Privacy News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
A federal judge in Newark has thrown out a lawsuit against the New York Police Department for spying on New Jersey Muslims, saying if anyone was at fault, it was the Associated Press for telling people about it. In his ruling ... U.S. District Court Judge William J. Martini simultaneously demonstrated the willingness of the judiciary to give law enforcement alarming latitude in the name of fighting terror, greenlighted the targeting of Muslims based solely on their religious beliefs, and blamed the media for upsetting people by telling them what their government was doing. The NYPD’s clandestine spying on daily life in Muslim communities in the region — with no probable cause, and nothing to show for it — was exposed in a Pulitzer-Prize winning series of stories by the AP. The stories described infiltration and surveillance of at least 20 mosques, 14 restaurants, 11 retail stores, two grade schools, and two Muslim student associations in New Jersey alone. In a cursory, 10-page ruling issued before even hearing oral arguments, Martini essentially said that what the targets didn’t know didn’t hurt them: "None of the Plaintiffs’ injuries arose until after the Associated Press released unredacted, confidential NYPD documents and articles expressing its own interpretation of those documents. Nowhere in the Complaint do Plaintiffs allege that they suffered harm prior to the unauthorized release of the documents by the Associated Press. This confirms that Plaintiffs’ alleged injuries flow from the Associated Press’s unauthorized disclosure of the documents. The harms are not “fairly traceable” to any act of surveillance."
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
National Security Agency leaker Edward Snowden wrote in a lengthy “open letter to the people of Brazil” that he has been inspired by the global debate ignited by his release of thousands of documents and that the NSA’s culture of indiscriminate global espionage “is collapsing.” In the letter, Snowden commended the Brazilian government for its strong stand against U.S. spying. He wrote that he would be willing to help the South American nation investigate NSA spying on its soil but could not fully participate in doing so without being granted political asylum, because the U.S. “government will continue to interfere with my ability to speak.” The documents revealed that Brazil is the top NSA target in Latin America, in spying that has included the monitoring of Brazilian President Dilma Rousseff’s cellphone and hacking into the internal network of the state-run oil company Petrobras. In his letter, Snowden dismissed U.S. explanations to the Brazilian government and others that the bulk metadata gathered on billions of e-mails and calls was more “data collection” than surveillance. “There is a huge difference between legal programs, legitimate spying ... and these programs of dragnet mass surveillance that put entire populations under an all-seeing eye and save copies forever,” he wrote. “These programs were never about terrorism: they’re about economic spying, social control, and diplomatic manipulation. They’re about power.” Brazilian senators have asked for Snowden’s help during hearings about the NSA’s targeting of Brazil, an important transit hub for transatlantic fiber-optic cables that are hacked.
Note: To read Snowden's full, inspiring letter, click here.
A participant in a White House-sponsored review of surveillance activities described as “shameful” an apparent decision to leave most of the National Security Agency’s controversial bulk spying intact. Sascha Meinrath, director of the Open Technology Institute, said [on December 13] that ... “The review group was searching for ways to make the most modest pivot necessary to continue business as usual.” Should the review group’s report resemble descriptions that leaked ... the report “does nothing to alter the lack of trust the global populace has for what the US is doing, and nothing to restore our reputation as an ethical internet steward,” said Meinrath, who met with the advisory panel and White House officials twice to discuss the bulk surveillance programs that have sparked international outrage. Leaks about the review group’s expected recommendations to the New York Times and Wall Street Journal strengthened Meinrath and other participants’ long-standing suspicions that much of the NSA’s sweeping spy powers would survive. The Times quoted an anonymous official familiar with the group saying its report “says we can’t dismantle these programs, but we need to change the way almost all of them operate”. According to the leaks, the review group will recommend that bulk collection of every American’s phone call data continue, possibly by the phone companies instead of the NSA, with tighter restrictions than the “reasonable, articulable suspicion” standard for searching through them that the NSA currently employs.
Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency isn't the only government entity secretly collecting data from people's cellphones. Local police are increasingly scooping it up, too. Armed with new technologies, including mobile devices that tap into cellphone data in real time, dozens of local and state police agencies are capturing information about thousands of cellphone users at a time, whether they are targets of an investigation or not. The records, from more than 125 police agencies in 33 states, reveal [that] about one in four law-enforcement agencies have used a tactic known as a "tower dump," which gives police data about the identity, activity and location of any phone that connects to the targeted cellphone towers over a set span of time, usually an hour or two. A typical dump covers multiple towers, and wireless providers, and can net information from thousands of phones. At least 25 police departments own a Stingray, a suitcase-size device that costs as much as $400,000 and acts as a fake cell tower. The system, typically installed in a vehicle so it can be moved into any neighborhood, tricks all nearby phones into connecting to it and feeding data to police. In some states, the devices are available to any local police department via state surveillance units. Organizations such as the American Civil Liberties Union and Electronic Privacy Information Center say the swelling ability by even small-town police departments to easily and quickly obtain large amounts of cellphone data raises questions about the erosion of people's privacy as well as their Fourth Amendment protections against unreasonable search and seizure.
Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.
Canada allowed the U.S. National Security Agency (NSA) to conduct widespread surveillance during the 2010 Group of 20 summit in Toronto, according to a media report that cited documents from former NSA contractor Edward Snowden. The report by the Canadian Broadcasting Corp ... cited briefing notes it said showed the United States turned its Ottawa embassy into a security command post during a six-day spying operation by the top-secret U.S. agency as President Barack Obama and other world leaders met that June. One of the bylines on the CBC report was Glenn Greenwald, the U.S. journalist who has worked with Snowden on several other NSA stories. CBC ... quoted an NSA briefing note describing the operation as "closely coordinated with the Canadian partner". The Canadian equivalent of the NSA is the Communications Security Establishment Canada, or CSEC. CBC said the documents did not reveal the targets of the NSA operation, but described part of the U.S. eavesdropping agency's mandate at the Toronto summit as "providing support to policymakers". CSEC, which has a very low public profile, employs about 2,000 people. It is part of the so-called Five Eyes intelligence-sharing network that also includes the United States, Britain, New Zealand and Australia. Last month, Brazil angrily demanded an explanation for media reports which said CSEC agents had targeted its mines and energy industry.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
The phone, internet and email records of UK citizens not suspected of any wrongdoing have been analysed and stored by America's National Security Agency under a secret deal that was approved by British intelligence officials, according to documents from the whistleblower Edward Snowden. In the first explicit confirmation that UK citizens have been caught up in US mass surveillance programs, an NSA memo describes how in 2007 an agreement was reached that allowed the agency to "unmask" and hold on to personal data about Britons that had previously been off limits. The memo ... says the material is being put in databases where it can be made available to other members of the US intelligence and military community. Until now, it had been generally understood that the citizens of each country were protected from surveillance by any of the others. But the Snowden material reveals that: • In 2007, the rules were changed to allow the NSA to analyse and retain any British citizens' mobile phone and fax numbers, emails and IP addresses swept up by its dragnet. • These communications were "incidentally collected" by the NSA, meaning the individuals were not the initial targets of surveillance operations and therefore were not suspected of wrongdoing. • The NSA has been using the UK data to conduct so-called "pattern of life" or "contact-chaining" analyses, under which the agency can look up to three "hops" away from a target of interest – examining the communications of a friend of a friend of a friend. Three hops for a typical Facebook user could pull the data of more than 5 million people into the dragnet.
Note: For more on government threats to privacy, see the deeply revealing reports from reliable major media sources available here.
A secret court order that authorised a massive trawl by the National Security Agency of Americans' email and internet data was published for the first time on [November 18], among a trove of documents that also revealed a judge's concern that the NSA "continuously" and "systematically" violated the limits placed on the program. Another later court order found that what it called "systemic overcollection" had taken place. In a heavily redacted opinion Colleen Kollar-Kotelly, the former presiding judge of the FISA court, placed legal weight on the methods of surveillance employed by the NSA, which had never before collected the internet data of “an enormous volume of communications”. The methods, known as pen registers and trap-and-trace devices, record the incoming and outgoing routing information of communications. Kollar-Kotelly ruled that acquiring the metadata, and not the content, of email and internet usage in bulk was harmonious with the “purpose” of Congress and prior court rulings – even though no surveillance statute ever authorized it and top officials at the Justice Department and the FBI threatened to resign in 2004 over what they considered its dubious legality. The type of data collected under the program included information on the "to", "from" and "bcc" lines of an email rather than the content. Metadata, wrote Kollar-Kotelly, enjoyed no protection under the fourth amendment to the US constitution, a precedent established by the Supreme Court in 1979 in a single case on which the NSA relies currently.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
Edward J. Snowden, the former National Security Agency contractor, said in an extensive interview this month that he did not take any secret N.S.A. documents with him to Russia when he fled there in June, assuring that Russian intelligence officials could not get access to them. He also asserted that he was able to protect the documents from China’s spies because he was familiar with that nation’s intelligence abilities, saying that as an N.S.A. contractor he had targeted Chinese operations and had taught a course on Chinese cybercounterintelligence. “There’s a zero percent chance the Russians or Chinese have received any documents,” he said. Mr. Snowden added that inside the spy agency “there’s a lot of dissent.” But he said that people were kept in line through “fear and a false image of patriotism,” which he described as “obedience to authority.” He said he believed that if he tried to question the N.S.A.’s surveillance operations as an insider, his efforts “would have been buried forever,” and he would “have been discredited and ruined.” Mr. Snowden said he finally decided to act when he discovered a copy of a classified 2009 inspector general’s report on the N.S.A.’s warrantless wiretapping program during the Bush administration. After reading about the program, which skirted the existing surveillance laws, he concluded that it had been illegal, he said. “If the highest officials in government can break the law without fearing punishment or even any repercussions at all,” he said, “secret powers become tremendously dangerous.”
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials. The spy agency began allowing the analysis of phone call and e-mail logs in November 2010 to examine Americans’ networks of associations for foreign intelligence purposes after N.S.A. officials lifted restrictions on the practice, according to documents provided by Edward J. Snowden, the former N.S.A. contractor. The agency was authorized to conduct “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every e-mail address, phone number or other identifier, the document said. The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners. Almost everything about the agency’s operations is hidden, and the decision to revise the limits concerning Americans was made in secret, without review by the nation’s intelligence court or any public debate.
Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
Guardian editors on [August 20] revealed why and how the newspaper destroyed computer hard drives containing copies of some of the secret files leaked by Edward Snowden. The decision was taken after a threat of legal action by the government that could have stopped reporting on the extent of American and British government surveillance revealed by the documents. It resulted in one of the stranger episodes in the history of digital-age journalism. On Saturday 20 July, in a deserted basement of the Guardian's King's Cross offices, a senior editor and a Guardian computer expert used angle grinders and other tools to pulverise the hard drives and memory chips on which the encrypted files had been stored. As they worked they were watched by technicians from Government Communications Headquarters (GCHQ) who took notes and photographs, but who left empty-handed. The editor of the Guardian, Alan Rusbridger, had earlier informed government officials that other copies of the files existed outside the country and that the Guardian was neither the sole recipient nor steward of the files leaked by Snowden, a former National Security Agency (NSA) contractor. But the government insisted that the material be either destroyed or surrendered. The British government has attempted to step up its pressure on journalists, with the detention in Heathrow on Sunday of David Miranda, the partner of Glenn Greenwald, who has led the Guardian's US reporting on the files.
Note: For more on government attacks on civil liberties, see the deeply revealing reports from reliable major media sources available here.
The partner of the Guardian journalist [Glenn Greenwald], who has written a series of stories revealing mass surveillance programmes by the US National Security Agency, was held for almost nine hours ... by UK authorities as he passed through London's Heathrow airport on his way home to Rio de Janeiro. David Miranda ... was returning from a trip to Berlin when he was stopped by officers at 8.05am and informed that he was to be questioned under schedule 7 of the Terrorism Act 2000. The controversial law, which applies only at airports, ports and border areas, allows officers to stop, search, question and detain individuals. The 28-year-old was held for nine hours, the maximum the law allows before officers must release or formally arrest the individual. According to official figures, most examinations under schedule 7 – over 97% – last less than an hour, and only one in 2,000 people detained are kept for more than six hours. Miranda was released, but officials confiscated electronics equipment including his mobile phone, laptop, camera, memory sticks, DVDs and games consoles. "This is a profound attack on press freedoms and the news gathering process," Greenwald said. "To detain my partner for a full nine hours while denying him a lawyer, and then seize large amounts of his possessions, is clearly intended to send a message of intimidation to those of us who have been reporting on the NSA and GCHQ. The actions of the UK pose a serious threat to journalists everywhere. But the last thing it will do is intimidate or deter us in any way from doing our job as journalists. Quite the contrary: it will only embolden us more to continue to report aggressively."
Note: For more on government attacks on civil liberties, see the deeply revealing reports from reliable major media sources available here.
Two US senators on the intelligence committee said [that] thousands of annual violations by the National Security Agency on its own restrictions were "the tip of the iceberg." "The executive branch has now confirmed that the rules, regulations and court-imposed standards for protecting the privacy of Americans' have been violated thousands of times each year," said senators Ron Wyden and Mark Udall, two leading critics of bulk surveillance, who responded [to] a Washington Post story based on documents provided by whistleblower Edward Snowden. "We have previously said that the violations of these laws and rules were more serious than had been acknowledged, and we believe Americans should know that this confirmation is just the tip of a larger iceberg." On July 31, Wyden, backed by Udall, vaguely warned other senators in a floor speech that the NSA and the director of national intelligence were substantively misleading legislators by describing improperly collected data as a matter of innocent and anodyne human or technical errors. In keeping with their typically cautious pattern when discussing classified information, Wyden and Udall did not provide details about their claimed "iceberg" of surveillance malfeasance. But they hinted that the public still lacks an adequate understanding of the NSA's powers to collect data on Americans under its controversial interpretation of the Patriot Act. "We believe the public deserves to know more about the violations of the secret court orders that have authorized the bulk collection of Americans' phone and email records under the Patriot Act," [they] said.
Note: For more on massive surveillance, see the deeply revealing reports from reliable major media sources available here.
A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans. Documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin—not only from defense lawyers but also sometimes from prosecutors and judges. The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence—information that could reveal entrapment, mistakes or biased witnesses. "I have never heard of anything like this at all," said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers. "It is one thing to create special rules for national security," Gertner said. "Ordinary crime is entirely different. It sounds like they are phonying up investigations."
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
Glenn Greenwald – the reporter who broke the story about the National Security Agency’s surveillance programs – claimed that those NSA programs allowed even low-level analysts to search the private emails and phone calls of Americans. “The NSA has trillions of telephone calls and emails in their databases that they’ve collected over the last several years,” Greenwald told ABC News’ George Stephanopoulos. “All an analyst has to do is enter an email address or an IP address, and [the program] searches that database and lets them listen to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you’ve entered.” Greenwald explained that ... these programs still allow analysts to search through data with little court approval or supervision. Greenwald said "these systems allow analysts to listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it’s all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst,” he added. Greenwald said the existence of these analyst search programs are in line with the claims of Edward Snowden, who first leaked details of the NSA’s surveillance programs last month. “It’s an incredibly powerful and invasive tool, exactly of the type that Mr. Snowden described,” Greenwald said. “NSA officials are going to be testifying before the Senate on Wednesday, and I defy them to deny that these programs work exactly as I just said,” Greenwald said.
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
As the 50th anniversary of the 1963 March on Washington approaches ... where Martin Luther King Jr gave his famous "I have a dream" speech, it is important to recall the extent to which King was targeted by the government. The FBI operation against King is one of the most shameful episodes in the long history of our government's persecution of dissenters. In a heavily redacted, classified FBI memo dated 4 January 1956 – just a little more than a month after Rosa Parks was arrested for refusing to give up her seat on a bus to a white passenger – stated that an agent "had been assigned ... to find out all he could about Reverend Martin L King, colored minister in Montgomery and leader in the bus boycott … to uncover all the derogatory information he could about King." [FBI] director, J Edgar Hoover ... was deploying the vast resources he controlled against any and all perceived critics of the United States. The far-reaching clandestine surveillance, infiltration and disruption operation Hoover ran was dubbed "COINTELPRO", for counterintelligence program. The FBI's COINTELPRO activities ... were thoroughly investigated in 1975 by the Church Committee, [which] reported that the FBI "conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of first amendment rights of speech and association." Among COINTELPRO's perverse activities was an FBI effort to threaten Martin Luther King Jr with exposure of an alleged extramarital affair, including the suggestion, made by the FBI to King, that he avoid embarrassment by killing himself. Deeply concerned about the crackdown on dissent happening under Obama, scholar Cornel West ... wondered if [King] "would not be invited to the very march in his name."
Note: This article fails to mention a key fact. At a 1999 court trial held in Memphis, the family of Rev. King accused elements of the U.S. government of complicity in King's death. After one month of hearings from 70 witnesses, a jury composed of six white and six black jurors took only one hour to find the U.S. government, the state of Tennessee, the city of Memphis, the Memphis police, and several individuals guilty of murdering King. Yet the mainstream media completely boycotted this trial. Thankfully, CBC (Canada's PBS) gave it some coverage. To see a six-minute CBC clip of this highly revealing trial, click here.
[There is] a growing debate over a little-known but increasingly important piece of equipment buried deep inside a car: the event data recorder, more commonly known as the black box. About 96 percent of all new vehicles sold in the United States have the boxes, and in September 2014, if the National Highway Traffic Safety Administration has its way, all will have them. Data stored in the devices is increasingly being used to identify safety problems in cars and as evidence in traffic accidents and criminal cases. And the trove of data inside the boxes has raised privacy concerns, including questions about who owns the information, and what it can be used for, even as critics have raised questions about its reliability. To consumer advocates, the data is only the latest example of governments and companies having too much access to private information. Once gathered, they say, the data can be used against car owners, to find fault in accidents or in criminal investigations. “These cars are equipped with computers that collect massive amounts of data,” said Khaliah Barnes of the Electronic Privacy Information Center, a Washington-based consumer group. “Without protections, it can lead to all kinds of abuse.” In [14] states, lawyers may subpoena the data for criminal investigations and civil lawsuits, making the information accessible to third parties, including law enforcement or insurance companies that could cancel a driver’s policy or raise a driver’s premium based on the recorder’s data.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
The American Civil Liberties Union is warning that law enforcement officials are using license plate scanners to amass massive and unregulated databases that can be used to track law-abiding citizens as their go about their daily lives. In a new report, "You Are Being Tracked: How License Plate Readers Are Being Used to Record Americans' Movements," the ACLU discusses the data culled from license plate scanners - cameras mounted on patrol cars, overpasses and elsewhere to record your license plate number and location at a given time. There are tens of thousands such cameras now in operation, according to the group, with the data in some cases being stored indefinitely. The ACLU report is the result of an analysis of 26,000 pages of documents from police departments around the country, obtained through nearly 600 [FOIA] requests. It finds that while some jurisdictions keep the information gleaned from the scanners for a short time ... many hold onto the data for years. The organization complains that there are "virtually no rules in place" to keep officials from tracking "everybody all the time." The ACLU also warns that the data is being fed into larger databases, with the private National Vehicle Location Service now holding more than 800 million license plate records. The group's database is used by more than 2,200 law enforcement customers. The [ACLU] report warns that the data can be used in an official capacity to spy on protesters or target communities based on their religious beliefs, or unofficially by a police officer who wants to keep an eye on a romantic rival.
Note: For more on privacy, see the deeply revealing reports from reliable major media sources available here.
Have you noticed anything missing in the political discourse about the National Security Administration's unprecedented mass surveillance? There's at least been some conversation about the intelligence community's potential criminality and constitutional violations. But there have only been veiled references to how cash undoubtedly tilts the debate against those who challenge the national security state. Those indirect references have come in stories about Booz Allen Hamilton, the security contractor that employed Edward Snowden. CNN/Money notes that 99 percent of the firm's multibillion-dollar annual revenues now come from the federal government. Those revenues are part of a larger and growing economic sector within the military-industrial complex - a sector that, according to author Tim Shorrock, is "a $56 billion-a-year industry." Yet few in the Washington press corps mention that politicians' attacks on surveillance critics may have nothing to do with principle and everything to do with shilling for campaign donors. For a taste of what that kind of institutionalized corruption looks like, peruse the Influence Explorer site to see how much Booz Allen Hamilton and its parent company, the Carlyle Group, spend. As you'll see, from Barack Obama to John McCain, many of the politicians publicly defending the surveillance state have taken huge sums of money from the firms. Simply put, there are corporate forces with a vested financial interest in making sure the debate over security is tilted toward the surveillance state and against critics of that surveillance state.
Note: Tim Shorrock, quoted above, is the author of Spies for Hire: The Secret World of Intelligence Outsourcing.
FBI Director Robert Mueller acknowledged [to the Senate Judiciary Committee on June 19 that] the law enforcement agency uses drone aircraft in the United States for surveillance. He did not say how many unmanned surveillance vehicles (UAVs) the FBI has or how often they have been used. But a law enforcement official told CNN the FBI has used them a little more than a dozen times but did not say when that started. The official said drones are useful in hostage and barricade situations because they operate more quietly and are less visible than traditional aircraft such as helicopters. Bureau spokesman Paul Bresson said their use allows "us to learn critical information that otherwise would be difficult to obtain without introducing serious risk to law enforcement personnel." Bresson said the aircraft can only be used to perform surveillance on stationary subjects and the FBI must first get approval from the Federal Aviation Administration to fly in a "very confined geographic area." Senate Intelligence Committee Chairman Dianne Feinstein expressed concern over drone use domestically. "I think the greatest threat to the privacy of Americans is the drone and the use of the drone, and the very few regulations that are on it today and the booming industry of commercial drones," the California Democrat said. The FAA forecasts some 10,000 civilian drones will be in use in the United States within five years, including those for law enforcement and commercial purposes.
Note: For more on domestic US drone surveillance, click here. For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.