Please donate here to support this vital work.
Revealing News For a Better World

Privacy News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


Dragonfly or Insect Spy? Scientists at Work on Robobugs
2007-10-09, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/10/08/AR20071008014...

Vanessa Alarcon saw them while working at an antiwar rally in Lafayette Square last month. "I heard someone say, 'Oh my god, look at those,' " the college senior from New York recalled. "I look up and I'm like, 'What the hell is that?' They looked kind of like dragonflies or little helicopters. But I mean, those are not insects." Out in the crowd, Bernard Crane saw them, too. "I'd never seen anything like it in my life," the Washington lawyer said. "They were large for dragonflies. I thought, 'Is that mechanical, or is that alive?' " Some suspect the insectlike drones are high-tech surveillance tools, perhaps deployed by the Department of Homeland Security. No agency admits to having deployed insect-size spy drones. But a number of U.S. government and private entities acknowledge they are trying. So what was seen by Crane, Alarcon and a handful of others at the D.C. march -- and as far back as 2004, during the Republican National Convention in New York, when one observant ... peace-march participant described on the Web "a jet-black dragonfly hovering about 10 feet off the ground, precisely in the middle of 7th Avenue . . . watching us?" Three people at the D.C. event independently described a row of spheres, the size of small berries, attached along the tails of the big dragonflies -- an accoutrement that [Jerry Louton, an entomologist at the National Museum of Natural History,] could not explain. And all reported seeing at least three maneuvering in unison. "Dragonflies never fly in a pack," he said. Mara Verheyden-Hilliard of the Partnership for Civil Justice said her group is investigating witness reports and has filed Freedom of Information Act requests with several federal agencies. If such devices are being used to spy on political activists, she said, "it would be a significant violation of people's civil rights."

Note: To read further reliable reports of threats to our civil liberties, click here.


An Opportunity for Wall St. in China’s Surveillance Boom
2007-09-07, New York Times
http://www.nytimes.com/2007/09/11/business/worldbusiness/11security.html?ex=1...

Li Runsen, the powerful technology director of China’s ministry of public security, is best known for leading Project Golden Shield, China’s intensive effort to strengthen police control over the Internet. But last month Mr. Li took an additional title: director for China Security and Surveillance Technology, a fast-growing company that installs and sometimes operates surveillance systems for Chinese police agencies, jails and banks, among other customers. The company has just been approved for a listing on the New York Stock Exchange. The company’s listing and Mr. Li’s membership on its board are just the latest signs of ever-closer ties among Wall Street, surveillance companies and the Chinese government’s security apparatus. Wall Street analysts now follow the growth of companies that install surveillance systems providing Chinese police stations with 24-hour video feeds from nearby Internet cafes. Hedge fund money from the United States has paid for the development of not just better video cameras, but face-recognition software and even newer behavior-recognition software designed to spot the beginnings of a street protest and notify police. Executives of Chinese surveillance companies say they are helping their government reduce street crime, preserve social stability and prevent terrorism. They note that London has a more sophisticated surveillance system, although the Chinese system will soon be far more extensive. Wall Street executives also defend the industry as necessary to keep the peace at a time of rapid change in China. They point out that New York has begun experimenting with surveillance cameras in Lower Manhattan and other areas of the city.


Spy Satellites Turned on the U.S.
2007-09-06, ABC News
http://abcnews.go.com/TheLaw/story?id=3567635

Traditionally, powerful spy satellites have been used to search for strategic threats overseas. But now the Department of Homeland Security has developed a new office to use the satellites to [monitor the US itself]. [DHS] officials ... faced extensive criticism [in Congress] about the privacy and civil liberty concerns of the new office, called the National Applications Office. [House Homeland Security] Committee members expressed concern about abuse of the satellite imagery, charging that Homeland Security had not informed the oversight committee about the program. "What's most disturbing is learning about it from The Wall Street Journal," said Committee Chairman Rep. Bennie Thompson, D-Miss. The lawmakers also expressed concern about using military capabilities for U.S. law enforcement and Homeland Security operations, potentially a violation of the Posse Comitatus Act, which bars the military from serving as a law enforcement body within the United States. Committee members said that in addition to not being informed about the National Applications Office program, they had not yet been provided with documents defining the limits and legal guidance about the program. [They] sent a letter to Homeland Security saying, "We are so concerned that ... we are calling for a moratorium on the program. Today's testimony made clear that there is effectively no legal framework governing the domestic use of satellite imagery for the various purposes envisioned by the department."


A chip on my shoulder
2007-08-12, San Francisco Chronicle (San Francisco's leading newspaper)
http://sfgate.com/cgi-bin/article.cgi?f=/c/a/2007/08/12/EDG00REOHJ1.DTL

The ability to blend vast databases containing personal information -- and the sophistication of tracking devices that can announce your presence along with myriad vital statistics when you cross a bridge or enter a room -- have brought Americans to a crossroads. Do we shrug and concede that privacy is lost -- "get over it," as one titan of tech declared so bluntly? Or do we look for ways to draw the line, to identify means and places where employers and governments should not dare to tread? One such place: Our bodies. Life has begun to imitate art -- as in the futuristic film "Minority Report" -- with the refinement of toothpick-thick microchips that can be implanted in your arm and packed with loads of personally identifiable information that can be beamed to the world. These radio-frequency identification (RFID) devices -- or "talking bar codes" -- amount to miniature antennas that transmit the types of information that might otherwise be held on a swipe card. Even if you've shrugged through the debates about warrantless wiretapping and said "what the heck" at the prospect that everything from your spending habits to your Web site travels are being compiled and crunched for commercial purposes, you might think twice about letting your employer insert a microchip under your skin as a condition of getting a job. As of today, it is both a technical and a legal possibility. Just last year, a ... provider of video-surveillance equipment inserted ... microchips into the arms of two employees. Those two workers volunteered, but it's not hard to imagine the lightbulbs going off in Corporate America. Is Joe really making a sales call or is he taking in a baseball game at AT&T Park? How many smoke breaks is Mary taking? Amazingly, there is no California law against "chipping" workers as a condition of employment.

Note: For many reliable reports from the major media on the potential dangers of microchips, click here.


Bush administration defends spy law
2007-08-07, Los Angeles Times
http://www.latimes.com/news/la-na-intel7aug07,0,1631228.story

The Bush administration rushed to defend new espionage legislation Monday amid growing concern that the changes could lead to increased spying by U.S. intelligence agencies on American citizens. But officials declined to provide details about how the new capabilities might be used by the National Security Agency and other spy services. And in many cases, they could point only to internal monitoring mechanisms to prevent abuse of the new rules that appear to give the government greater authority to tap into the traffic flowing across U.S. telecommunications networks. Officials rejected assertions that the new capabilities would enable the government to cast electronic "drift nets" that might ensnare U.S. citizens [and] that the new legislation would amount to the expansion of a controversial — and critics contend unconstitutional — warrantless wiretapping program that President Bush authorized after the 9/11 attacks. Intelligence experts said there were an array of provisions in the new legislation that appeared to make it possible for the government to engage in intelligence-collection activities that the Bush administration officials were discounting. "They are trying to shift the terms of the debate to their intentions and away from the meaning of the new law," said Steven Aftergood, an intelligence policy analyst at the Federation of American Scientists. "The new law gives them authority to do far more than simply surveil foreign communications abroad," he said. "It expands the surveillance program beyond terrorism to encompass foreign intelligence. It permits the monitoring of communications of a U.S. person as long as he or she is not the primary target. And it effectively removes judicial supervision of the surveillance process."


FBI Proposes Building Network of U.S. Informants
2007-07-25, ABC News blog
http://blogs.abcnews.com/theblotter/2007/07/fbi-proposes-bu.html

The FBI is taking cues from the CIA to recruit thousands of covert informants in the United States as part of a sprawling effort to boost its intelligence capabilities. According to a recent unclassified report to Congress, the FBI expects its informants to provide secrets about possible terrorists and foreign spies, although some may also be expected to aid with criminal investigations, in the tradition of law enforcement confidential informants. The FBI said the push was driven by a 2004 directive from President Bush ordering the bureau to improve its counterterrorism efforts by boosting its human intelligence capabilities. The aggressive push for more secret informants appears to be part of a new effort to grow its intelligence and counterterrorism efforts. Other recent proposals include expanding its collection and analysis of data on U.S. persons, retaining years' worth of Americans' phone records and even increasing so-called "black bag" secret entry operations. To handle the increase in so-called human sources, the FBI also plans to overhaul its database system, so it can manage records and verify the accuracy of information from "more than 15,000" informants, according to the document. The bureau has arranged to use elements of CIA training to teach FBI agents about "Source Targeting and Development," the report states. The courses will train FBI special agents on the "comprehensive tradecraft" needed to identify, recruit and manage these "confidential human sources."


'Code Orange' for press freedom
2007-07-15, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2007/07/15/EDGU9R0PAC1.DTL

The arguments against a federal shield law might be frightening if they were not so ludicrous. There are two ways to reassure yourself that legislation to allow journalists to protect the identity of confidential sources will not be exploited by terrorists, thugs, identity thieves, sleazy sleuths and anarchists who expose trade secrets. One is to look at the experience of 49 state laws that grant varying levels of protection for journalists using anonymous sources. The other is to read the bill. "The Free Flow of Information Act of 2007,'' sponsored by Reps. Mike Pence, R-Ind., and Rick Boucher, D-Va., does not provide an absolute right for journalists to protect their sources. Under their HR2102, a journalist could be forced by the courts to reveal his or her source if the disclosure involved: -- A threat to national security. -- A threat of imminent death or significant [bodily] harm to a person. -- A trade secret of significant value. -- Personal financial or health information. [The] Justice Department, which has wielded subpoenas and threats of jail time against journalists in pursuing government leaks, has never liked the idea of a shield law. So it was hardly a surprise when it recently testified against HR2102. What was eye-poppingly outrageous was a Justice official's straight-faced attempt to suggest that criminals or terrorists would invoke the bill's protection for journalists to thwart prosecutors. "Totally absurd," House Judiciary Chairman John Conyers, D-Mich., said of the terrorism argument. However, the dangers that overzealous prosecutors pose to a free and independent press that Pence calls "essential to an informed" electorate are very real and growing. As Pence put it, "there may never be another Deep Throat" if whistle-blowers become worried that journalists cannot keep a promise of confidentiality.


We are moving ever closer to the era of mind control
2006-02-06, The Guardian (one of the UK's leading newspapers)
http://www.guardian.co.uk/science/story/0,,1702694,00.html

There is increasing military interest in the development of techniques that can survey and possibly manipulate the mental processes of potential enemies, or enhance the potential of one's own troops. There is nothing new about such an interest. In the US, it stretches back at least half a century. Impressed by claims that the Soviet Union was developing psychological warfare, the CIA and the Defence Advanced Projects Agency (Darpa) began their own programmes. Early experiments included the clandestine feeding of LSD to their own operatives and attempts at 'brain-washing'. By the 1960s, Darpa, along with the US Navy, was funding almost all US research into 'artificial intelligence', in order to develop methods and technologies for the 'automated battlefield' and the 'intelligent soldier'. Contracts were let and patents taken out on techniques aimed at recording signals from the brains of enemy personnel at a distance, in order to 'read their minds'. These efforts have burgeoned in the aftermath of the so-called 'war on terror'. The step beyond reading thoughts is to attempt to control them directly. A new technique - transcranial magnetic stimulation (TMS) - has begun to generate interest. This focuses an intense magnetic field on specific brain regions, and has been shown to affect thoughts, perceptions and behaviour.

Note: These technologies are far more developed than this article suggests. For reliable, verifiable information on these little-known "non-lethal" weapons: http://www.WantToKnow.info/mindcontrol10pg#nonlethal


Feds have paid undercover informants in migrant caravan
2018-11-20, NBC News
https://www.nbcnews.com/politics/immigration/feds-have-paid-undercover-inform...

The Department of Homeland Security is gathering intelligence from paid undercover informants inside the migrant caravan that is now reaching the California-Mexico border as well as monitoring the text messages of migrants, according to two DHS officials. The 4,000 migrants, mainly from Honduras, have used WhatsApp text message groups as a way to organize and communicate along their journey to the California border, and DHS personnel have joined those groups to gather that information. The intelligence gathering techniques are combined with reports from DHS personnel working in Mexico. Paying informants, placing officers in the region or monitoring the communications of non-U.S. citizens is not illegal, said John Cohen, former acting undersecretary of intelligence for DHS, but it does raise some concerns about the allocation of resources. "Those resources have to come from some place. They are not being devoted to thwarting terrorist threats, mass shootings, mailed fentanyl coming into the country or cyberattacks," said Cohen. Cohen said the caravan presents a logistical and humanitarian issue, but because the vast majority of its members want to present themselves legally to claim asylum, it is not wise to devote a significant amount of intelligence resources to it. "I find it hard to believe that the highest risk facing this nation comes from this caravan," Cohen said.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


Feds Crack Trump Protesters’ Phones to Charge Them With Felony Rioting
2017-07-26, Daily Beast
http://www.thedailybeast.com/feds-crack-trump-protesters-phones-to-charge-the...

Officials seized Trump protesters’ cell phones, cracked their passwords, and are now attempting to use the contents to convict them of conspiracy to riot at the presidential inauguration. Prosecutors have indicted over 200 people on felony riot charges for protests in Washington, D.C. on January 20. Some defendants face up to 75 years in prison. Evidence against the defendants has been scant from the moment of their arrest. As demonstrators, journalists, and observers marched through the city, D.C. police officers channelled hundreds of people into a narrow, blockaded corner, where they carried out mass arrests. Some of those people ... are now suing for wrongful arrest. Police also seized more than 100 cell phones. All of the ... phones were locked. But a July 21 court document shows that investigators were successful in opening the locked phones. Prosecutors moved to use a wealth of information from the phones as evidence, including the phones’ “call detail records,” “SMS or MMS messages,” “contact logs/email logs,” “chats or other messaging applications,” “website search history and website history,” and “images or videos.” One of the more than 200 defendants has pleaded guilty to riot charges after being named extensively in a superseding indictment. But the case against most defendants is less clear; in the superseding indictment, prosecutors accuse hundreds defendants of conspiracy to riot, based on “overt acts” as banal as chanting anti-capitalist slogans or wearing dark clothing.

Note: In May, United Nations officials said that the US treatment of activists was increasingly "incompatible with US obligations under international human rights law". For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.


How ‘Snowden’ the movie could help win a pardon for Snowden the man
2016-09-20, Reuters
http://www.reuters.com/article/us-usa-intelligence-nsa-snowden-commenta-idUSK...

The days leading up to last Friday’s release of director Oliver Stone’s Snowden looked like one long movie trailer. The American Civil Liberties Union ... announced a campaign to win a presidential pardon for Edward Snowden, the former National Security Agency contract employee who leaked hundreds of thousands of its highly classified documents. The next day, the House Intelligence Committee released a bipartisan letter to the president that advised him against any pardon. The week before, Stone had invited me to a private screening of his movie, [along with] a small group of former government employees who were whistleblowers before Snowden – and paid a high price for it. The reason they had been persecuted is that U.S. law makes no distinction between revealing illegal government activity to the press about eavesdropping on Americans or engaging in torture, and betraying the country by passing secrets for money or ideology to foreign governments. The Espionage Act was enacted nearly a century ago following World War One, and has already been amended several times. One key issue confronting the next president ... is whether the law needs to be amended again – this time to separate the whistleblowers from the spies. Today ... the battle lines have been drawn between those in government – both the executive branch and Congress – who view the theft of government secrets as espionage, regardless of the motive, and those in civil-liberties groups and the media who see motive as a critical distinction.

Note: The above was written by James Bamford, whistleblower and author of "The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America." For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.


Watchdog: Canada's Electronic Spy Agency Broke Privacy Laws
2016-01-28, ABC/Associated Press
http://abcnews.go.com/International/wireStory/watchdog-canadas-electronic-spy...

Canada's electronic spy agency broke privacy laws by sharing information about Canadians with foreign partners, a federal watchdog said Thursday. Commissioner Jean-Pierre Plouffe said in his annual report that the Communications Security Establishment passed along information known as metadata to counterparts in the United States, Britain, Australia and New Zealand. Metadata is information associated with a communication, such as a telephone number or email address, but not the message itself. The communications agency intercepts and analyzes foreign communications for intelligence information of interest to the federal government. The agency is legally authorized to collect and analyze metadata churning through cyberspace. Plouffe, who keeps an eye on the highly secretive agency, said he found that it lacks clarity regarding the sharing of certain types of metadata. Defense Minister Harjit Sajjan said the sharing won't resume until he is satisfied that the proper protections are in place. Plouffe's report noted that certain metadata was not being properly minimized, or rendered unidentifiable, prior to being shared. The CSE's failure to strip out certain Canadian identity information violated the National Defense Act and therefore the federal Privacy Act as well. Privacy advocates have stressed that metadata is far from innocuous since it can reveal a great deal about a person's online behavior and interactions.

Note: Many countries do not allow their intelligence agencies to spy on their own citizens without going through a legal process. The easy way around this that has been used for decades is to simply getting the information from a friendly country. So if the CIA wants information on you in the US, they can't spy directly, but they can ask the UK to do so and pass the information to them and thus get around the laws. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.


Spain colluded in NSA spying on its citizens, Spanish newspaper reports
2013-10-30, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/oct/30/spain-colluded-nsa-spying-citize...

The widespread surveillance of Spanish citizens by the US National Security Agency, which caused outrage when it was reported this week, was the product of a collaboration with Spain's intelligence services, according to one Spanish newspaper. Spanish agents not only knew about the work of the NSA but also facilitated it, El Mundo reports. An NSA document entitled "Sharing computer network operations cryptologic information with foreign partners" reportedly shows how the US relies on the collaboration of many countries to give it access to intelligence information, including electronic metadata. According to the document seen by El Mundo, the US classifies cooperation with various countries on four different levels. In the first group – "Comprehensive Cooperation" – are the UK, Australia, Canada and New Zealand. The second group – "Focused Cooperation" – of which Spain is a member, includes 19 countries, all of them European, apart from Japan and South Korea. The third group – "Limited cooperation" – consists of countries such as France, Israel, India and Pakistan; while the fourth – "Exceptional Cooperation" – is made up of countries that the US considers to be hostile to its interests. The NSA documents [suggest] the Spanish intelligence services were working hand in hand with the NSA, as were other foreign agencies. But if there was any doubt as to who held the upper hand, the NSA documents make clear that any collaboration was always to serve the needs of protecting American interests.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


State photo-ID databases become troves for police
2013-06-16, Washington Post
http://www.washingtonpost.com/business/technology/state-photo-id-databases-be...

The faces of more than 120 million people are in searchable photo databases that state officials assembled to prevent driver’s-license fraud but that increasingly are used by police to identify suspects, accomplices and even innocent bystanders in a wide range of criminal investigations. The facial databases have grown rapidly in recent years and generally operate with few legal safeguards beyond the requirement that searches are conducted for “law enforcement purposes.” The most widely used systems were honed on the battlefields of Afghanistan and Iraq as soldiers sought to identify insurgents. The increasingly widespread deployment of the technology in the United States has helped police [identify people who] leave behind images on surveillance videos or social-media sites that can be compared against official photo databases. But law enforcement use of such facial searches is blurring the traditional boundaries between criminal and non-criminal databases, putting images of people never arrested in what amount to perpetual digital lineups. Though not yet as reliable as fingerprints, these technologies can help determine identity through individual variations in irises, skin textures, vein patterns, palm prints and a person’s gait while walking. Facial-recognition systems ... can be deployed remotely, without subjects knowing that their faces have been captured.

Note: For deeply revealing reports from reliable major media sources on government assaults on privacy, click here.


How the US government secretly reads your email
2011-10-11, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/cifamerica/2011/oct/11/us-government-...

Somewhere, a US government official is reading through a list of those who sent or received an email from Jacob Appelbaum, a 28-year-old computer science researcher at the University of Washington who volunteered for WikiLeaks. Among those listed will be my name, a journalist who interviewed Appelbaum for a book about the digital revolution. Appelbaum is a spokesman for Tor, a free internet anonymising software that helps people defend themselves against internet surveillance. He's spent five years teaching activists around the world how to install and use the service to avoid being monitored by repressive governments. Now, Appelbaum finds himself a target of his own government as a result of his friendship with Julian Assange and the fact WikiLeaks used the Tor software. Appelbaum has not been charged with any wrongdoing; nor has the government shown probable cause that he is guilty of any criminal offence. That matters not a jot, because, as the law stands, government officials don't need a search warrant to access our digital data. Searching someone's home requires a warrant that can only be obtained by proving probable cause, but digital searches require no such burden of proof. Most people are not aware of the ease with which governments – free, open and so-called democratic – can access and peruse our private communications.

Note: For key reports on government threats to privacy from major media sources, click here.


Ex-Minn. governor sues over body scans, pat-downs
2011-01-24, Washington Post/Associated Press
http://www.washingtonpost.com/wp-dyn/content/article/2011/01/24/AR20110124059...

Former Minnesota Gov. Jesse Ventura is suing the Department of Homeland Security and the Transportation Security Administration, saying full-body scans and pat-downs at airport checkpoints are violating his rights. Ventura filed his lawsuit [on January 24] in federal court in Minnesota. He says the new security measures violate his right to be free from unreasonable searches and seizures. He's asking a federal court to order officials to stop subjecting him to these searches. Ventura was governor of Minnesota from 1999 through 2002. He now hosts the television program "Conspiracy Theory." The lawsuit says Ventura had a hip replacement in 2008, and his titanium implant sets off metal detectors.

Note: Jesse Ventura is one of the heros of our time. Do a video search on his name to watch episodes of his amazingly revealing "Conspiracy Theory" programs.


Passports will be needed to buy mobile phones
2008-10-19, Times of London
http://www.timesonline.co.uk/tol/news/politics/article4969312.ece

Everyone who buys a mobile telephone will be forced to register their identity on a national database under government plans to extend massively the powers of state surveillance. Phone buyers would have to present a passport or other official form of identification at the point of purchase. Privacy campaigners fear it marks the latest government move to create a surveillance society. A compulsory national register for the owners of all 72m mobile phones in Britain would be part of a much bigger database. Whitehall officials have raised the idea of a register containing the names and addresses of everyone who buys a phone in recent talks with Vodafone and other telephone companies, insiders say. The move is targeted at monitoring the owners of Britain’s estimated 40m prepaid mobile phones. They can be purchased with cash by customers who do not wish to give their names, addresses or credit card details. The pay-as-you-go phones are popular with criminals ... because their anonymity shields their activities from the authorities. But they are also used by thousands of law-abiding citizens who wish to communicate in private. The move aims to close a loophole in plans being drawn up by GCHQ, the government’s eavesdropping centre in Cheltenham, to create a huge database to monitor and store the internet browsing habits, e-mail and telephone records of everyone in Britain.

Note: For many disturbing reports on increasing threats to privacy, click here.


Agency and Bush Are Sued Over Domestic Surveillance
2008-09-18, New York Times
http://www.nytimes.com/2008/09/19/washington/19nsa.html?partner=rssuserland&e...

A privacy group filed a class-action lawsuit on Thursday against the National Security Agency, President Bush and other officials, seeking to halt what it describes as illegal surveillance of Americans’ telephone and Internet traffic. The lawsuit parallels a legal action brought against the AT&T Corporation in 2006 by the same nonprofit group, the Electronic Frontier Foundation, charging that the company gave the N.S.A. access to its communications lines and customer records without proper warrants. Congress derailed that lawsuit this year by passing legislation granting immunity to telecommunications companies that had provided assistance to the agency, though the foundation has said it intends to challenge the constitutionality of the new law. A lawyer with the foundation, Kevin S. Bankston, said the new suit opened a “second front” against a “massively illegal fishing expedition through AT&T’s domestic networks and databases of customer records.” When Mr. Bush started the program in late 2001, the N.S.A. began eavesdropping inside the United States without court warrants for the first time since 1978, when Congress created the Foreign Intelligence Surveillance Court to oversee such intelligence collection. The suit’s plaintiffs are five AT&T customers, but it is filed on behalf of all customers. Like the 2006 suit, it is based in part on information from Mark Klein, a former AT&T technician who says he saw what he believed to be equipment installed by the N.S.A. at a company communications hub in San Francisco allowing the agency to filter a huge volume of Internet traffic.

Note: For many disturbing reports from major media sources of threats to privacy, click here.


Civil liberties: Outrage at New York police plan to track vehicles
2008-08-14, The Guardian (One of the U.K.'s leading newspapers)
http://www.guardian.co.uk/world/2008/aug/14/usa.humanrights

The Big Apple is turning into Big Brother, civil liberties groups have warned in response to a new plan from New York city's police chiefs to photograph every vehicle entering Manhattan and hold the details on a massive database. As well as placing cameras at all tunnels and bridges into Manhattan, the 36-page plan, called Operation Sentinel, calls for a security ring to be erected at Ground Zero and for a 50-mile buffer zone around the city within which mobile units would search for nuclear or "dirty" bombs. [The] 3,000 cameras that could be mounted as a result of the plans of the New York police ... have provoked outrage in the United States. Donna Lieberman, director of the New York Civil Liberties Union, said the idea of tracking the movements of millions of people was "an assault on the country's historical respect for the right to privacy and the freedom to be left alone". The NYCLU is pressing the New York police to release further details of its intentions under freedom of information laws. The toughest element of the scheme relates to preparations to secure Ground Zero once the six-hectare site is rebuilt and open to the public again. Those measures include moveable roadblocks, security cameras across lower Manhattan and an underground bomb-screening centre through which all delivery vehicles would have to pass. The plan to video the number plates of every vehicle would be applied to all points of entry into Manhattan, including the main Brooklyn-Battery, Holland, Lincoln and Midtown tunnels and Brooklyn, Manhattan and other bridges.

Note: For lots more on threats to privacy from major media sources, click here.


Administration Set to Use New Spy Program in U.S.
2008-04-12, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/04/11/AR20080411036...

The Bush administration said yesterday that it plans to start using the nation's most advanced spy technology for domestic purposes soon, rebuffing challenges by House Democrats over the idea's legal authority. Homeland Security Secretary Michael Chertoff said his department will activate his department's new domestic satellite surveillance office in stages, starting as soon as possible. Sophisticated overhead sensor data will be used for law enforcement once privacy and civil rights concerns are resolved, he said. His statements marked a fresh determination to operate the department's new National Applications Office. But Congress delayed launch of the new office last October. Critics cited its potential to expand the role of military assets in domestic law enforcement, to turn new or as-yet-undeveloped technologies against Americans without adequate public debate, and to divert the existing civilian and scientific focus of some satellite work to security uses. Democrats say Chertoff has not spelled out what federal laws govern the NAO, whose funding and size are classified. Congress barred Homeland Security from funding the office until its investigators could review the office's operating procedures and safeguards. The department submitted answers on Thursday, but some lawmakers promptly said the response was inadequate. [Rep. Bennie G. Thompson (D-Miss.), chairman of the House Homeland Security Committee] said, "We still don't know whether the NAO will pass constitutional muster since no legal framework has been provided."

Note: For many more revealing stories on threats to civil liberties, click here.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"