Please donate here to support this vital work.
Revealing News For a Better World

Privacy News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


Bush Signs Law to Widen Legal Reach for Wiretapping
2007-08-06, New York Times
http://www.nytimes.com/2007/08/06/washington/06nsa.html?ex=1344052800&en=5e75...

President Bush signed into law ... legislation that broadly [expands] the government’s authority to eavesdrop on the international telephone calls and e-mail messages of American citizens without warrants. The law [goes] far beyond the small fixes that administration officials had said were needed to gather information about foreign terrorists [and will] sharply alter the legal limits on the government’s ability to monitor millions of phone calls and e-mail messages going in and out of the United States. The new law for the first time [provides] a legal framework for much of the surveillance without warrants that was being conducted in secret by the National Security Agency and outside the Foreign Intelligence Surveillance Act, the 1978 law that is supposed to regulate the way the government can listen to the private communications of American citizens. “This more or less legalizes the N.S.A. program,” said Kate Martin, director of the Center for National Security Studies in Washington. Previously, the government needed search warrants approved by a special intelligence court to eavesdrop on ... electronic communications between individuals inside the United States and people overseas. The new law gives the attorney general and the director of national intelligence the power to approve the international surveillance, rather than the special intelligence court. The law also gave the administration greater power to force telecommunications companies to cooperate with such spying operations. The companies can now be compelled to cooperate by orders from the attorney general and the director of national intelligence.


In Intelligence World, A Mute Watchdog
2007-07-15, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/07/14/AR20070714008...

An independent oversight board created to identify intelligence abuses after the CIA scandals of the 1970s did not send any reports to the attorney general of legal violations during the first 5 1/2 years of the Bush administration's counterterrorism effort, the Justice Department has told Congress. The President's Intelligence Oversight Board -- the principal civilian watchdog of the intelligence community -- is obligated under a 26-year-old executive order to tell the attorney general and the president about any intelligence activities it believes "may be unlawful." The board was vacant for the first two years of the Bush administration. The board's mandate is to provide independent oversight, so the absence of such communications has prompted critics to question whether the board was doing its job. "It's now apparent that the IOB was not actively employed in the early part of the administration. And it was a crucial period when its counsel would seem to have been needed the most," said Anthony Harrington, who served as the board's chairman for most of the Clinton administration. Senate Judiciary Committee chairman Patrick J. Leahy (D-Vt.) added: "It is deeply disturbing that this administration seems to spend so much of its energy and resources trying to find ways to ignore any check and balance on its authority and avoid accountability to Congress and the American public."


Police Log Confirms FBI Role In Arrests
2007-04-03, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/04/02/AR20070402015...

A secret FBI intelligence unit helped detain a group of war protesters in a downtown Washington parking garage in April 2002 and interrogated some of them on videotape about their political and religious beliefs. [Washington] D.C. police said authorities only recently found the logs of police responses to that day's events. That discovery came after three years of police assurances in federal court that no such records or logs existed showing the FBI's role. The FBI and D.C. police said they had no records of such an incident. And police told a federal court that no FBI agents were present when officers arrested more than 20 protesters that afternoon for trespassing; police viewed them as suspicious for milling around the parking garage entrance. Similar intelligence-gathering operations have been reported in New York, where a local police intelligence unit tried to infiltrate groups planning to protest at the Republican National Convention in 2004, and in Colorado, where records surfaced showing that the FBI collected names and license plates of people protesting timber industry practices at a 2002 industry convention.


Gonzales says the Constitution doesn't guarantee habeas corpus
2007-01-24, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2007/01/24/MNGDONO11O1.DTL

One of the Bush administration's most far-reaching assertions of government power was revealed quietly last week when Attorney General Alberto Gonzales testified that habeas corpus -- the right to go to federal court and challenge one's imprisonment -- is not protected by the Constitution. "The Constitution doesn't say every individual in the United States or every citizen is hereby granted or assured the right of habeas," Gonzales told Sen. Arlen Specter, R-Pa., during a Senate Judiciary Committee hearing Jan. 17. Gonzales acknowledged that the Constitution declares "habeas corpus shall not be suspended unless ... in cases of rebellion or invasion the public safety may require it." But he insisted that "there is no express grant of habeas in the Constitution." Specter was incredulous, asking how the Constitution could bar the suspension of a right that didn't exist -- a right, he noted, that was first recognized in medieval England as a shield against the king's power to dispatch troublesome subjects to royal dungeons. Later in the hearing, Gonzales described habeas corpus as "one of our most cherished rights'' and noted that Congress had protected that right in the 1789 law that established the federal court system. But he never budged from his position on the absence of constitutional protection -- a position that seemingly would leave Congress free to reduce habeas corpus rights or repeal them altogether.


Bush Claims Right to Open Mail
2007-01-04, Washington Post
http://www.washingtonpost.com/wp-dyn/content/blog/2007/01/04/BL2007010400803....

The New York Daily News today reports on a signing statement President Bush quietly issued two weeks ago, in which he asserts his right to open mail without a warrant. Signing statements have historically been used by presidents mostly to explain how they intend to enforce the laws passed by Congress; Bush has used them to quietly assert his right to ignore those laws. The President asserted his new authority when he signed a postal reform bill into law on Dec. 20. Bush then issued a 'signing statement' that declared his right to open people's mail under emergency conditions. That claim is contrary to existing law and contradicted the bill he had just signed, say experts who have reviewed it. The Postal Accountability and Enhancement Act ... explicitly reinforced protections of first-class mail from searches without a court's approval. Here is the signing statement in question. Here is information on the bill in question. Are these signing statements just a bunch of ideological bluster from overenthusiastic White House lawyers -- or are they actually emboldening administration officials to flout the laws passed by Congress? If the latter, Bush's unprecedented use of these statements constitutes a genuine Constitutional crisis.


US group implants electronic tags in workers
2006-02-13, MSNBC/Financial Times
http://msnbc.msn.com/id/11314766/

An Ohio company has embedded silicon chips in two of its employees - the first known case in which US workers have been "tagged" electronically as a way of identifying them. A private video surveillance company said it was testing the technology as a way of controlling access to a room where it holds security video footage for government agencies and the police. Embedding slivers of silicon in workers is likely to add to the controversy over RFID technology, widely seen as one of the next big growth industries. RFID chips – inexpensive radio transmitters that give off a unique identifying signal – have been implanted in pets or attached to goods so they can be tracked in transit. "There are very serious privacy and civil liberty issues of having people permanently numbered," said Liz McIntyre, who campaigns against the use of identification technology. "There's nothing pulsing or sending out a signal," said Mr Darks, who has had a chip in his own arm. "It's not a GPS chip. My wife can't tell where I am." The technology's defenders say it is acceptable as long as it is not compulsory. But critics say any implanted device could be used to track the "wearer" without their knowledge.


NSA Whistleblower Alleges Illegal Spying
2006-01-10, ABC News
http://abcnews.go.com/WNT/Investigation/story?id=1491889

Russell Tice, a longtime insider at the National Security Agency, is now a whistleblower the agency would like to keep quiet. For 20 years, Tice worked in the shadows. "I specialized in what's called special access programs," Tice said of his job. "We called them 'black world' programs and operations." Some of those secret "black world" operations run by the NSA were operated in ways that he believes violated the law. He is prepared to tell Congress all he knows. Tice says the technology exists to track and sort through every domestic and international phone call...and to search for key words or phrases that a terrorist might use. Tice...says the number of Americans subject to eavesdropping by the NSA could be in the millions if the full range of secret NSA programs is used. "For most Americans [who] placed an overseas communication, more than likely they were sucked into that vacuum." He told ABC News that he was a source for the [New York] Times. But Tice maintains that his conscience is clear. "We need to clean up the intelligence community. We've had abuses, and they need to be addressed." The NSA revoked Tice's security clearance in May of last year based on what it called psychological concerns and later dismissed him. Tice calls that bunk and says that's the way the NSA deals with troublemakers and whistleblowers.


Passports go electronic with new microchip
2004-12-09, Christian Science Monitor
http://www.csmonitor.com/2004/1209/p12s01-stct.html

The US passport is about to go electronic, with a tiny microchip embedded in its cover. The chip is the latest outpost in the battle to outwit tamperers. But it's also one that worries privacy advocates. The RFID (radio frequency identification) chip in each passport will contain the same personal data as now appear on the inside pages - name, date of birth, place of birth, issuing office - and a digitized version of the photo. But the 64K chip will be read remotely. And there's the rub. The scenario, privacy advocates say, could be as simple as you standing in line with your passport as someone walks by innocuously carrying a briefcase. Inside that case, a microchip reader could be skimming data from your passport to be used for identity theft. Or maybe authorities or terrorists want to see who's gathered in a crowd and surreptitiously survey your ID and track you. Why not choose a contact chip, where there would be no possibility of skimming, asks Barry Steinhardt, director of the ACLU's Technology and Liberty Project. "There was another way to go, which was to put an electronic strip in the passport that would require contact." The State Department says it's just following international standards set by the International Civil Aviation Organization (ICAO), under the umbrella of the United Nations. The ICAO specified the RFID ... at the behest of the United States. All countries that are part of the US visa-waiver program must use the new passports by Oct. 26, 2005. Mr. Steinhardt ... says the US pushed through the standards against the reservations of the Europeans. "Bush says at the G8 meeting, 'We have to adhere to the global standard,' as though we had nothing to do with it," he says in exasperation.

Note: If the above link fails, click here. For more on the risk of RFID chips, click here.


A Real Chip On Your Shoulder
2003-07-17, CBS News/Associated Press
http://www.cbsnews.com/stories/2003/07/17/tech/main563819.shtml

A U.S. company launched Thursday in Mexico the sale of microchips that can be implanted under a person's skin and used to confirm everything from health history to identity. The microchips ... went on sale last year in the United States. The microchip, the size of a grain of rice, is implanted in the arm or hip and can contain information on everything from a person's blood type to their name. In a two-hour presentation, Palm Beach, Florida-based Applied Digital Solutions Inc. introduced reporters to the VeriChip and used a syringe-like device and local anesthetic to implant a sample in the right arm of employee Carlos Altamirano. “It doesn't hurt at all,” he said. “The whole process is just painless.” Antonio Aceves, the director of the Mexican company charged with distributing the chip here, said that in the first year of sales, the company hoped to implant chips in 10,000 people and ensure that at least 70 percent of all hospitals had the technology to read the devices. One chip costs $150 and has a $50 annual fee. Users can update and manage their chips' information by calling a 24-hour customer service line. The VeriChip can track subjects who are within 5 miles, but officials want to develop a new chip that can use satellite technology to track people who are farther away and may have been kidnapped. While the idea of using the chip to track people has raised privacy concerns in the United States, the idea has been popular with Mexicans. The company hopes to have the new anti-kidnapping chip developed by 2003.


Apple Just Killed The 'GrayKey' iPhone Passcode Hack
2018-10-24, Forbes
https://www.forbes.com/sites/thomasbrewster/2018/10/24/apple-just-killed-the-...

Apple has managed to prevent the hottest iPhone hacking company in the world from doing its thing. In March, Atlanta-based Grayshift promised governments its GrayKey tech could crack the passcodes of the latest iOS models, right up to the iPhone X. From then on, Apple continued to invest in security in earnest, continually putting up barriers for Grayshift to jump over. Grayshift continued to grow, however, securing contracts with Immigration and Customs Enforcement, and the Secret Service. Now, though, Apple has put up what may be an insurmountable wall. Multiple sources familiar with the GrayKey tech tell Forbes the device can no longer break the passcodes of any iPhone running iOS 12 or above. On those devices, GrayKey can only do what’s called a “partial extraction,” sources from the forensic community said. That means police using the tool can only draw out unencrypted files and some metadata, such as file sizes and folder structures. Previously, GrayKey used “brute forcing” techniques to guess passcodes and had found a way to get around Apple’s protections preventing such repeat guesses. But no more. Though it’s clear Apple has locked GrayShift out, no one actually knows just how the iPhone maker has done it. Vladimir Katalov, chief of forensic tech provider Elcomsoft, has repeatedly uncovered weaknesses in Apple technology. But he was stumped too.

Note: For more along these lines, see concise summaries of deeply revealing privacy news articles from reliable major media sources.


New Evidence of Hacked Supermicro Hardware Found in U.S. Telecom
2018-10-09, Bloomberg
https://www.bloomberg.com/news/articles/2018-10-09/new-evidence-of-hacked-sup...

A major U.S. telecommunications company discovered manipulated hardware from Super Micro Computer Inc. in its network and removed it in August, fresh evidence of tampering in China of critical technology components bound for the U.S., according to a security expert working for the telecom company. The security expert, Yossi Appleboum, provided ... evidence of the discovery following the publication of an investigative report in Bloomberg Businessweek that detailed how China’s intelligence services had ordered subcontractors to plant malicious chips in Supermicro server motherboards over a two-year period ending in 2015. [Appleboum’s company] was hired to scan several large data centers belonging to the telecommunications company. Unusual communications from a Supermicro server and a subsequent physical inspection revealed an implant built into the server’s Ethernet connector. The executive said he has seen similar manipulations of different vendors' computer hardware made by contractors in China, not just products from Supermicro. “Supermicro is a victim - so is everyone else,” he said. There are countless points in the supply chain in China where manipulations can be introduced, and deducing them can in many cases be impossible. The manipulation of the Ethernet connector appeared to be similar to a method also used by the U.S. National Security Agency, details of which were leaked in 2013.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


Supreme Court rules that police generally need a warrant to access cell phone data
2018-06-22, ABC News
https://abcnews.go.com/Politics/supreme-court-rules-police-warrant-access-cel...

The Supreme Court ruled that police generally need a search warrant to review cell phone records that include data like a user's location, which will impose a higher bar for law enforcement to access data collected on the millions of people who use smartphones on a daily basis. The plaintiff in the case, Timothy Carpenter, was convicted of multiple robbery and gun offenses in 2010 but challenged the conviction saying that officers investigating the case didn't get a warrant for his cell phone records. The government argued that law enforcement doesn't need a warrant to get cell phone records from the service provider since it's a third party. The Court ruled that the government's search, in this case, did not meet the bar for probable cause for a warrant. Chief Justice John Roberts wrote in the majority decision that the government is obligated to get a warrant before compelling a wireless provider to provide cell phone records in an investigation. "We decline to grant the state unrestricted access to a wireless carrier's database of physical location information," Roberts said.

Note: While this ruling limits police powers, the NSA was authorized in 2016 to freely share communications data it collected without warrants on Americans with 16 intelligence and law enforcement agencies. For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the disappearance of privacy.


DOJ demands Facebook information from 'anti-administration activists'
2017-09-30, CNN News
http://www.cnn.com/2017/09/28/politics/facebook-anti-administration-activists...

Trump administration lawyers are demanding the private account information of potentially thousands of Facebook users in three separate search warrants served on the social media giant. The warrants specifically target the accounts of three Facebook users who are described ... as "anti-administration activists who have spoken out at organized events, and who are generally very critical of this administration's policies." One of those users, Emmelia Talarico, operated the disruptj20 page where Inauguration Day protests were organized and discussed; the page was visited by an estimated 6,000 users whose identities the government would have access to if Facebook hands over the information. Talarico says if her account information was given to the government, officials would have access to her "personal passwords, security questions and answers, and credit card information," plus "the private lists of invitees and attendees to multiple political events." The American Civil Liberties Union, representing the three Facebook users, filed a motion to quash the warrants Thursday. "What is particularly chilling about these warrants is that anti-administration political activists are going to [be] scrutinized by the very administration they are protesting," said ACLU attorney Scott Michelman. Facebook was initially served the warrants in February 2017 along with a gag order which barred the social media company from alerting the three users that the government was seeking their private information.

Note: United Nations officials recently said that the US government's treatment of activists was increasingly "incompatible with US obligations under international human rights law". For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy.


How Congress dismantled federal Internet privacy rules
2017-05-30, Washington Post
https://www.washingtonpost.com/politics/how-congress-dismantled-federal-inter...

They wanted to kill landmark privacy regulations that would soon ban Internet providers, such as Comcast and AT&T, from storing and selling customers’ browsing histories without their express consent. While the nation was distracted by the House’s pending vote to repeal Obamacare, Senate Republicans would schedule a vote to wipe out the new privacy protections. On March 23, the measure passed on a straight party-line vote, 50 to 48. President Trump signed the bill in early April without ceremony or public comment. “While everyone was focused on the latest headline crisis coming out of the White House, Congress was able to roll back privacy,” said former Federal Communications Commission chairman Tom Wheeler, who worked for nearly two years to pass the rules. The process to eliminate them took only a matter of weeks. The Internet privacy rules were adopted ... after an intense battle that pitted large Internet service providers, the advertising industry and tech giants against consumer advocates and civil rights groups. The rules required Internet service providers to get explicit consent before they gather their customers’ data - their browsing histories, the locations of businesses they physically visit and the mobile applications they use - and sell it to third parties. The requirements were modeled after a law passed decades ago by Congress that prohibited telephone companies from collecting customers’ calling histories and selling the information to third parties.

Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


Banned In Germany: Kids' Doll Is Labeled An Espionage Device
2017-02-17, NPR
http://www.npr.org/sections/thetwo-way/2017/02/17/515775874/banned-in-germany...

A doll called My Friend Cayla listens a little too well, according to German regulators who say the toy is essentially a stealthy espionage device that shares what it hears and is also vulnerable to takeover by third parties. "Cayla ist verboten in Deutschland," says Jochen Homann, the president of Germany's Federal Network Agency (the Bundessnetzagentur), announcing a ban on the doll in Germany on Friday. His agency oversees electronic privacy as part of its telecommunications mandate. Cayla looks like an everyday doll and gives no notice that it collects and transmits everything it hears - in this case, to [Nuance], a voice-recognition company in the U.S. whose other customers include intelligence agencies. The My Friend Cayla doll remains for sale in the U.S., including via Amazon. Much of what the German agency says echoes the concerns of privacy and consumer advocates in the U.S., who filed a complaint against Cayla during the recent Christmas shopping season. They criticized the scope of what the Internet-connected toy captures, as well as the vulnerabilities it poses for users who link the doll with their smartphones. Consumer groups have also criticized the doll for its habit of praising commercial products, in what's often seen as a stealth marketing campaign that targets children. "For example, Cayla will happily talk about how much she loves different Disney movies," Norway's Consumer Council says. "Meanwhile, the app-provider has a commercial relationship with Disney."

Note: The use of artificial intelligence in a new Barbie doll generated controversy in 2015, while a New York Times article from that same year called "smart objects" a "train wreck in privacy and security". For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy.


New Oliver Stone doc shows how Bill Binney’s NSA ThinThread anti-terror program was canned weeks before 9/11
2017-02-03, Salon.com
http://www.salon.com/2017/02/03/watch-the-real-beautiful-mind-belongs-to-bill...

When Bill Binney, former NSA analyst and head of the anti-terror ThinThread metadata program sits in front of you and says he is not afraid of the government, you have to admire him. A wheel-chair-bound U.S. serviceman who rose in the ranks of intelligence to work in top-secret NSA programs, Binney created ThinThread prior to September 11, 2001, and says it mathematically broke down all phone communications anywhere in the world without any infringement on Constitutional rights. The program was self-running. More important, it worked. In "A Good American," the new documentary from executive producer Oliver Stone ... audiences are taken on a tense and frightening ride through Binney and his colleagues' experience developing and deploying ThinThread in tests, only to see its funding pulled just weeks before 9/11 in favor of an expensive and ineffective ... program called Trailblazer. Binney contends that ThinThread would have identified the terrorists who planned and executed the 9/11 terror attacks, thereby preventing them from occurring. When ThinThread's plug was pulled, Binney and his team challenged their NSA bosses, and in the process found themselves at odds with the U.S. government and in a complex web of lies and corruption. Thus, when Binney said he remains unafraid of possible repercussions or retaliation tied to the film's thesis, it's not hard to believe. "What else can they do to me?" he asks. "They've already tried everything to stop me."

Note: Watch a free trailer or rent the whole documentary on this webpage. Read a revealing, detailed New York Times article on Oliver Stone and his profound work to expose corruption and manipulation through film. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.


Devices sprout ears: What do Alexa and Siri mean for privacy?
2017-01-14, Christian Science Monitor
http://www.csmonitor.com/Technology/2017/0114/Devices-sprout-ears-What-do-Ale...

Between your laptop, smartphone, smart TV, and perhaps a virtual assistant, how many microphones are in your home? The number of households with a hands-free assistant is growing by millions each year, but their convenience may come at a price. With law enforcement already using smart-device collected data as evidence, digital privacy rights are becoming more important. Amazon’s ... Echo family of devices are all variations on the theme of a smart speaker that can listen to, understand, and respond to voice commands. Like Siri’s implementation in recent iOS devices ... the device is always listening, so you don’t have to put down what you’re doing and find your phone to get an answer. But some worry there’s a fine line between always listening, and always recording. Are we truly alone when we’re with our devices? Amazon maintains a database of your conversations with the Echo. Police in Bentonville, Ark. have already submitted a search warrant for “audio recordings, transcribed records, and other text records” from the Echo of 2015 murder suspect James Andrew Bates. Amazon refused to turn over data from its servers beyond basic account information, [but] this case should be a wake-up call. The Fourth Amendment establishes the “sanctity of the home,” which prevents law enforcement from an unjustified search of a house. The “third-party doctrine,” [however] permits police to access information voluntarily shared with a third party such as your bank or phone company, even without a warrant.

Note: For more along these lines, see concise summaries of deeply revealing privacy news articles from reliable major media sources.


Yahoo 'secretly scanned customer emails' at request of US intelligence
2016-10-04, The Independent (One of the UK's leading newspapers)
http://www.independent.co.uk/life-style/gadgets-and-tech/yahoo-secretly-scann...

Yahoo has been accused of secretly building a customised software programme to search all of its customers’ incoming emails for specific information provided by US intelligence officials. The company complied with a classified US government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI. Reuters said that a number of surveillance experts said this represented the first case to surface of a US Internet company agreeing to a spy agency’s demand by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time. The agency also said it was unable to determine what data the company had handed over, and if the intelligence officials had approached other email providers besides Yahoo. US phone and Internet companies are known to have handed over bulk customer data to intelligence agencies. But some former government officials and private surveillance experts said they had not previously seen either such a broad directive for real-time Web collection or one that required the creation of a new computer program. “I’ve never seen that, a wiretap in real time on a ‘selector’,” said Albert Gidari, a lawyer who represented phone and Internet companies on surveillance. A selector refers to a type of search term used to zero in on specific information. He added: “It would be really difficult for a provider to do that.”

Note: For more along these lines, see concise summaries of deeply revealing news articles about corporate corruption and the disappearance of privacy.


Secret Rules Make it Pretty Easy for the FBI to Spy on Journalists
2016-06-30, The Intercept
https://theintercept.com/2016/06/30/secret-rules-make-it-pretty-easy-for-the-...

Secret FBI rules allow agents to obtain journalists’ phone records with approval from two internal officials - far less oversight than under normal judicial procedures. The classified rules ... govern the FBI’s use of national security letters, which allow the bureau to obtain information about journalists’ calls without going to a judge or informing the news organization being targeted. Obtaining a journalist’s records with a national security letter (or NSL) requires the signoff of the FBI’s general counsel and the executive assistant director of the bureau’s National Security Branch. The Obama administration has come under criticism for bringing a record number of leak prosecutions and aggressively targeting journalists in the process. In 2013, after it came out that the Justice Department had secretly seized records from phone lines at the Associated Press and surveilled ... reporter James Rosen, then-Attorney General Eric Holder tightened the rules. The FBI could not label reporters as co-conspirators in order to try to identify their sources - as had happened with Rosen - and it became more difficult to get journalists’ phone records without notifying the news organization first. Yet these changes did not apply to NSLs. Those are governed by a separate set of rules. The FBI issues thousands of NSLs each year, including nearly 13,000 in 2015. Over the years, a series of Inspector General reports found significant problems with their use, yet the FBI is currently pushing to expand the types of information it can demand with an NSL.

Note: The aggressive pursuit of leaks and journalists that report them led BBC to recently ask: "Is the US government at war with whistleblowers?" Read more about the FBI's use of secret National Security Letters. For more along these lines, see concise summaries of deeply revealing news articles on media manipulation and the disappearance of privacy.


Hidden Microphones Exposed As Part of Government Surveillance Program In The Bay Area
2016-05-13, CBS News (San Francisco affiliate)
http://sanfrancisco.cbslocal.com/2016/05/13/hidden-microphones-exposed-as-par...

Hidden microphones that are part of a clandestine government surveillance program that has been operating around the Bay Area has been exposed. Imagine standing at a bus stop, talking to your friend and having your conversation recorded without you knowing. It happens all the time, and the FBI doesn’t even need a warrant to do it. Jeff Harp, a ... security analyst and former FBI special agent said, “They put microphones under rocks, they put microphones in trees, they plant microphones in equipment. I mean, there’s microphones that are planted in places that people don’t think about, because that’s the intent!” FBI agents hid microphones inside light fixtures and at a bus stop outside the Oakland Courthouse without a warrant to record conversations, between March 2010 and January 2011. Federal authorities are trying to prove real estate investors in San Mateo and Alameda counties are guilty of bid rigging and fraud and used these recordings as evidence. The lawyer for one of the accused real estate investors who will ask the judge to throw out the recordings, told KPIX 5 News that, “Speaking in a public place does not mean that the individual has no reasonable expectation of privacy … private communication in a public place qualifies as a protected ‘oral communication.'”

Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"