Please donate here to support this vital work.
Revealing News For a Better World

Privacy News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


The FBI Deputizes Business
2008-02-07, Common Dreams
http://www.commondreams.org/archive/2008/02/07/6918/

Today, more than 23,000 representatives of private industry are working quietly with the FBI and the Department of Homeland Security. The members of this rapidly growing group, called InfraGard, receive secret warnings of terrorist threats before the public does -- and, at least on one occasion, before elected officials. In return, they provide information to the government, which alarms the ACLU. But there may be more to it than that. One business executive, who showed me his InfraGard card, told me they have permission to "shoot to kill"ť in the event of martial law. In November 2001, InfraGard had around 1,700 members. As of late January, InfraGard had 23,682 members, according to its website, www.infragard.net, which adds that "350 of our nation's Fortune 500 have a representative in InfraGard."ť FBI Director Robert Mueller addressed an InfraGard convention on August 9, 2005. He urged InfraGard members to contact the FBI if they "note suspicious activity or an unusual event." And he said they could sic the FBI on "disgruntled employees who will use knowledge gained on the job against their employers."ť

Note: We don't normally use Common Dreams as a news source, but as this news is so important and the major media failed to report it, we decided to include this article here. For a revealing report by the ACLU on this key topic, click here. For important reports from major media sources on threats to civil liberties, click here.


Spies' Battleground Turns Virtual
2008-02-06, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/02/05/AR20080205031...

U.S. intelligence officials are [now claiming] that popular Internet services that enable computer users to adopt cartoon-like personas in three-dimensional online spaces also are creating security vulnerabilities by opening novel ways ... to move money, organize and conduct corporate espionage. Over the last few years, "virtual worlds" such as Second Life and other role-playing games have become home to millions of computer-generated personas known as avatars. By directing their avatars, people can take on alternate personalities, socialize, explore and earn and spend money across uncharted online landscapes. Nascent economies have sprung to life in these 3-D worlds, complete with currency, banks and shopping malls. Corporations and government agencies have opened animated virtual offices, and a growing number of organizations hold meetings where avatars gather and converse in newly minted conference centers. Intelligence officials ... say they're convinced that the qualities that many computer users find so attractive about virtual worlds -- including anonymity, global access and the expanded ability to make financial transfers outside normal channels -- have turned them into seedbeds for transnational threats. The government's growing concern seems likely to make virtual worlds the next battlefield in the struggle over the proper limits on the government's quest to [expand] data collection and analysis and the surveillance of commercial computer systems. Virtual worlds could also become an actual battlefield. The intelligence community has begun contemplating how to use Second Life and other such communities as platforms for cyber weapons.


Pentagon Review Faults Bank Record Demands
2007-10-14, New York Times
http://www.nytimes.com/2007/10/14/washington/14letter.html?ex=1350014400&en=b...

An internal Pentagon review this year found systemic problems ... in the military’s efforts to obtain records from American banks and consumer credit agencies in terrorism and espionage investigations, according to Pentagon documents. The newly disclosed documents, totaling more than 1,000 pages, provide additional confirmation of the military’s expanding use of what are known as national security letters under powers claimed under the Patriot Act. The documents show that the military has issued at least 270 of the letters since 2005, and about 500 in all since 2001. The documents were obtained through the Freedom of Information Act by two private advocacy groups, the American Civil Liberties Union and the Electronic Frontier Foundation. The New York Times first disclosed the military’s use of the letters in January, and senior members of Congress and civil liberties groups criticized the practice on grounds that it seemed to conflict with traditional Pentagon rules against domestic law enforcement operations. The documents raise a number of apparent discrepancies between the Defense Department’s internal practices and what officials have said publicly and to Congress about their use of the letters. The documents suggest, for instance, that military officials used the F.B.I. to collect records for what started as purely military investigations. And the documents also leave open the possibility that records could be gathered on nonmilitary personnel in the course of the investigations. Civil liberties advocates said recent controversy over the Department of Defense’s collection of information on antiwar protesters made them suspicious of the assertion that the letters had been used exclusively to focus on military personnel. “We are very skeptical that the D.O.D. is voluntarily limiting its own surveillance power,” said Melissa Goodman, a staff attorney for the A.C.L.U..


Case Dismissed?
2007-09-20, Newsweek
http://www.msnbc.msn.com/id/20884696/site/newsweek/from/ET/

The nation’s biggest telecommunications companies, working closely with the White House, have mounted a secretive lobbying campaign to get Congress to quickly approve a measure wiping out all private lawsuits against them for assisting the U.S. intelligence community’s warrantless surveillance programs. The campaign — which involves some of Washington's most prominent lobbying and law firms — has taken on new urgency in recent weeks because of fears that a U.S. appellate court in San Francisco is poised to rule that the lawsuits should be allowed to proceed. If that happens, the telecom companies say, they may be forced to terminate their cooperation with the U.S. intelligence community — or risk potentially crippling damage awards for allegedly turning over personal information about their customers to the government without a judicial warrant. But critics say the language proposed by the White House — drafted in close cooperation with the industry officials — is so extraordinarily broad that it would provide retroactive immunity for all past telecom actions related to the surveillance program. Its practical effect, they argue, would be to shut down any independent judicial or state inquires into how the companies have assisted the government in eavesdropping on the telephone calls and e-mails of U.S. residents in the aftermath of the September 11 terror attacks. “It’s clear the goal is to kill our case," said Cindy Cohn, legal director of the Electronic Frontier Foundation, [which] filed the main lawsuit against the telecoms after The New York Times first disclosed, in December 2005, that President Bush had approved a secret program to monitor the phone conversations of U.S. residents without first seeking judicial warrants. “I find it a little shocking that Congress would participate in the covering up of what has been going on," added Cohn.


China Enacting a High-Tech Plan to Track People
2007-08-12, New York Times
http://www.nytimes.com/2007/08/12/business/worldbusiness/12security.html?ex=1...

At least 20,000 police surveillance cameras are being installed along streets here [in Shenzhen] in southern China and will soon be guided by sophisticated computer software from an American-financed company to recognize automatically the faces of police suspects and detect unusual activity. Starting this month in a port neighborhood and then spreading across Shenzhen, a city of 12.4 million people, residency cards fitted with powerful computer chips programmed by the same company will be issued to most citizens. Data on the chip will include not just the citizen’s name and address but also work history, educational background, religion, ethnicity, police record, medical insurance status and landlord’s phone number. Even personal reproductive history will be included, for enforcement of China’s controversial “one child” policy. Plans are being studied to add credit histories, subway travel payments and small purchases charged to the card. Security experts describe China’s plans as the world’s largest effort to meld cutting-edge computer technology with police work to track the activities of a population. But they say the technology can be used to violate civil rights. “We have a very good relationship with U.S. companies like I.B.M., Cisco, H.P., Dell,” said Robin Huang, the chief operating officer of China Public Security. “All of these U.S. companies work with us to build our system together.” The role of American companies in helping Chinese security forces has periodically been controversial in the United States. Executives from Yahoo, Google, Microsoft and Cisco Systems testified in February 2006 at a Congressional hearing called to review whether they had deliberately designed their systems to help the Chinese state muzzle dissidents on the Internet; they denied having done so.


FBI Finds It Frequently Overstepped in Collecting Data
2007-06-14, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/06/13/AR20070613024...

An internal FBI audit has found that the bureau potentially violated the law or agency rules more than 1,000 times while collecting data about domestic phone calls, e-mails and financial transactions in recent years, far more than was documented in a Justice Department report in March that ignited bipartisan congressional criticism. The new audit covers just 10 percent of the bureau's national security investigations since 2002. The vast majority of the new violations were instances in which telephone companies and Internet providers gave agents phone and e-mail records the agents did not request and were not authorized to collect. The agents retained the information anyway in their files. Two dozen of the newly-discovered violations involved agents' requests for information that U.S. law did not allow them to have. The results confirmed what ... critics feared, namely that many agents did not ... follow the required legal procedures and paperwork requirements when collecting personal information with one of the most sensitive and powerful intelligence-gathering tools of the post-Sept. 11 era -- the National Security Letter, or NSL. Such letters are uniformly secret and amount to nonnegotiable demands for personal information -- demands that are not reviewed in advance by a judge. After the 2001 terrorist attacks, Congress substantially eased the rules for issuing NSLs, [leading] to an explosive growth in the use of the letters. More than 19,000 such letters were issued in 2005 seeking 47,000 pieces of information, mostly from telecommunications companies.


Officials Sued Over Phone Records Access
2006-06-14, Los Angeles Times/Associated Pres
http://www.latimes.com/news/nationworld/politics/wire/sns-ap-phone-records-la...

The federal government sued the New Jersey attorney general and other state officials Wednesday to stop them from seeking information about telephone companies' cooperation with the National Security Agency. The unusual filing...is the latest effort by federal authorities to halt legal proceedings aimed at revealing whether and how often AT&T, Verizon and other phone companies have provided customer records to the NSA without a court order. New Jersey Attorney General Zulima Farber, a Democrat, and other officials sent subpoenas to five carriers on May 17, asking for documents that would explain whether they supplied customer records to the NSA, the lawsuit said. The subpoenas followed by a few days a USA Today report that the phone companies had complied with the secretive agency's request for the phone records of millions of ordinary Americans after the Sept. 11 attacks. The Justice Department said more than 20 lawsuits have been filed around the country alleging that the phone companies illegally assisted the NSA. The government says sensitive national security information would be revealed if judges allow those cases to proceed. In this matter, the federal government said the New Jersey officials are treading on federal turf and that the companies, if forced to comply with the subpoenas, would be confirming or denying the existence of the program. President Bush and other top federal officials have refused to do that.


Pentagon Creating Student Database
2005-06-23, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2005/06/22/AR20050622023...

The Defense Department began working yesterday with a private marketing firm to create a database of high school students ages 16 to 18 and all college students to help the military identify potential recruits. The program is provoking a furor among privacy advocates. The new database will include personal information including birth dates, Social Security numbers, e-mail addresses, grade-point averages, ethnicity and what subjects the students are studying. "The purpose of the system is to provide a single central facility within the Department of Defense to compile, process and distribute files of individuals who meet age and minimum school requirements for military service." Some information on high school students already is given to military recruiters in a separate program under provisions of the 2002 No Child Left Behind Act. Recruiters have been using the information to contact students at home, angering some parents and school districts around the country.


Governments Can Spy on Journalists in the U.S. Using Invasive Foreign Intelligence Process
2018-09-17, The Intercept
https://theintercept.com/2018/09/17/journalists-fisa-court-spying/

The U.S. government can monitor journalists under a foreign intelligence law that allows invasive spying and operates outside the traditional court system, according to newly released documents. Targeting members of the press under the law, known as the Foreign Intelligence Surveillance Act, requires approval from the Justice Department’s highest-ranking officials. Prior to the release of these documents, little was known about the use of FISA court orders against journalists. Previous attention had been focused on the use of National Security Letters against members of the press; the letters are administrative orders with which the FBI can obtain certain ... records without a judge’s oversight. FISA court orders can authorize much more invasive searches and collection, including the content of communications, and do so through hearings conducted in secret and outside the sort of ... judicial process that allows journalists and other targets of regular criminal warrants to eventually challenge their validity. The rules apply to media entities or journalists who are thought to be agents of a foreign government, or ... possess foreign intelligence information. “There’s a lack of clarity on the circumstances when the government might consider a journalist an agent of a foreign power,” said [Knight Institute staff attorney Ramya] Krishnan. “Think about WikiLeaks; the government has said they are an intelligence operation.”

Note: In its latest instruction manual for federal prosecutors, the US Justice Department removed a subsection titled “Need for Free Press and Public Trial”. For more along these lines, see concise summaries of deeply revealing news articles on judicial system corruption and the erosion of civil liberties.


Edward Snowden: 'The people are still powerless, but now they're aware'
2018-06-04, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/us-news/2018/jun/04/edward-snowden-people-still-p...

Edward Snowden has no regrets five years on from leaking the biggest cache of top-secret documents in history. He is wanted by the US. He is in exile in Russia. But he is satisfied with the way his revelations of mass surveillance have rocked governments, intelligence agencies and major internet companies. What has happened in the five years since? The most important change, he said, was public awareness. “The government and corporate sector preyed on our ignorance. But now we know. People are aware now. People are still powerless to stop it but we are trying. The revelations made the fight more even.” He said he had no regrets. His own life is uncertain, perhaps now more than ever, he said. His sanctuary in Russia depends on the whims of the Putin government, and the US and UK intelligence agencies have not forgiven him. For them, the issue is as raw as ever. One of the disclosures to have most impact was around the extent of collaboration between the intelligence agencies and internet companies. In 2013, the US companies were outsmarting the EU in negotiations over data protection. Snowden landed like a bomb in the middle of the negotiations and the data protection law that took effect last month is a consequence. But he will not be marking the anniversary with a “victory lap”. There is still much to be done. “The fightback is just beginning,” said Snowden. “The governments and the corporates have been in this game a long time and we are just getting started.”

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


AI Can Tell if You're Gay: Artificial Intelligence Predicts Sexuality from One Photo with Startling Accuracy
2017-09-08, Newsweek
http://www.newsweek.com/ai-can-tell-if-youre-gay-artificial-intelligence-pred...

Two Stanford University researchers have reported startling accuracy in predicting sexual orientation using computer technology. Dr. Michal Kosinski and Yilun Wang, whose research will be published by the Journal of Personality and Social Psychology, say that AI can distinguish between the face of a heterosexual man and a homosexual man in 81 percent of cases. For women, the predictive accuracy is 71 percent. The average human is less adept at identifying between straight and gay people purely based on an image: We are only able to guess correctly in 61 percent of cases for men and 54 percent for women. When scientists presented the algorithm with five facial images of a single person, the accuracy increased to 91 percent for men and 83 percent for women. Kosinski and Wang used “deep neural networks” to sample 35,326 facial images of men and women taken from a dating website. The findings advance discussion about the biological factors that may determine one’s sexual orientation. However, Kosinski tells The Economist, the research is not intended to be used to profile or “out” homosexual men and women. Rather, it is designed to demonstrate - or even warn - that technological advances can be used for such means and could pose a threat to our privacy, given that digital information is so easily accessible. The researchers argue the “digitalization of our lives and rapid progress in AI continues to erode the privacy of sexual orientation and other intimate traits.”

Note: Emerging artificial intelligence technologies are currently being developed for use in warfare. According to a United Nations report, misuse of these technologies may threaten human rights. For more along these lines, see concise summaries of deeply revealing privacy news articles from reliable major media sources.


Google Doesn’t Want What’s Best for Us
2017-08-12, New York Times
https://www.nytimes.com/2017/08/12/opinion/sunday/google-tech-diversity-memo....

Google processes more than three billion search queries a day. It has altered our notions of privacy, tracking what we buy, what we search for online - and even our physical location at every moment of the day. It is a monopoly. So it matters how this company works - who it hires, who it fires and why. Last week, Google fired a software engineer for writing a memo that questioned the company’s gender diversity policies and made statements about women’s biological suitability for technical jobs. “Portions of the memo violate our code of conduct and cross the line by advancing harmful gender stereotypes,” Google’s chief executive, Sundar Pichai, wrote. It’s impossible to believe that Google or other large tech companies a few years ago would have reacted like this to such a memo. In 2011 when CNN filed a Freedom of Information Act request for the workplace diversity data on big tech companies, Google [asked] for its data to be excluded. Google began to disclose statistics [in 2014] showing that only 17 percent of its technical work force was female. Today Google is under growing scrutiny, and the cognitive dissonance between the outward-facing “Don’t be evil” stance and the internal misogynistic “brogrammer” rhetoric was too extreme. Google had to fire the offending engineer, James Damore, but anyone who spends time on the message boards frequented by Valley engineers will know that the “bro” culture that gave us Gamergate - an online movement that targeted women in the video game industry - [remains] prevalent.

Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the erosion of privacy.


Powerful NSA hacking tools have been revealed online
2016-08-16, Washington Post
https://www.washingtonpost.com/world/national-security/powerful-nsa-hacking-t...

Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days. A cache of hacking tools with code names such as Epicbanana, Buzzdirection and Egregiousblunder appeared mysteriously online over the weekend, setting the security world abuzz with speculation over whether the material was legitimate. The file appeared to be real, according to former NSA personnel who worked in the agency’s hacking division, known as Tailored Access Operations (TAO). The exploits are not run-of-the-mill tools to target everyday individuals. They are expensive software used to take over firewalls, such as Cisco and Fortinet, that are used “in the largest and most critical commercial, educational and government agencies around the world,” said [former TAO operator] Blake Darche. Some former agency employees suspect that the leak was the result of a mistake by an NSA operator, rather than a successful hack by a foreign government of the agency’s infrastructure. It is not unprecedented for a TAO operator to accidentally upload a large file of tools ... one of the former employees said. “What’s unprecedented is to not realize you made a mistake,” he said. “You would recognize, ‘Oops, I uploaded that set’ and delete it.” Critics of the NSA have suspected that the agency, when it discovers a software vulnerability, frequently does not disclose it, thereby putting at risk the cybersecurity of anyone using that product.

Note: Former US Senator Frank Church warned of the dangers of creating a surveillance state in 1975. By 2013, it had become evident that the US did not heed his warning. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


Germany halts treason inquiry into journalists after protests
2015-07-21, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2015/jul/31/germany-halts-treason-inquiry-jo...

A treason investigation into two journalists who reported that the German state planned to increase online surveillance has been suspended by the country’s prosecutor general following protests by leading voices across politics and media. Harald Range, Germany’s prosecutor general, said on Friday he was halting the investigation “for the good of press and media freedom”. It was the first time in more than half a century that journalists in Germany had faced charges of treason. His announcement followed a deluge of criticism and accusations that Germany’s prosecutor had “misplaced priorities”, having failed to investigate with any conviction the NSA spying scandal revealed by whistleblower Edward Snowden, and targeting instead the two investigative journalists, Markus Beckedahl and Andre Meister. The two reporters made reference to what is believed to be a genuine intelligence report that had been classified as confidential, which proposed establishing a new intelligence department to monitor the internet, in particular social media networks. Beckedahl hit out at the prosecutor’s investigation against him on Friday on the state broadcaster Deutschlandfunk, calling it “absurd” and suggesting it was meant as a general warning to scare sources from speaking to journalists. Much of the German media called the decision an attack on the freedom of the press.

Note: The NSA recently got caught spying on German reporters, possibly as a favor to the German government. For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of public perception.


Encouraging Words of Regret From Dean Baquet
2014-06-06, The Intercept
https://firstlook.org/theintercept/2014/06/06/encouraging-words-dean-baquet-w...

NPR’s David Folkenflik has a revealing new look at ... one of the most important journalistic stories of the last decade: The New York Times‘ 2004 decision ... to suppress for 15 months (through Bush’s re-election) its reporters’ discovery that the NSA was illegally eavesdropping on Americans without warrants. This episode was one significant reason Edward Snowden purposely excluded the Times from his massive trove of documents. In an interview with Folkenflik, the paper’s new executive editor, Dean Baquet, describes the paper’s exclusion from the Snowden story as “really painful.” But ... Baquet has his own checkered history in suppressing plainly newsworthy stories at the government’s request, including a particularly inexcusable 2007 decision, when he was the managing editor of The Los Angeles Times, to kill a story based on AT&T whistleblower Mark Klein’s revelations that the NSA had built secret rooms at AT&T to siphon massive amounts of domestic telephone traffic. In his NPR interview, Baquet insists that he has had a serious change of heart on such questions as a result of the last year of NSA revelations: "[Baquet] says the experience has proved that news executives are often unduly deferential to seemingly authoritative warnings unaccompanied by hard evidence." Dean Baquet’s epiphany about the U.S. government and the American media ... is long overdue, but better late than never. Let us hope that it signals an actual change in behavior.

Note: For more on this, see concise summaries of deeply revealing media corruption news articles from reliable major media sources.


Keep the focus on facts about NSA spying
2014-01-16, San Francisco Chronicle (SF's leading newspaper)
http://www.sfgate.com/opinion/article/Keep-the-focus-on-facts-about-NSA-spyin...

To have a genuinely constructive debate, data must be compiled, evidence must be amassed and verifiable truths must be presented. This truism is particularly significant when it comes to debates about security and liberty. Without facts, we get the counterproductive discourse we are being treated to right now - the one hijacked by National Security Administration defenders throwing temper tantrums, tossing out fear-mongering platitudes and trying to prevent any scrutiny of the agency. Tune into a national news program and you inevitably will hear pundits who have spent the last decade mindlessly cheering on wars and warrantless wiretapping now echoing the talking points emanating from surveillance-state apparatchiks like Reps. Mike Rogers, R-Mich., and Dutch Ruppersberger, D-Md. This week, these two lawmakers, who head the House Intelligence Committee, summarized all the bluster in a press release that should be enshrined for posterity. In an attempt to defend the NSA, the bipartisan duo breathlessly claimed that whistle-blower Edward Snowden ended up "endangering each and every American" by exposing the government's mass surveillance (i.e., metadata) programs. They indicted Snowden's patriotism and said his disclosures of the NSA's unlawful and unconstitutional programs "aligned him with our enemy." But the facts now leaking out of the government's national security apparatus are doing the opposite. They are debunking - rather than confirming - the NSA defenders' platitudes.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Facial Scanning Is Making Gains in Surveillance
2013-08-21, New York Times
http://www.nytimes.com/2013/08/21/us/facial-scanning-is-making-gains-in-surve...

The federal government is making progress on developing a surveillance system that would pair computers with video cameras to scan crowds and automatically identify people by their faces, according to newly disclosed documents and interviews with researchers working on the project. The Department of Homeland Security tested a crowd-scanning project called the Biometric Optical Surveillance System — or BOSS — last fall after two years of government-financed development. Although the system is not ready for use, researchers say they are making significant advances. That alarms privacy advocates, who say that now is the time for the government to establish oversight rules and limits on how it will someday be used. In a sign of how the use of such technologies can be developed for one use but then expanded to another, the BOSS research began as an effort to help the military detect potential suicide bombers. But in 2010, the effort was transferred to the Department of Homeland Security to be developed for use instead by the police in the United States. The effort to build the BOSS system involved a two-year, $5.2 million federal contract given to Electronic Warfare Associates, a Washington-area military contractor with a branch office in Kentucky. Significant progress is already being made in automated face recognition using photographs taken under ideal conditions, like passport pictures and mug shots. The Federal Bureau of Investigation is spending $1 billion to roll out a Next Generation Identification system that will provide a national mug shot database to help local police departments verify identities.

Note: For more on government and corporate threats to privacy, see the deeply revealing reports from reliable major media sources available here.


The latest effort to distract attention from the NSA revelations is more absurd than most
2013-07-13, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/2013/jul/13/reuters-article-dead-man-...

This Reuters article ... purports to summarize an interview I gave to the daily newspaper La Nacion of Argentina. Like everything in the matter of these NSA leaks, this interview is being wildly distorted to attract attention away from the revelations themselves. I made three points in this La Nacion interview, all of which are true: 1) The oft-repeated claim that Snowden's intent is to harm the US is completely negated by the reality that he has all sorts of documents that could quickly and seriously harm the US if disclosed, yet he has published none of those. When he gave us the documents he provided, he repeatedly insisted that we exercise rigorous journalistic judgment in deciding which documents should be published in the public interest and which ones should be concealed on the ground that the harm of publication outweighs the public value. 2) The US government has acted with wild irrationality. The current criticism of Snowden is that he's in Russia. But the reason he's in Russia isn't that he chose to be there. It's because the US blocked him from leaving: first by revoking his passport (with no due process or trial), then by pressuring its allies to deny airspace rights to any plane they thought might be carrying him to asylum (even one carrying the democratically elected president of a sovereign state), then by bullying small countries out of letting him land for re-fueling. 3) I said that [forcing his plane down] would be completely counter-productive given that ... such an attack could easily result in far more disclosures than allowing us as journalists to vet and responsibly report them, as we've [been] doing.

Note: The above article was written by brave journalist Glenn Greenwald, who broke the Snowden story. For more on the NSA surveillance scandal, see the deeply revealing reports from reliable major media sources available here.


The journalistic practices of the Washington Post and Walter Pincus
2013-07-10, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/2013/jul/10/washington-post-walter-pi...

On [July 10] the Washington Post published an article by its long-time reporter Walter Pincus. The article concocted a frenzied and inane conspiracy theory: that it was WikiLeaks and Julian Assange, working in secret with myself [Glenn Greenwald] and Laura Poitras, who masterminded the Snowden leaks ahead of time and directed Snowden's behavior. To peddle this tale, Pincus, in lieu of any evidence, spouted all sorts of accusatory innuendo masquerading as questions ... and invoked classic guilt-by association techniques. See the email I sent Pincus for the conclusive evidence of those factual falsehoods and the other distortions peddled by the Post. Apparently, the Washington Post has decided to weigh in on the ongoing debate over "what is journalism?" with this answer: you fill up articles on topics ... with nothing but idle speculation, rank innuendo, and evidence-free accusations, all under the guise of "just asking questions". You then strongly imply that other journalists who have actually broken a big story are involved in a rampant criminal conspiracy. What was far worse was that Pincus' wild conspiracy theorizing was accomplished only by asserting blatant, easily demonstrated falsehoods. The Post allowed the falsehoods to stand uncorrected all day. More than 8 hours after I first publicized his errors - Pincus emailed me back ... and vowed that a correction would be published. 36 hours after the Post published these falsehoods, 24 hours after I publicized them, and 15 hours after the author of this article acknowledged one of those errors and vowed a correction, the Post article still sits on the internet: uncorrected.

Note: For more on mass media corruption, see the deeply revealing reports from reliable major media sources available here.


Google challenges U.S. gag order, citing First Amendment
2013-06-18, Washington Post
http://www.washingtonpost.com/business/technology/google-challenges-us-gag-or...

Google asked the secretive Foreign Intelligence Surveillance Court on [June 18] to ease long-standing gag orders over data requests the court makes, arguing that the company has a constitutional right to speak about information it is forced to give the government. The legal filing, which invokes the First Amendment’s guarantee of free speech, is the latest move by the California-based tech giant to protect its reputation in the aftermath of news reports about broad National Security Agency surveillance of Internet traffic. Revelations about the program, called PRISM, have opened fissures between U.S. officials and the involved companies, which have scrambled to reassure their users without violating strict rules against disclosing information that the government has classified as top secret. A high-profile legal showdown might help Google’s efforts to portray itself as aggressively resisting government surveillance, and a victory could bolster the company’s campaign to portray government surveillance requests as targeted narrowly and affecting only a small number of users. [The] unusual legal move came after days of intense talks between federal officials and several of the technology companies, including Google, over what details can be released. It also comes as the firms increasingly show signs of wanting to outdo each other in demonstrating their commitment to protecting user privacy. Facebook, Microsoft and Yahoo in recent days have won federal government permission to include requests from the court as part of the overall number of data requests they receive from federal, state and local officials.

Note: For deeply revealing reports from reliable major media sources on government assaults on privacy, click here.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"