Please donate here to support this vital work.
Revealing News For a Better World

Privacy News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


The White House's Leak Hunt Is Battling the Wrong Enemy With the Wrong Weapons
2017-11-05, NBC News
https://www.nbcnews.com/think/opinion/why-white-house-searching-leakers-inste...

The Trump administration has declared all-out war on leakers. But the administration is battling the wrong enemy with the wrong weapons. Digital secrets stolen from the National Security Agency represent the real ... security problem. More than half a billion pages have been swiped. The stolen data includes some of the NSA’s most prized cyber weapons. Most were created by the agency’s own hacker team, the Tailored Access Operations (TAO) unit. Government hackers search for ways to crack into widely used computer operating systems, such as Microsoft Windows. When they discover a way in ... rather than notify the companies that their products are dangerously flawed, the NSA often secretly stores these vulnerabilities and later converts them into powerful cyber weapons, known as “exploits.” Like burglar’s tools, the exploits can secretly open a crack in a system, such as Windows, and insert an “implant” containing NSA malware - enabling the agency to take control of any computer using that Windows program. Unknown to the public, the NSA has for years been negligent in protecting its top-secret material, including these cyber weapons. Meanwhile, the Trump administration continues searching for someone who passed a few tidbits about White House bickering to a reporter, rather than focus on the NSA losing potentially deadly cyber weapons.

Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


Critics fault FBI over domestic terrorist threats
2017-10-20, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/nation/article/Critics-fault-FBI-over-domestic-terroris...

The FBI counterterrorism division’s identification of a movement it calls “black identity extremists” is the latest addition to the list of protesters and dissidents the agency puts under the “domestic terrorism” umbrella. But many national security experts say the designation [is] simply a label that allows the FBI to conduct additional surveillance on “basically anyone who’s black and politically active,” said Michael German, who left the FBI in 2004. While the practice of labeling certain protest groups as domestic terrorists is not unique to President Trump’s administration, Hina Shamsi ... at the American Civil Liberties Union, said there’s concern that “abusive and unjustified investigations” by the FBI are rising. The problem, Shamsi said, is partly in the overly broad definition of domestic terrorism in the Patriot Act as a violation of the criminal laws ... intended to “influence the policy of a government by intimidation or coercion.” Eighty-four members of Congress cited that intention to intimidate or coerce in a letter to the Justice Department last week that asked whether the department had labeled Dakota Access Pipeline protesters domestic terrorists. The Justice Department did not respond to questions about the letter. The FBI report that focused on black identity extremists ... had interest groups questioning whether the designation has been used to single out members of Black Lives Matter.

Note: The Department of Homeland Security has reportedly been monitoring the Black Lives Matter movement since 2014, in some cases producing "minute-by-minute reports on protesters’ movements". For more along these lines, read about Cointelpro, the program used by corrupt intelligence agencies to spy on and attack the U.S. civil rights movement beginning in the 1960's. See also concise summaries of deeply revealing news articles about the erosion of civil liberties.


US government demands details on all visitors to anti-Trump protest website
2017-08-15, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/world/2017/aug/14/donald-trump-inauguration-prote...

The US government is seeking to unmask every person who visited an anti-Trump website in what privacy advocates say is an unconstitutional “fishing expedition” for political dissidents. The warrant appears to be an escalation of the Department of Justice’s (DoJ) campaign against anti-Trump activities, including the harsh prosecution of inauguration day protesters. On 17 July, the DoJ served a website-hosting company, DreamHost, with a search warrant for every piece of information it possessed that was related to a website that was used to coordinate protests during Donald Trump’s inauguration. The warrant ... seeks to get the IP addresses of 1.3 million people who visited [the site], as well as the date and time of their visit and information about what browser or operating system they used. The warrant was made public Monday, when DreamHost announced its plans to challenge the government in court. The government has aggressively prosecuted activists arrested during the 20 January protests in Washington DC. In April, the US attorney’s office in Washington DC filed a single indictment charging more than 217 people with identical crimes, including felony rioting. The Electronic Frontier Foundation, which has been advising DreamHost, characterized the warrant as “unconstitutional”. “I can’t conceive of a legitimate justification other than casting your net as broadly as possible,” senior staff attorney Mark Rumold [said]. “What they would be getting is a list of everyone who has ever been interested in attending these protests.”

Note: In May, United Nations officials said that the US treatment of activists was increasingly "incompatible with US obligations under international human rights law". For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of privacy.


Special Report: How the Federal Reserve serves U.S. foreign intelligence
2017-06-26, Reuters
https://www.reuters.com/article/us-fed-accounts-intelligence-specialrepo/spec...

The Federal Reserve’s little-known role housing the assets of other central banks comes with a unique benefit to the United States: It serves as a source of foreign intelligence for Washington. Senior officials from the U.S. Treasury and other government departments have turned to these otherwise confidential accounts several times a year to analyze the asset holdings of the central banks of Russia, China, Iraq, Turkey, Yemen, Libya and others, according to more than a dozen current and former senior Fed and Treasury officials. The U.S. central bank keeps a tight lid on information contained in these accounts. But according to the officials interviewed by Reuters, U.S. authorities regularly use a “need to know” confidentiality exception in the Fed’s service contracts with foreign central banks. Some 250 foreign central banks and governments keep $3.3 trillion of their assets at the Federal Reserve Bank of New York, about half of the world’s official dollar reserves, using a service advertised in a 2015 slide presentation as “safe and confidential.” Other major central banks and some commercial banks offer similar services. But only the Fed offers direct access to U.S. debt markets and to the world’s reserve currency, the dollar. In all, the people interviewed by Reuters identified seven instances in the last 15 years in which the accounts gave U.S. authorities insights into the actions of foreign counterparts or market movements, at times leading to a specific U.S. response.

Note: It's quite telling that no other major media picked up this important piece. For more along these lines, see concise summaries of deeply revealing news articles on financial industry corruption and the disappearance of privacy.


Amazon has a patent to keep you from comparison shopping while you’re in its stores
2017-06-16, Washington Post
https://www.washingtonpost.com/news/innovations/wp/2017/06/16/amazon-has-a-pa...

As grocery shoppers work to digest Amazon’s massive acquisition of Whole Foods for $13.7 billion, the digital storefront recently scored a victory that aims to reinforce the company’s growing investments in brick-and-mortar retail. Amazon was awarded a patent May 30 that could help it choke off a common issue faced by many physical stores: Customers’ use of smartphones to compare prices even as they walk around a shop. But Amazon now has the technology to prevent that type of behavior when customers enter any of its physical stores and log onto the WiFi networks there. Titled “Physical Store Online Shopping Control,” Amazon’s patent describes a system that can identify a customer’s Internet traffic and sense when the smartphone user is trying to access a competitor’s website. When that happens, Amazon may take one of several actions. It may block access to the competitor’s site, preventing customers from viewing comparable products from rivals. It might redirect the customer to Amazon’s own site or to other, Amazon-approved sites. It might notify an Amazon salesperson to approach the customer. Or it might send the customer’s smartphone a text message, coupon or other information designed to lure the person back into Amazon’s orbit.

Note: For more along these lines, see concise summaries of deeply revealing corporate corruption news articles from reliable major media sources.


The brain is the next logical frontier for futurists
2017-05-17, Financial Times
https://www.ft.com/content/ac9e8d4c-371f-11e7-99bd-13beb0903fa3?accessToken=z...

Your perceptions of the outside world arise through brain activity. Scientists in China have managed to reverse-engineer this process, using brain activity to guess what people are looking at. Their algorithm, which analyses functional MRI brain scans collected while volunteers gaze at digits and letters, is able to furnish uncannily clear depictions of the original images. It has been termed a mind-reading algorithm; a more accurate, though less catchy, description would be a “reconstruction of visual field” algorithm. The algorithm, called the Deep Generative Multiview Model, was highlighted this month by MIT Technology Review as an emerging technology to watch. What is true for the visual cortex is also true for our auditory systems: if you hear a song, the auditory part of your brain whirrs into action. Scientists in the US have developed a programme that can turn the associated firing of neurons back into real sounds. These technologies are turning thoughts into pictures and sounds. In short, science is coming remarkably close to being able to access what is inside our heads. If such algorithms were to find their way into advertising, we may find ourselves digitally stalked not only by images of hotels and consumer goods that we once clicked on, but also by pictures we glanced at or by songs that we streamed. This requires access to brain signals, but who would bet against such a future? Millions of people, by wearing fitness bands, sign up to having their physiological signals charted round the clock.

Note: Software breakthroughs like this have many potential benefits. But these new technologies may also be used for electronic harassment or mind control. And a 2008 US Defense Intelligence Agency report described the brain as the "battlefield of future".


This 11-Year-Old Just Schooled Cybersecurity Experts By ‘Weaponizing’ a Teddy Bear
2017-05-16, Fortune
http://fortune.com/2017/05/17/reuben-paul-cybersecurity-hacking/

Cybersecurity experts were shocked Tuesday when a sixth grader showed them just how easy it would be to hack their mobile devices and weaponize a seemingly innocuous item - in this case, his smart teddy bear. At a cyber safety conference in the Hague, Netherlands, 11-year-old prodigy Reuben Paul used a small computer called a "raspberry pi" to hack into audience members' bluetooth devices and download phone numbers. Paul then reportedly used one of the numbers to hack into the teddy bear, which connects to the Internet via Bluetooth or WiFi, and used the toy to record a message from the audience by using a computer language program called Python. "I basically showed how I could connect to [a remote Internet-connected device], and send commands to it," Paul told AFP. He warned that Internet-enabled everyday objects "can be used and weaponized to spy on us or harm us," for example by scraping private information like passwords. Toys could even be programmed to say "meet me at this location and I will pick you up," he added. Though not yet a teenager, Paul is already well known among his community in Austin, Texas, and beyond. In 2014, the wunderkind founded his own company, an educational gaming website called PrudentGames. Paul is now the company's CEO.

Note: An internet-connected toy doll was recently banned in Germany because it operates "as an espionage device". A 2015 New York Times article called "smart objects" a "train wreck in privacy and security". For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy.


Facial recognition database used by FBI is out of control, House committee hears
2017-03-27, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/technology/2017/mar/27/us-facial-recognition-data...

Approximately half of adult Americans’ photographs are stored in facial recognition databases that can be accessed by the FBI, without their knowledge or consent, in the hunt for suspected criminals. About 80% of photos in the FBI’s network are non-criminal entries, including pictures from driver’s licenses and passports. The algorithms used to identify matches are inaccurate about 15% of the time, and are more likely to misidentify black people than white people. These are just some of the damning facts presented at last week’s House oversight committee hearing, where politicians and privacy campaigners criticized the FBI and called for stricter regulation of facial recognition technology at a time when it is creeping into law enforcement and business. The FBI first launched its advanced biometric database ... in 2010, augmenting the old fingerprint database with further capabilities including facial recognition. The bureau did not inform the public ... nor did it publish a privacy impact assessment, required by law, for five years. The FBI made arrangements with 18 different states to gain access to their databases of driver’s license photos. Last year, the US government accountability office (GAO) analyzed the FBI’s use of facial recognition technology and found it to be lacking in accountability, accuracy and oversight. “It doesn’t know how often the system incorrectly identifies the wrong subject,” explained the GAO’s Diana Maurer. “Innocent people could bear the burden of being falsely accused.”

Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


With WikiLeaks Claims of C.I.A. Hacking, How Vulnerable Is Your Smartphone?
2017-03-07, New York Times
https://www.nytimes.com/2017/03/07/technology/cia-hacking-documents-wikileaks...

WikiLeaks on Tuesday released a significant cache of documents that it said came from a high-security network inside the Central Intelligence Agency. WikiLeaks called the documents Vault 7, and they lay out the capabilities of the agency’s global covert hacking program. By the end of 2016, the C.I.A. program had 5,000 registered users, including government employees and contractors, [and] had produced more than a thousand hacking systems. The files have circulated among former United States government hackers and contractors in “an unauthorized manner, one of whom provided WikiLeaks with portions of the archive,” WikiLeaks said. The software targeted by the hacking program included the most popular smartphone operating systems. Apple’s iPhone software ... was a particular target, including the development of several “zero day” exploits - a term for attacking coding flaws the company would not have known about. Google’s Android ... received even more attention. By 2016, the C.I.A. had 24 weaponized Android “zero day” software programs. The C.I.A. also targeted ... internet-connected computers and home and industrial devices running the Linux operating system. In 2010, the Obama administration promised to disclose newly discovered vulnerabilities to companies like Apple, Google and Microsoft. But the WikiLeaks documents indicate that the agency found security flaws, kept them secret and then used them for surveillance and intelligence gathering.

Note: See the wikileaks webpage summarizing this most important leak. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


Foreigners must provide social media accounts to enter U.S.
2016-12-23, Miami Herald/McClatchy
http://www.miamiherald.com/news/politics-government/article122774904.html

Foreign travelers will now be asked to provide links to their social media accounts before they enter the U.S. after the government implemented a new policy designed to identify “potential threats”. The request to provide links to accounts on Facebook, Twitter, YouTube, Instagram, Google+ and LinkedIn is optional. But privacy advocates and some technology companies oppose the move on the grounds it violates civil liberties and freedom of expression. The new policy, which was originally proposed this summer, was adopted Dec. 19 for people arriving via the ... Electronic System for Travel Authorization, which now asks about social media accounts in its online form. There is no clear indication of how the information gathered will be used. “An open-ended inquiry into ‘online presence’ would give DHS a window into applicants’ private lives,” a coalition of 28 civil rights and technology groups wrote in a letter in August in opposition to the proposal. “Scrutiny of their sensitive or controversial online profiles would lead many visa-waiver applicants to self-censor or delete their accounts, with consequences for personal, business, and travel-related activity. “The risk of discrimination based on analysis of social media content and connections is great and will fall hardest on Arab and Muslim communities,” the letter said. “It also poses significant risks to journalists, whose profession requires confidentiality and whose social media networks may convey a profile that, taken out of context, could be misconstrued.”

Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the erosion of privacy.


American and British Spy Agencies Targeted In-Flight Mobile Phone Use
2016-12-07, The Intercept
https://theintercept.com/2016/12/07/american-and-british-spy-agencies-targete...

In the trove of documents provided by former National Security Agency contractor Edward Snowden is a treasure. It begins with a riddle: "What do the President of Pakistan, a cigar smuggler, an arms dealer, a counterterrorism target, and a combatting proliferation target have in common? They all used their everyday GSM phone during a flight." This riddle appeared in 2010 in SIDtoday, the internal newsletter of the NSA's Signals Intelligence Directorate, or SID, and it was classified "top secret." It announced the emergence of a new field of espionage that had not yet been explored: the interception of data from phone calls made on board civil aircraft. In a separate internal document from a year earlier, the NSA reported that 50,000 people had already used their mobile phones in flight as of December 2008, a figure that rose to 100,000 by February 2009. In a 2012 presentation, Government Communications Headquarters, or GCHQ ... disclosed a program called "Southwinds," which was used to gather all the cellular activity, voice communication, data, metadata, and content of calls on board commercial aircraft. To spy on a telephone, all that was required was that the aircraft be cruising at an altitude above 10,000 feet. Today, approximately 100 companies permit in-flight use of telephones. This will further extend the scope of espionage by providing a pool of potential targets comprising several hundreds of thousands of people. This implies a population that goes far beyond terrorist targets.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


Trove of Stolen Data Is Said to Include Top-Secret U.S. Hacking Tools
2016-10-19, New York Times
https://www.nytimes.com/2016/10/20/us/harold-martin-nsa.html?_r=0

Investigators pursuing what they believe to be the largest case of mishandling classified documents in United States history have found that the huge trove of stolen documents in the possession of a National Security Agency contractor included top-secret N.S.A. hacking tools that two months ago were offered for sale on the internet. They have been hunting for electronic clues that could link those cybertools - computer code posted online for auction by an anonymous group calling itself the Shadow Brokers - to the home computers of the contractor, Harold T. Martin III, who was arrested in late August. But so far, the investigators have been frustrated in their attempt to prove that Mr. Martin deliberately leaked or sold the hacking tools. Mr. Martin ... has insisted that he got in the habit of taking material home so he could improve his skills and be better at his job. The material the F.B.I. found in his possession added up to “many terabytes” of information ... which would make it by far the largest unauthorized leak of classified material from the classified sector. That volume dwarfs the hundreds of thousands of N.S.A. documents taken by Edward J. Snowden. [Mr. Martin] long held a high-level clearance and for a time worked with the N.S.A.’s premier hacking unit, called Tailored Access Operations, which breaks into the computer networks of foreign countries and which developed the hacking tools.

Note: It was reported in 2014 that the NSA had developed specialized tools to covertly hack into computers on a mass scale by using automated systems. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


Snowden, A Love Story: Inside Oliver Stone's New Film
2016-09-12, Newsweek
http://www.newsweek.com/edward-snowden-oliver-stone-nsa-privacy-bill-binney-e...

Years before anyone had ever heard of [Edward] Snowden, [Bill] Binney, a gifted cryptologist and mathematician, was pushing back against the NSA’s spying overreach. In October 2001 ... he resigned rather than participate in a clandestine, massively overpriced and questionably legal electronic spying system code-named Trailblazer. Eventually, the government came after him. [Binney] was thrilled by [Oliver] Stone’s powerful biopic of Snowden, who astounded the world with his massive exposure of the NSA’s global spying programs. "I think it will help people understand what is really going on behind the scenes. They are invading the privacy of everyone," he says. "They can turn on your cellphone and listen to you. They can turn on your camera and watch you." In 2013 ... James Clapper, the director of national intelligence, [lied] under oath during a congressional hearing about the NSA’s spying programs. Snowden was watching. He had also seen what had happened to Binney and fellow NSA executives Thomas Drake, Ed Loomis and Kirk Wiebe, whose homes were raided by FBI agents after The New York Times exposed the NSA’s secret spying programs in 2005. Drake, prosecuted under the 1917 Espionage Act, was eventually acquitted ... but his career was ruined. [Snowden's] critics insist he should have pursued his complaints internally, despite the persuasive examples of Binney and his comrades that such resistance is futile, even risky.

Note: Watch a free trailer or rent the whole documentary on this webpage. Read a revealing, detailed New York Times article on Oliver Stone and his profound work to expose corruption and manipulation through film. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


Oliver Stone on Snowden relevance: 'The US government lies all the time'
2016-09-10, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/film/2016/sep/10/oliver-stone-snowden-us-governme...

Oliver Stone has taken aim at the US government for deceiving people about the levels of surveillance that exist in the country. His new film Snowden, about the controversial NSA informant Edward Snowden, received its world premiere. The drama ... tells of the former CIA employee’s discovery that the agency had constructed a system to spy on the public. “Americans don’t know anything about it because the government lies about it all the time,” Stone said at a press conference. “What’s going on now is pretty shocking. This story not only deals with eavesdropping but mass eavesdropping, drones and cyberwarfare. As Snowden said himself the other day, ‘It’s out of control, the world is out of control.’” The film also features a cameo from Snowden himself, who still resides at an undisclosed location in Russia while he searches for asylum elsewhere. Stone hopes that he may return to US ground but is doubtful. “Obama could pardon him and we hope so,” he said. “But he has vigorously prosecuted eight whistleblowers under the espionage act, which is an all-time record for an American president, and he’s been one of the most efficient managers of this surveillance world. It is the most extensive and invasive surveillance state that has ever existed and he’s built it up.” The film-maker ... likens [the current situation] to a George Orwell novel. “I never thought this could happen,” he said. “But from 2001 on, it’s very clear that something radical has changed. There’s more to it that meets the eye and whatever they tell you, you’ve got to look beyond.”

Note: For more along these lines, see concise summaries of deeply revealing news articles on questionable intelligence agency practices and the disappearance of privacy.


Whistle-Blower, Beware
2016-05-26, New York Times
http://www.nytimes.com/2016/05/26/opinion/whistle-blower-beware.html

June 6 will be the third anniversary of The Guardian’s publication of top-secret documents provided by [Edward] Snowden that showed that the National Security Agency was collecting the telephone records of tens of millions of Americans. Mr. Snowden [has been] denounced ... as a traitor. [Former Secretary of State Hillary] Clinton said in a Democratic presidential debate [that], “He could have gotten all of the protections of being a whistle-blower.” Thomas Drake would disagree. Mr. Drake was a senior N.S.A. official who had also complained, 12 years earlier, about warrantless surveillance. He went up the chain of command [to] the Defense Department’s Office of Inspector General. Things did not go well. F.B.I. agents raided his house. He was forced to resign and was indicted on 10 felony charges arising from an alleged “scheme” to improperly “retain and disclose classified information.” He ultimately pleaded guilty to a misdemeanor for “exceeding authorized use of a government computer” in exchange for the government’s dropping the other charges. He now works at an Apple store. Mr. Snowden followed the Drake case closely in the news media and drew the obvious conclusion: Going through [official] channels was worse than a dead end. [John] Crane, a former assistant inspector general in the Defense Department who oversaw the whistle-blower program, has now come forward alleging that Mr. Drake was persecuted by the very officials in his office who were supposed to protect him.

Note: John Crane was forced out of the Pentagon in 2013. His story is told in a new book, titled, Bravehearts: Whistle Blowing In The Age of Snowden by Mark Hertsgaard. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


Snowden calls for whistleblower shield after claims by new Pentagon source
2016-05-22, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/us-news/2016/may/22/snowden-whistleblower-protecti...

Edward Snowden has called for a complete overhaul of US whistleblower protections after a new source from deep inside the Pentagon came forward with a startling account of how the system became a “trap” for those seeking to expose wrongdoing. The account of John Crane ... appears to undermine Barack Obama, Hillary Clinton and [others] who argue that there were established routes for Snowden other than leaking to the media. Crane, a longtime assistant inspector general at the Pentagon, has accused his old office of retaliating against a major surveillance whistleblower, Thomas Drake. Not only did Pentagon officials provide Drake’s name to criminal investigators, Crane told the Guardian, they destroyed documents relevant to his defence. Thomas Drake’s legal ordeal ruined him financially. His case served as a prologue to Snowden’s. In 2002, Drake and NSA colleagues contacted the Pentagon inspector general to blow the whistle on [a] tool, Trailblazer, for mass-data analysis. Crane, head of the office’s whistleblower unit, assigned investigators. For over two years, with Drake as a major source, they ... prepared a lengthy secret report [that] eventually [helped] to kill the program. As far as Crane was concerned, the whistleblower system was working. But after an aspect of the NSA’s warrantless mass surveillance leaked to the New York Times, Drake himself came under investigation and eventually indictment [for] hoarding documentation – exactly what inspector-general investigators tell their whistleblowers to do.

Note: John Crane was forced out of the Pentagon in 2013. His story is told in a new book, titled, Bravehearts: Whistle Blowing In The Age of Snowden by Mark Hertsgaard. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


The new way police are surveilling you: Calculating your threat ‘score’
2016-01-10, Washington Post
https://www.washingtonpost.com/local/public-safety/the-new-way-police-are-sur...

A national debate has played out over mass surveillance by the National Security Agency. [Meanwhile], a new generation of technology ... has given local law enforcement officers unprecedented power to peer into the lives of citizens. The powerful systems also have become flash points for civil libertarians and activists. “This is something that’s been building since September 11,” said Jennifer Lynch, a senior staff attorney at the Electronic Frontier Foundation. “First funding went to the military to develop this technology, and now it has come back to domestic law enforcement. It’s the perfect storm of cheaper and easier-to-use technologies and money from state and federal governments to purchase it.” But perhaps the most controversial and revealing technology is the threat-scoring software Beware. As officers respond to calls, Beware automatically runs the address. The searches return the names of residents and scans them ... to generate a color-coded threat level for each person or address: green, yellow or red. Exactly how Beware calculates threat scores is something that its maker, Intrado, considers a trade secret, so ... only Intrado - not the police or the public - knows how Beware tallies its scores. The system might mistakenly increase someone’s threat level by misinterpreting innocuous activity on social media, like criticizing the police, and trigger a heavier response by officers.

Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


U.S. government reveals breadth of requests for Internet records
2015-11-30, Sun Times/Reuters
http://national.suntimes.com/national-world-news/7/72/2208406/u-s-government-...

The Federal Bureau of Investigation has used a secretive authority to compel Internet and telecommunications firms to hand over customer data including an individual’s complete web browsing history and records of all online purchases, a court filing released Monday shows. The documents are believed to be the first time the government has provided details of its so-called national security letters, which are used by the FBI to conduct electronic surveillance without the need for court approval. National security letters have been available as a law enforcement tool since the 1970s, but their frequency and breadth expanded dramatically under the USA Patriot Act, which was passed shortly after the Sept. 11, 2001 attacks. They are almost always accompanied by an open-ended gag order barring companies from disclosing the contents of the demand for customer data. The secretive orders have long drawn the ire of tech companies and privacy advocates, who argue NSLs allow the government to snoop on user content without appropriate judicial oversight. Last year, the Obama administration announced it would permit Internet companies to disclose more about the number of NSLs they receive. But they can still only provide a range such as between 0 and 999 requests. Twitter has sued in federal court seeking the ability to publish more details in its semi-annual transparency reports. Several thousand NSLs are now issued by the FBI every year. At one point that number eclipsed 50,000 letters annually.

Note: Read more about the FBI's use of these controversial secret letters. For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.


Security Experts Oppose Government Access to Encrypted Communication
2015-07-07, New York Times
http://www.nytimes.com/2015/07/08/technology/code-specialists-oppose-us-and-b...

An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger. With security breaches and awareness of nation-state surveillance at a record high and data moving online at breakneck speeds, encryption has emerged as a major issue in the debate over privacy rights. Technology companies ... have been moving to encrypt more of their corporate and customer data after learning that the National Security Agency and its counterparts were siphoning off digital communications and hacking into corporate data centers. In Britain, Prime Minister David Cameron threatened to ban encrypted messages altogether. In the United States, Michael S. Rogers, the director of the N.S.A., proposed that technology companies be required to create a digital key to unlock encrypted data. The [technology group's] new paper is the first in-depth technical analysis of government proposals by leading cryptographers and security thinkers. In the report, the group said any effort to give the government “exceptional access” to encrypted communications ... would leave confidential data and critical infrastructure like banks and the power grid at risk. With government agency breaches now the norm, the security specialists said authorities could not be trusted to keep such keys safe from hackers and criminals.

Note: For more along these lines, see concise summaries of deeply revealing news articles about corrupt intelligence agencies that erode privacy rights in the U.S. and elsewhere


How the NSA Started Investigating the New York Times' Warrantless Wiretapping Story
2015-06-27, The Intercept
https://firstlook.org/theintercept/2015/06/26/nsa-started-investigating-new-y...

Three days after the New York Times revealed that the U.S. government was secretly monitoring the calls and emails of people inside the United States without court-approved warrants, the National Security Agency issued a top-secret assessment of the damage done to intelligence efforts by the story. The conclusion: the information could lead terrorists to try to evade detection. Yet the agency gave no specific examples of investigations that had been jeopardized. The December 2005 bombshell story, by James Risen and Eric Lichtblau, set off a debate about the George W. Bush administration's expansion of spying powers after the 9/11 attacks, and also about the Times editors' decision to delay its publication for a year. White House officials had warned the Times that revealing the program would have grave consequences for national security. "To this day we've never seen any evidence – despite all the claims they made to keep us from publishing – that it did any tangible damage to national security, " Lichtblau told The Intercept. "The reality was that the story ... didn't tell terrorists anything that they didn't know," he said. The NSA's damage assessment on the article ... is among the files provided by former NSA contractor Edward Snowden. The memo recounts meetings in 2004 and 2005 in which administration officials disclosed "certain details of the special program to select individuals from the New York Times to dissuade them from publishing a story on the program at that time."

Note: You can read the revealing memo mentioned at the link above. For more along these lines, see concise summaries of deeply revealing news articles on civil liberties from reliable major media sources. Then explore the excellent, reliable resources provided in our Media Information Center.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"