Please donate here to support this vital work.
Revealing News For a Better World

Privacy News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


NSA used city police as trackers
2006-01-13, Baltimore Sun
http://www.baltimoresun.com/news/local/bal-md.nsa13jan13,1,3964287.story

The National Security Agency used law enforcement agencies, including the Baltimore Police Department, to track members of a city anti-war group as they prepared for protests outside the sprawling Fort Meade facility, internal NSA documents show. The target of the clandestine surveillance was the Baltimore Pledge of Resistance, a group...whose members include many veteran city peace activists with a history of nonviolent civil disobedience. Since the Sept. 11 terrorist attacks, members of the group say, their protests have come under increasing scrutiny by federal and local law enforcement officials working on behalf of the NSA. An internal NSA e-mail, posted on two Internet sites this week, shows how operatives with the "Baltimore Intel Unit" provided a minute-by-minute account of Pledge of Resistances' preparations for a July 3, 2004. "****UPDATE: 11:55 HRS. S/A V------- ADVISED THE PROTESTORS LEFT 4600 YORK ROAD EN ROUTE TO THE NSA CAMPUS ... S/A V----- REPORTED FIVE OR SIX PEOPLE IN A BLUE VAN WITH BLACK BALLOONS, ANTI-WAR SIGNS AND A POSSIBLE HELIUM TANK." Some legal analysts and administration critics say the agency's actions violate the 1978 Foreign Intelligence Surveillance Act.


Military enforces 'Semper Fido' with microchips
2002-08-15, Christian Science Monitor
http://www.csmonitor.com/2002/0815/p01s04-usmi.html

Abandoned pets are a growing part of the military culture. Dogs and cats are dropped off in remote corners of the post at a rate of more than 20 a week. But the US Armed Forces are fighting back. Adopting a Big Brother approach, the military is implanting microchips in cats and dogs that live on government land – as much for animal control as for owner control. Says Fort Polk, La., Garrison Command Sgt. Maj. Ricky L. Jones of the soldier who abandons a pet, "with the chip you can't hide." Fort Polk has used the chip to track down soldiers who have abandoned their pets and forced them to pay an adoption fee. "It's a way to control our stray animal population and protect our working force, too," says Capt. Steven Baty, a veterinarian at Fort Carson, Colo., where microchipping has been mandatory since 1998. The tiny chips, the size of a grain of rice, are injected under the skin on an animal's neck and contain a bar code that can be scanned and read by humane societies and veterinary clinics nationwide. The procedure costs about $15, takes two to three seconds, and is no more painful than a typical vaccination. Microchip enforcement varies by base. At Fort Polk, La., animal controllers are part of a weekly housing patrol, joining inspectors who check to make sure lawns are cut and that soldiers aren't violating housing regulations. The animal controller carries a portable scanner and runs the wand over dogs and cats, looking for numbers to light up the small screen. If the pets don't have a microchip, soldiers are warned, and if they don't comply, their animals are taken away.

Note: The Monitor removed this article from their website. To see a copy of it on the Internet archive, click here.


Stampeding Congress, Again
2007-08-03, New York Times
http://www.nytimes.com/2007/08/03/opinion/03fri1.html?ex=1343793600&en=269721...

Since the 9/11 terrorist attacks, the Bush administration has repeatedly demonstrated that it does not feel bound by the law or the Constitution. It cannot even be trusted to properly use the enhanced powers it was legally granted after the attacks. Yet, once again, President Bush has been trying to stampede Congress into a completely unnecessary expansion of his power to spy on Americans. The fight is over the 1978 Foreign Intelligence Surveillance Act, which requires the government to obtain a warrant before eavesdropping on electronic communications that involve someone in the United States. Mr. Bush decided after 9/11 that he was no longer going to obey that law. He authorized the National Security Agency to intercept international telephone calls and e-mail messages of Americans and other residents of this country without a court order. He told the public nothing and Congress next to nothing about what he was doing, until The Times disclosed the spying in December 2005. Ever since, the White House has tried to pressure Congress into legalizing Mr. Bush’s rogue operation. The administration and its ... supporters in Congress argue that American intelligence is blinded by FISA and have seized on neatly timed warnings of heightened terrorist activity to scare everyone. It is vital for Americans, especially lawmakers, to resist that argument. It is pure propaganda. [The question at issue is] whether we are a nation ruled by law, or the whims of men in power.


AT+T revises privacy policy, says owns customer data
2006-06-22, ABC News/Reuters
http://abcnews.go.com/US/wireStory?id=2105967

AT&T Inc. said on Wednesday it was revising its privacy policy, explaining to customers that it owns their phone records and can hand them over to law enforcers if necessary. The changes...come at a time when AT&T and other phone companies face lawsuits claiming they aided a U.S. government domestic spying program by giving the National Security Agency call records of millions of customers without their permission. The new policy, unlike the old one, spells out the fact that AT&T...customer information constitutes "business records that are owned by AT&T. As such, AT&T may disclose such records to protect its legitimate business interests, safeguard others, or respond to legal process." The earlier policy had simply said that...the company could share customer information to "respond to subpoenas, court orders or other legal process, to the extent required and/or permitted by law." Under the new policy...the company also said that it would track viewing information for customers of a television service it is developing in order to help it make recommendations to customers based on their viewing habits. It also said that before customers use its services they must agree to the policy, an element that was not in its previous guidelines.


Tracking The Companies That Track You Online
2010-08-19, NPR
http://www.npr.org/templates/story/story.php?storyId=129298003

One of the fastest-growing online businesses is the business of spying on Internet users by using sophisticated software to track movements through the Web, so that the information can be sold to advertisers. Julia Angwin recently led a team of reporters from The Wall Street Journal in analyzing the tracking software. They discovered that nearly all of the most commonly visited websites gather information in real time about the behavior of online users. The Journal series identified more than 100 tracking companies, data brokers and advertising networks collecting data — which are then sold on a stock market-like exchange to online advertisers. Angwin explains how consumer surveillance works, how users can disable the tracking software — and how advertisers are continually evolving to keep up with the data they receive. She notes that many Internet users are unaware that their information is being tracked and then traded. "Most people that we have heard from since writing these stories did not know what was going on," Angwin explains. "So when you go to a website, you're not thinking about the fact that they might have relationships with all different types of monitoring firms, and those firms are installing things that are invisible to you on your computer."

Note: Julia Angwin is senior technology editor of The Wall Street Journal, and author of the book, Stealing MySpace: The Battle to Control the Most Popular Website in America. For lots more on growing threats to privacy, click here.


Greater Use of Privilege Spurs Concern
2008-01-29, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/01/28/AR20080128024...

The U.S. government has been increasing its use of the state secrets privilege to avoid disclosure of classified information in civil lawsuits. Some legal scholars and members of Congress contend that the Bush administration has employed it excessively as it intervened in cases that could expose information about sensitive programs. These include the rendition of detainees to foreign countries for interrogation and cases related to the National Security Agency's use of warrantless wiretaps. The privilege allows the government to argue that lawsuits -- and the information potentially revealed by them -- could damage national security. It gives judges the power to prevent information from reaching public view or to dismiss cases even if they appear to have merit. Sen. Edward M. Kennedy (D-Mass.) ... cited statistics that show the Bush administration has used the state secrets privilege substantially more, on a percentage basis, than previous administrations to block or dismiss lawsuits. Kevin Bankston, a lawyer with the Electronic Frontier Foundation ... said "The administration is attempting to use the privilege as a back-door immunity to obtain dismissal of any case that attempts to put the NSA wiretapping issue in front of a judge. It is no secret such a program existed."

Note: For many disturbing reports on government secrecy from reliable sources, click here.


Journalist in legal battle with military
2007-01-05, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2007/01/05/DDG4HNCE5R1.DTL

The questions from the civilian spokesman at Fort Lewis started sounding suspicious to Sarah Olson. He had called to ask the Oakland freelance journalist about the accuracy of quotes in her story about Lt. Ehren Watada, which had appeared on the liberal Web site Truthout.org. As the telephone conversation progressed, Olson realized that the military was using her to fortify its case against Watada, whom it was prosecuting as the first commissioned officer to refuse deployment to Iraq. While Watada faces a court-martial next month for conduct unbecoming an officer, the U.S. military pursues Olson. Last month, military prosecutors subpoenaed the 31-year-old writer and radio journalist, asking her to appear at his court-martial, scheduled to begin next month, to verify what Watada said. If Olson doesn't testify, she faces six months in jail or a $500 fine and a felony charge for a story she was paid $300 to write. Olson doesn't want to be part of a legal action that she believes limits someone's free speech. She came to journalism six years ago ... hoping to create more places for dissenting or seldom-heard voices, not fewer. "Journalists should not be asked to participate in the prosecution of political speech," Olson said. [She] isn't being asked to reveal unpublished work. "What I don't understand is why they (prosecutors) can't get this information digitally," said Fidell, president of the National Institute of Military Justice. Olson doesn't have a problem with journalists testifying in court. She doesn't want journalists to be coerced to testify in cases that could limit free speech.

Note: Truthout.org is one of the main sources of our information. Interesting that one of their reporters should be targeted in this way. For stories by 20 award-winning journalists on how the media is controlled, click here.


The Agency That Could Be Big Brother
2005-12-25, New York Times
http://www.nytimes.com/2005/12/25/weekinreview/25bamford.html?ex=1293166800&e...

Deep in a remote, fog-layered hollow near Sugar Grove, W.Va., hidden by fortress-like mountains, sits the country's largest eavesdropping bug. The station's large parabolic dishes secretly and silently sweep in millions of private telephone calls and e-mail messages an hour. Run by the ultrasecret National Security Agency, the listening post intercepts all international communications entering the eastern United States. Another N.S.A. listening post, in Yakima,Wash., eavesdrops on the western half of the country. According to John E. McLaughlin, who as the deputy director of the Central Intelligence Agency in the fall of 2001 was among the first briefed on the program, this eavesdropping was the most secret operation in the entire intelligence network, complete with its own code word - which itself is secret. Jokingly referred to as "No Such Agency," the N.S.A. was created in absolute secrecy in 1952 by President Harry S. Truman. But the agency is still struggling to adjust to the war on terror. At home, it increases pressure on the agency to bypass civil liberties and skirt formal legal channels of criminal investigation. Originally created to spy on foreign adversaries, the N.S.A. was never supposed to be turned inward.

Note: Don't miss the amazing article on Operation Northwoods by the author of this article, former ABC producer James Bamford. It details the 1962 plans of the Pentagon chiefs to foment terrorism in the US as a pretext for war with Cuba. See http://www.WantToknow.info/010501operationnorthwoods


Invoking Secrets Privilege Becomes a More Popular Legal Tactic
2006-06-04, New York Times
http://www.nytimes.com/2006/06/04/washington/04secrets.html?ex=1307073600&en=...

Facing a wave of litigation challenging its eavesdropping at home and its handling of terror suspects abroad, the Bush administration is increasingly turning to a legal tactic that swiftly torpedoes most lawsuits: the state secrets privilege. Officials have used the privilege...to ask the courts to throw out three legal challenges to the National Security Agency's domestic surveillance program. The privilege claim, in which the government says any discussion of a lawsuit's accusations would endanger national security, has short-circuited judicial scrutiny and public debate. While the privilege...was once used to shield sensitive documents or witnesses from disclosure, it is now often used to try to snuff out lawsuits at their inception. "If the very people you're suing are the ones who get to use the state secrets privilege, it's a stacked deck," said Representative Christopher Shays, Republican of Connecticut. Robert M. Chesney, a law professor at Wake Forest University...said the administration's legal strategy "raises profound legal and policy questions." Under Mr. Bush, the secrets privilege has been used to block a lawsuit by a translator at the Federal Bureau of Investigation, Sibel Edmonds, who was fired after accusing colleagues of security breaches. Two lawsuits challenging the government's practice of rendition, in which terror suspects are seized and delivered to detention centers overseas, were dismissed after the government raised the secrets privilege.

Note: Sibel Edmonds is one of several whistleblowers with powerfully incriminating information on 9/11 who have been silenced with tactics like those mentioned above. To learn more about this critical case which has been blocked, see http://www.WantToKnow.info/050131sibeledmonds


GOP lawmakers demand that 'alarming' memo on FISA abuses be made public
2018-01-19, MSN/Fox News
https://www.msn.com/en-us/news/politics/gop-lawmakers-demand-that-alarming-me...

A four-page memo circulating in Congress that reveals alleged United States government surveillance abuses is being described by lawmakers as “shocking.” The lawmakers said they could not yet discuss the contents of the memo they reviewed on Thursday after it was released to members by the House Intelligence Committee. But they say the memo should be immediately made public. “It is so alarming the American people have to see this,” Ohio Rep. Jim Jordan said. “It's troubling,” North Carolina Rep. Mark Meadows said. “Part of me wishes that I didn't read it because I don’t want to believe that those kinds of things could be happening in this country that I call home and love so much.” The House Intelligence Committee on Thursday approved a motion by New York Rep. Pete King to release the memo on abuses of FISA, or the Foreign Intelligence Surveillance Act, to all House members. The memo details the Intelligence Committee’s oversight work for the FBI and Justice, including the controversy over unmasking and FISA surveillance. The process for releasing it to the public involves a committee vote. If approved, it could be released as long as there are no objections from the White House within five days. On Thursday, the Senate voted 65-34 to reauthorize a FISA provision that allows U.S. spy agencies to conduct surveillance on foreign targets abroad for six years.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


As Standing Rock Camps Cleared Out, TigerSwan Expanded Surveillance to Array of Progressive Causes
2017-06-12, The Intercept
https://theintercept.com/2017/06/21/as-standing-rock-camps-cleared-out-tigers...

Leaked documents and public records reveal a troubling fusion of private security, public law enforcement, and corporate money in the fight over the Dakota Access Pipeline. By the time law enforcement officers began evicting residents of the ... resistance camp near the Standing Rock Sioux reservation on February 22, the brutal North Dakota winter had already driven away most of the pipeline opponents. It would have been a natural time for the private security company in charge of monitoring the pipeline to head home. But internal communications between TigerSwan and its client, pipeline parent company Energy Transfer Partners, show that the security firm instead reached for ways to stay in business. Indeed, TigerSwan appeared to be looking for new causes, too. The ... firm’s sweeping surveillance of anti-Dakota Access protesters had already spanned five months and expanded into Iowa, South Dakota, and Illinois. TigerSwan became particularly interested in Chicago. [Leaked] documents dated between February 19 and February 21 describe TigerSwan’s efforts to monitor an anti-Trump protest organized by the local chapter of the Answer Coalition, an anti-war, anti-racism group. Answer Coalition’s ... John Beacham, who organized the protest TigerSwan described, said that [the NoDAPL movement] was not the event’s primary focus. “They’re trying to make connections where they aren’t. It’s almost like they’re trying to cast conspiracy theories across the entire progressive movement,” he told The Intercept.

Note: The above article is part of an in-depth series, and includes many original source documents. Standing Rock activists were also targeted for investigation by the FBI’s joint terrorism taskforce. For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy.


Federal Court Revives Wikimedia’s Challenge to N.S.A. Surveillance
2017-05-23, New York Times
https://www.nytimes.com/2017/05/23/us/politics/nsa-surveillance-warrantless-w...

A federal appeals court on Tuesday revived a high-profile challenge to the National Security Agency’s warrantless surveillance of internet communications. The ruling ... increases the chances that the Supreme Court may someday scrutinize whether the N.S.A.’s so-called upstream system for internet surveillance complies with Fourth Amendment privacy rights. The ruling reversed a Federal District Court judge’s decision to throw out the case. The district judge had ruled that the plaintiffs - including the Wikimedia Foundation - lacked standing to sue because they could not prove that their messages had been intercepted. Because of how the internet works, surveillance of communications crossing network switches is different from traditional circuit-based phone wiretapping. While the government can target a specific phone call without touching anyone else’s communications, it cannot simply intercept a surveillance target’s email. Instead ... to find such emails it is necessary first to systematically copy data packets crossing a network switch and sift them in search of components from any messages involving a target. Documents provided by [Edward] Snowden and declassified by the government have shown that this system works through equipment installed at the facilities of companies, like AT&T, that [connect] the American internet to the rest of the world. Privacy advocates contend that the initial copying and searching of all those data packets ... violates Fourth Amendment protections against government search and seizure.

Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


Snowden: FBI's claim it can't unlock the San Bernardino iPhone is 'bullshit'
2016-03-09, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/technology/2016/mar/09/edward-snowden-fbi-san-bern...

Edward Snowden, the whistleblower whose NSA revelations sparked a debate on mass surveillance, has waded into the arguments over the FBI’s attempt to force Apple to help it unlock the iPhone 5C of one of the San Bernardino shooters. The FBI says that only Apple can deactivate certain passcode protections on the iPhone, which will allow law enforcement to guess the passcode by using brute-force. Talking via video link from Moscow to the Common Cause Blueprint for a Great Democracy conference, Snowden said: “The FBI says Apple has the ‘exclusive technical means’ to unlock the phone. Respectfully, that’s bullshit.” Snowden then went on to tweet his support for an American Civil Liberties Union report saying that the FBI’s claims in the case are fraudulent. Apple co-founder Steve Wozniak also spoke out against the FBI on the Conan O’Brien show on Monday, saying: “I side with Apple on this one. [The FBI] picked the lamest case you ever could.” Wozniak added: “Verizon turned over all the phone records and SMS messages. So they want to take this other phone that the two didn’t destroy, which was a work phone. It’s so lame and worthless to expect there’s something on it and to get Apple to expose it.” Apple’s clash with the FBI comes to a head in California this month when the two will meet in federal court to debate whether the smartphone manufacturer should be required to weaken security settings on the iPhone of the shooter.

Note: According to The New York Times, the FBI has been misleading the public about the San Bernadino attacks for months. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


FBI spied on Burning Man music festival, documents reveal
2015-09-06, Houston Chronicle (A leading newspaper of Houston, Texas)
http://www.chron.com/national/article/FBI-spied-on-Burning-Man-music-festival...

Newly-released documents show that FBI spied on the Burning Man festival in 2010. It remains unclear if FBI agents actually attended the event. Burning Man [takes place] in an isolated Nevada desert, where up to 70,000 people gather annually for music, art, drugs and large fires. The revelations of federal surveillance come from heavily-redacted internal FBI memos handed to ... reporter Inkoo Kang, who filed a request under the federal Freedom of Information Act for any FBI documents "mentioning the phrase 'Burning Man." In late August, a private security firm contacted the FBI's Las Vegas division for help conducting a "threat assessment" ahead of the event, to which the FBI replied that they had no worrying intelligence about Burning Man. Days later, the Las Vegas division messaged the FBI's Special Events Management Unit requesting guidance on planning an approach to the festival. A subsequent paragraph, sandwiched between two entirely-redacted paragraphs, said, "scheduled overtime for special agents assigned to work special events will be approved under certain very limited and relatively rare circumstances," raising question over whether or not FBI special agents were deployed at Burning Man. A final memo listed two "accomplishments" from the operation; one was redacted, the other was "local agency liaison established/utilized." The FBI concluded that the greatest threat present at Burning Man was "use of illegal drugs by the participants."

Note: The CIA once used art as a weapon in its propaganda campaigns. Is the investigation of a large art festival merely another erosion of privacy, or is the FBI up to something comparably strange?


Facial Recognition Software Moves From Overseas Wars to Local Police
2015-08-12, New York Times
http://www.nytimes.com/2015/08/13/us/facial-recognition-software-moves-from-o...

Facial recognition software, which American military and intelligence agencies used for years in Iraq and Afghanistan to identify potential terrorists, is being eagerly adopted by dozens of police departments around the country. It is being used with few guidelines and with little oversight or public disclosure. Facial recognition ... is among an array of technologies, including StingRay tracking devices and surveillance aircraft with specialized cameras, that were used in overseas wars but have found their way into local law enforcement. The F.B.I. is pushing ahead with its $1 billion Next Generation Identification program, in which the agency will gather data like fingerprints, iris scans and photographs, as well as information collected through facial recognition software. The F.B.I. system will eventually be made accessible to more than 18,000 local, state, federal and international law enforcement agencies. But people who are not criminal suspects are included in the database, and the error rate for the software is as high as 20 percent — meaning the authorities could misidentify millions of people. Among the cities that use facial recognition technology are New York and Chicago, which has linked it to 25,000 surveillance cameras. In many ways, though, San Diego County is at the forefront. Here, beat cops, detectives and even school police officers have been using hand-held devices to create a vast database of tens of thousands of photos of people — usually without the person’s consent.

Note: For more along these lines, read about the increasing militarization of police in the U.S. after 9/11, or see concise summaries of deeply revealing news articles about the erosion of privacy rights.


Edward Snowden wins Swedish human rights award for NSA revelations
2014-12-01, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/us-news/2014/dec/01/nsa-whistlebloewer-edward-snow...

Whistleblower Edward Snowden received several standing ovations in the Swedish parliament after being given the Right Livelihood award for his revelations of the scale of state surveillance. Snowden, who is in exile in Russia, addressed the parliament by video from Moscow. In a symbolic gesture, his family and supporters said no one picked up the award on his behalf in the hope that one day he might be free to travel to Sweden to receive it in person. Snowden is wanted by the US on charges under the Espionage Act. His chances of a deal with the US justice department that would allow him to return home are slim and he may end up spending the rest of his days in Russia. His supporters hope that a west European country such as Sweden might grant him asylum. The awards jury, in its citation, said Snowden was being honoured “for his courage and skill in revealing the unprecedented extent of state surveillance violating basic democratic processes and constitutional rights”. The chamber was filled with members of parliament from almost all the parties. The Guardian editor, Alan Rusbridger, was also among the recipients. The jury citation said his award was in celebration of “building a global media organisation dedicated to responsible journalism in the public interest, undaunted by the challenge of exposing corporate and government malpractices”.

Note: For more along these lines, read how Wikipedia founder Jimmy Wales considers Edward Snowden a hero. For more on the Snowden case, see the deeply revealing reports from reliable major media sources available here.


For some firms, NSA eavesdropping means business
2014-08-12, San Francisco Chronicle (SF's leading newspaper)
http://www.sfgate.com/technology/article/For-some-firms-NSA-eavesdropping-mea...

To many Americans, online eavesdropping by the U.S. National Security Agency is an outrage, a threat to privacy and freedom. To some, it's a business opportunity. A small but growing number of companies have introduced Internet and communications services designed to shield users from the government's eyes. A few even advertise their products as "NSA-proof." Many of the companies have been offering encrypted online services for years, scrambling their customers' data and communications in ways that require the right computer-generated "key" to decode. They are at least as concerned with thwarting private hackers and corporate spies as they are with blocking federal agents. But some entrepreneurs in the field found motivation in the NSA, after learning that the agency has been collecting troves of Internet and phone data on ordinary citizens for years. "Privacy and democracy go hand in hand - that's why this is so important," said Jason Stockman, one of the creators of ProtonMail, which began offering an encrypted e-mail service in May. "Our goal is to protect people against mass surveillance." But most companies will quickly admit that if the NSA - or some foreign intelligence service - really wants your data, they can't guarantee protection. Since the NSA conducts its business in secret, its full capabilities remain a matter of speculation. Most companies that invoke the NSA in their marketing focus on encryption.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Indiana Woman Sues US Customs Over Detention
2014-02-20, CBS Cleveland
http://cleveland.cbslocal.com/2014/02/20/indiana-woman-sues-us-customs-over-d...

An Indiana University faculty member has sued two U.S. customs agents for detaining her after the government eavesdropped on emails she exchanged with a Greek friend. The American Civil Liberties Union of Indiana filed a federal lawsuit [on February 19] alleging the customs agents violated Christine Von Der Haar’s constitutional protection against unreasonable searches and seizures. “This case raises troubling issues about the power of the government to detain and question citizens,” said Ken Falk, the ACLU of Indiana legal director who represents Von Der Haar. The lawsuit alleges Von Der Haar, a senior lecturer in the sociology department at Indiana University in Bloomington, was confined in a guarded room at Indianapolis International Airport for more than 20 minutes on June 8, 2012, while she was questioned about her relationship with her friend. The lawsuit alleges the questioning was based on surreptitious monitoring of communications between Von Der Haar and her friend, Dimitris Papatheodoropoulus. The two “communicated frequently through emails. Some of these emails were flirtatious and romantic in nature,” the lawsuit said. Von Der Haar felt she had no choice but to answer questions from the agents, whom she believed to be armed, and did not believe she could leave until they released her, the lawsuit said. “The detention of Dr. Von Der Haar was without cause or justification,” the complaint said, and “caused her anxiety, concern, distress and other damages.” The lawsuit names the two customs agents as defendants and seeks damages.

Note: For more on government abuses of civil liberties, see the deeply revealing reports from reliable major media sources available here.


Edward Snowden a 'hero' for NSA disclosures, Wikipedia founder says
2013-11-25, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/nov/25/edward-snowden-nsa-wikipedia-fou...

Jimmy Wales, the founder of Wikipedia, has called on Barack Obama to rein in the National Security Agency as he described the whistleblower Edward Snowden as "a hero" whom history will judge "very favourably". Wales called for a "major re-evaluation" of the NSA, adding that the public "would have never approved this sweeping surveillance program" had it been put to a vote. The revelations, Wales said, had been "incredibly damaging and embarrassing to the US. It makes it very difficult for someone like me to go out, as I do, [to] speak to people in authoritarian countries, and say: 'You shouldn’t be spying on activists, you shouldn’t be censoring the internet', when we [in the US] are complicit in these acts of extraordinary intrusion into people’s personal lives. [Snowden] has exposed what I believe to be criminal wrongdoing, lying to Congress, and certainly [an] affront to the Fourth Amendment. I think that history will judge him very favourably. There is a growing sense of concern in Congress about this, a growing sense in Congress that public is angry about this, that they have been misled and I think we are going to see legislation to change this."

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Guardian teams up with New York Times over Snowden documents
2013-08-23, MSN/Reuters
http://money.msn.com/business-news/article.aspx?feed=OBR&date=20130823&id=168...

The Guardian has agreed with the New York Times to give the U.S. newspaper access to some classified documents leaked by former National Security Agency contractor Edward Snowden, both papers said on [August 23]. In a brief story posted on its website, the Guardian said it "struck a partnership" with the Times after the British government threatened the Guardian with legal action unless it either surrendered or destroyed files it received from Snowden about Government Communications Headquarters - Britain's equivalent of NSA. The Times' executive editor, Jill Abramson, confirmed the collaboration. A source familiar with the matter said the partnership deal had been struck several weeks ago and that Abramson was personally involved in negotiating it. The Guardian said in its story that its partnership with the Times would enable it to "continue exposing mass surveillance by putting the Snowden documents on GCHQ beyond government reach." The Times and the Guardian previously collaborated on stories related to alleged phone hacking by British tabloid newspapers and on coverage of secret U.S. military and diplomatic documents made available by U.S. Army soldier Bradley Manning to the WikiLeaks website.

Note: For more on the NSA spying scandal, see the deeply revealing reports from reliable major media sources available here.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"