal to allow investigations of Americans with no evidence of wrongdoing is "COINTELPRO for the 21st century," said Barry Steinhardt of the American Civil Liberties Union. "But this is much more insidious because it could involve more people. In the days of COINTELPRO, they were watching only a few people. Now they could be watching everyone."

Note: For many disturbing reports on threats to civil liberties, click here.


FBI Prepares Vast Database Of Biometrics
2007-12-22, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/12/21/AR20071221025...

The FBI is embarking on a $1 billion effort to build the world's largest computer database of peoples' physical characteristics, a project that would give the government unprecedented abilities to identify individuals in the United States and abroad. Digital images of faces, fingerprints and palm patterns are already flowing into FBI systems. Next month, the FBI intends to award a 10-year contract that would significantly expand the amount and kinds of biometric information it receives. And in the coming years, law enforcement authorities around the world will be able to rely on iris patterns, face-shape data, scars and perhaps even the unique ways people walk and talk, to ... identify [people]. The increasing use of biometrics for identification is raising questions about the ability of Americans to avoid unwanted scrutiny. It is drawing criticism from those who worry that people's bodies will become de facto national identification cards. "It's going to be an essential component of tracking," said Barry Steinhardt, director of the Technology and Liberty Project of the American Civil Liberties Union. "It's enabling the Always On Surveillance Society." The FBI's biometric database ... communicates with the Terrorist Screening Center's database of suspects and the National Crime Information Center database, which is the FBI's master criminal database of felons, fugitives and terrorism suspects. At the West Virginia University Center for Identification Technology Research (CITeR) ... researchers are working on capturing images of people's irises at distances of up to 15 feet, and of faces from as far away as 200 yards. Soon, those researchers will do biometric research for the FBI. Covert iris- and face-image capture is several years away, but it is of great interest to government agencies.

Note: For many important major-media reports on threats to privacy, click here.


Judges OK warrantless monitoring of Web use
2007-07-07, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2007/07/07/BAGMNQSJDA1.DTL

Federal agents do not need a search warrant to monitor a suspect's computer use and determine the e-mail addresses and Web pages the suspect is contacting, a federal appeals court ruled Friday. In a drug case from San Diego County, the Ninth U.S. Circuit Court of Appeals in San Francisco likened computer surveillance to the "pen register" devices that officers use to pinpoint the phone numbers a suspect dials, without listening to the phone calls themselves. In Friday's ruling, the court said computer users should know that they lose privacy protections with e-mail and Web site addresses when they are communicated to the company whose equipment carries the messages. The search is no more intrusive than officers' examination of a list of phone numbers or the outside of a mailed package, neither of which requires a warrant, Judge Raymond Fisher said in the 3-0 ruling. Defense lawyer Michael Crowley disagreed. His client, Dennis Alba, was sentenced to 30 years in prison after being convicted of operating a laboratory in Escondido that manufactured the drug ecstasy. Some of the evidence against Alba came from agents' tracking of his computer use. The court upheld his conviction and sentence. Expert evidence in Alba's case showed that the Web addresses obtained by federal agents included page numbers that allowed the agents to determine what someone read online, Crowley said. The ruling "further erodes our privacy," the attorney said. "The great political marketplace of ideas is the Internet, and the government has unbridled access to it."

Note: So now every email you send and read can be monitored legally. Why didn't this make news headlines?


[N.Y.] City Police Spied Broadly Before G.O.P. Convention
2007-03-25, New York Times
http://www.nytimes.com/2007/03/25/nyregion/25infiltrate.html?ex=1332475200&en...

For at least a year before the 2004 Republican National Convention, teams of undercover New York City police officers traveled to cities across the country, Canada and Europe to conduct covert observations of people who planned to protest at the convention, according to police records and interviews. From Albuquerque to Montreal, San Francisco to Miami, undercover New York police officers attended meetings of political groups, posing as sympathizers or fellow activists. They made friends, shared meals, swapped e-mail messages and then filed daily reports with the department’s Intelligence Division. In hundreds of reports stamped “N.Y.P.D. Secret,” the Intelligence Division chronicled the views and plans of people who had no apparent intention of breaking the law. These included members of street theater companies, church groups and antiwar organizations. Three New York City elected officials were cited in the reports. In at least some cases, intelligence on what appeared to be lawful activity was shared with police departments in other cities. In addition to sharing information with other police departments, New York undercover officers were active themselves in at least 15 places outside New York — including California, Connecticut, Florida, Georgia, Illinois, Massachusetts, Michigan, Montreal, New Hampshire, New Mexico, Oregon, Tennessee, Texas and Washington, D.C. — and in Europe. To date, as the boundaries of the department’s expanded powers continue to be debated, police officials have provided only glimpses of its intelligence-gathering.


My National Security Letter Gag Order
2007-03-23, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/03/22/AR20070322018...

The Justice Department's inspector general revealed on March 9 that the FBI has been systematically abusing one of the most controversial provisions of the USA Patriot Act: the expanded power to issue "national security letters." It no doubt surprised most Americans to learn that between 2003 and 2005 the FBI issued more than 140,000 specific demands under this provision. It did not, however, come as any surprise to me. Three years ago, I received a national security letter (NSL) in my capacity as the president of a small Internet access and consulting business. The letter ordered me to provide sensitive information about one of my clients. There was no indication that a judge had reviewed or approved the letter, and it turned out that none had. The letter came with a gag provision that prohibited me from telling anyone, including my client, that the FBI was seeking this information. Based on the context of the demand -- a context that the FBI still won't let me discuss publicly -- I suspected that the FBI was abusing its power. Living under the gag order has been stressful and surreal. Under the threat of criminal prosecution, I must hide all aspects of my involvement in the case -- including the mere fact that I received an NSL -- from my colleagues, my family and my friends. When I meet with my attorneys I cannot tell my girlfriend where I am going or where I have been. I hide any papers related to the case in a place where she will not look. When clients and friends ask me whether I am the one challenging the constitutionality of the NSL statute, I have no choice but to look them in the eye and lie. At some point -- a point we passed long ago -- the secrecy itself becomes a threat to our democracy.


Bank Data Is Sifted by U.S. in Secret to Block Terror
2006-06-23, New York Times
http://www.nytimes.com/2006/06/23/washington/23intel.html

Under a secret Bush administration program initiated weeks after the Sept. 11 attacks, counterterrorism officials have gained access to financial records from a vast international database and examined banking transactions involving thousands of Americans and others in the United States. The program, run out of the Central Intelligence Agency and overseen by the Treasury Department ... is a significant departure from typical practice in how the government acquires Americans' financial records. Treasury officials did not seek individual court-approved warrants or subpoenas to examine specific transactions, instead relying on broad administrative subpoenas for millions of records. That access to large amounts of confidential data was highly unusual, several officials said, and stirred concerns inside the administration about legal and privacy issues. "The capability here is awesome or, depending on where you're sitting, troubling," said one former senior counterterrorism official who considers the program valuable. While tight controls are in place, the official added, "the potential for abuse is enormous." The program is separate from the National Security Agency's efforts to eavesdrop without warrants and collect domestic phone records, operations that have provoked fierce public debate and spurred lawsuits against the government and telecommunications companies.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


The US government is deploying robot dogs to the Mexico border. Seriously?
2022-02-14, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/commentisfree/2022/feb/14/us-government-deploying...

The military, technological, security and political classes in this country appear united in their desire to make robot dogs part of our future, and we should all be worried. On 1 February ... the Department of Homeland Security (DHS) issued a press release titled "Robot Dogs Take Another Step Towards Deployment at the Border". DHS dressed up their statement with the kind of adorable language made to warm the hearts of dog lovers everywhere. A picture of the "four-legged ground drone" accompanied the release. These particular robot dogs are made by Ghost Robotics, which claims that its 100lb machine was "bred" to scale "all types of natural terrain including sand, rocks and hills, as well as human-built environments, like stairs". Each robot dog is outfitted with a bevy of sensors and able to transmit real-time video and information feeds. A testing and evaluation program is under way in El Paso, Texas. As the Electronic Frontier Foundation notes, "people who live along the border are some of the most heavily surveilled people in the United States. A massive amalgamation of federal, state and local law enforcement and national security agencies are flying drones, putting up cameras and just generally attempting to negate civil liberties – capturing the general goings-on of people who live and work in proximity to the border." Then there's the question of lethal force. These specific ground drones may not be armed, but Ghost Robotics is already infamous for the combination of robot dog and robot rifle.

Note: Singapore used robot dogs to enforce pandemic distancing measures. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance from reliable major media sources.


Texas AG wins $1.4B settlement from Facebook parent Meta over facial-capture charges
2024-07-30, NBC News
https://www.nbcnews.com/business/business-news/texas-ag-wins-1point4-billion-...

Texas Attorney General Ken Paxton has won a $1.4 billion settlement from Facebook parent Meta over charges that it captured users' facial and biometric data without properly informing them it was doing so. Paxton said that starting in 2011, Meta, then known as Facebook, rolled out a "tag" feature that involved software that learned how to recognize and sort faces in photos. In doing so, it automatically turned on the feature without explaining how it worked, Paxton said – something that violated a 2009 state statute governing the use of biometric data, as well as running afoul of the state's deceptive trade practices act. "Unbeknownst to most Texans, for more than a decade Meta ran facial recognition software on virtually every face contained in the photographs uploaded to Facebook, capturing records of the facial geometry of the people depicted," he said in a statement. As part of the settlement, Meta did not admit to wrongdoing. Facebook discontinued how it had previously used face-recognition technology in 2021, in the process deleting the face-scan data of more than one billion users. The settlement amount, which Paxton said is the largest ever obtained by a single state against a business, will be paid out over five years. "This historic settlement demonstrates our commitment to standing up to the world's biggest technology companies and holding them accountable for breaking the law and violating Texans' privacy rights," Paxton said.

Note: For more along these lines, see concise summaries of deeply revealing news articles on Big Tech and the disappearance of privacy from reliable major media sources.


‘You feel like you're in prison': workers claim Amazon's surveillance violates labor law
2024-05-21, The Guardian (One of the UK's Leading Newspapers)
https://www.theguardian.com/us-news/article/2024/may/21/amazon-surveillance-l...

Amazon has been accused of using "intrusive algorithms" as part of a sweeping surveillance program to monitor and deter union organizing activities. Workers at a warehouse run by the technology giant on the outskirts of St Louis, Missouri, are today filing an unfair labor practice charge with the National Labor Relations Board (NLRB). A copy of the charge ... alleges that Amazon has "maintained intrusive algorithms and other workplace controls and surveillance which interfere with Section 7 rights of employees to engage in protected concerted activity". There have been several reports of Amazon surveilling workers over union organizing and activism, including human resources monitoring employee message boards, software to track union threats and job listings for intelligence analysts to monitor "labor organizing threats". Artificial intelligence can be used by warehouse employers like Amazon "to essentially have 24/7 unregulated and algorithmically processed and recorded video, and often audio data of what their workers are doing all the time", said Seema N Patel ... at Stanford Law School. "It enables employers to control, record, monitor and use that data to discipline hundreds of thousands of workers in a way that no human manager or group of managers could even do." The National Labor Relations Board issued a memo in 2022 announcing its intent to protect workers from AI-enabled monitoring of labor organizing activities.

Note: For more along these lines, see concise summaries of deeply revealing news articles on Big Tech and the disappearance of privacy from reliable major media sources.


US Lawmaker Cited NYC Protests in a Defense of Warrantless Spying
2024-03-12, Wired
https://www.wired.com/story/hpsci-us-protests-section-702-presentation/

Last year, the Republican chairman of the US House Permanent Select Committee on Intelligence (HPSCI) presented an image of Americans protesting the war in Gaza while implying possible ties between the protesters and Hamas, an allegation that was used to illustrate why surveillance reforms may prove detrimental to national security. In December, as many as 200 Republican staffers gathered behind closed doors to hear a presentation ... aimed at shoring up support for a US surveillance program known as Section 702. Section 702 authorizes the government to surveil foreigners located physically overseas ... but not Americans or individuals on US soil. While eavesdropping on foreigners is permitted, doing so for the explicit purpose of gaining access to an American's communications–a practice commonly referred to as "reverse targeting"–is strictly forbidden. "Yes, it's true, you cannot ‘target' protesters under 702," one aide, a legislative director for a Republican lawmaker, says. "But that doesn't mean the FBI doesn't still have the power to access those emails or listen to their calls if it wants." Between 2020 and early 2021, the FBI conducted "tens of thousands" of queries related to "civil unrest" in the United States. "Political protest is literally how America was founded. It's in our DNA," says Jason Pye, senior policy analyst at the nonprofit FreedomWorks. "Whether you agree with these protesters or not is irrelevant."

Note: The FBI has a long history of spying on political activists. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.


Counterterror Director Used Hamas Attack To Justify Mass Surveillance Program Renewal
2023-11-06, The Intercept
https://theintercept.com/2023/11/06/hamas-counterterrorism-mass-surveillance-...

During a Senate briefing last week, a federal counterterrorism official cited the October 7 Hamas attack while urging Congress to reauthorize a sprawling and controversial surveillance program repeatedly used to spy on U.S. citizens on U.S. soil. "As evidenced by the events of the past month, the terrorist threat landscape is highly dynamic and our country must preserve [counterterrorism] fundamentals to ensure constant vigilance," said Director of the National Counterterrorism Center Christine Abizaid. She pointed to Section 702 of the Foreign Intelligence Surveillance Act, which enables the U.S. government to gather vast amounts of intelligence – including about U.S. citizens ... without first seeking a warrant. Section 702 "provides key indications and warning on terrorist plans and ... gives us strategic insight into foreign terrorists and their networks overseas," Abizaid said. "I respectfully urge Congress to reauthorize this vital authority." The controversial program is set to expire at the end of the year, and lawmakers sympathetic to the intelligence community are scrambling to protect it. Sean Vitka ... at the civil liberties group Demand Progress [said] that now is the time to enact lasting and dramatic oversight of the 702 authority. "The government has completely failed to demonstrate that any of the privacy protections reformers have called for would impair national security ... so now we're seeing people grasping at straws trying to turn everything into an excuse for reauthorization," Vitka said.

Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.


Intelligence Board Recommends Curbing F.B.I.'s Power to Use Surveillance Program
2023-07-31, New York Times
https://www.nytimes.com/2023/07/31/us/politics/fbi-warantless-surveillance-se...

An advisory board to President Biden has recommended limiting the F.B.I.'s ability to use a controversial warrantless surveillance program to hunt for information about Americans, even as it urged lawmakers to renew the law that authorizes it. The panel, known as the President's Intelligence Advisory Board, suggested barring the bureau from searching a database of intercepted information when looking for evidence about Americans in criminal investigations that do not involve foreign intelligence. The board ... delivered the recommendation in a declassified 39-page report. It came as Congress was debating whether to extend the law authorizing the program, known as Section 702. Under Section 702, the government can collect – from American companies like Google and AT&T and without a warrant – the communications of targeted foreigners abroad, even when they are talking to or about Americans. The notion that Section 702 creates a backdoor to the Fourth Amendment by allowing the F.B.I. to read private communications to or from an American without a warrant in ordinary criminal contexts has raised particular alarm. But the board rejected as unjustified the more sweeping reform proposal: to require the government to obtain a court warrant before using Americans' identifiers to search the repository. Requiring a court order before doing so, the board said, would prevent intelligence agencies from discovering threats to the country in a timely manner.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


FBI broke own rules in January 6 and BLM intelligence search, court finds
2023-05-19, The Guardian/Associated Press
https://www.theguardian.com/us-news/2023/may/19/fbi-intelligence-surveillance...

FBI officials repeatedly violated their own standards when they searched a vast repository of foreign intelligence for information related to the January 6 insurrection and racial justice protests in 2020, according court order released Friday. The violations were detailed in a secret court order issued last year by the foreign intelligence surveillance (Fisa) court, which has legal oversight of the US government's spy powers. At issue are improper queries of foreign intelligence information collected under section 702 of the Foreign Intelligence Surveillance Act, which enables the government to gather the communications of targeted foreigners outside the US. That program, which is set to expire at the end of the year, creates a database of intelligence that US agencies can search. FBI searches must have a foreign intelligence purpose or be aimed at finding evidence of a crime. But congressional critics of the program have long raised alarm about what they say are unjustified searches of the database for information about Americans, along with more general concerns about surveillance abuses. In repeated episodes disclosed on Friday, the FBI's own standards were not followed. The April 2022 order, for instances, details how the FBI queried the section 702 repository using the name of someone who was believed to have been at the Capitol during the January 6 riot. Officials obtained the information despite it not having any "analytical, investigative or evidentiary purpose", the order said.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"