Civil Liberties Media ArticlesExcerpts of Key Civil Liberties Media Articles in Major Media
Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
The intelligence services have routinely been intercepting legally privileged communications ... according to internal MI5, MI6 and GCHQ documents. The information obtained may even have been exploited unlawfully and used by the agencies in the fighting of court cases in which they themselves are involved, the Investigatory Powers Tribunal (IPT) has been told. MP David Davis, a former shadow home secretary, said past practice was to delete such material immediately if it was ever picked up. 28 extracts of internal intelligence policies showing how legally privileged material is handled by security officials were released to lawyers pursuing a claim through the IPT. The claim has been brought by two Libyans, Abdel-Hakim Belhaj and Sami Al Saadi. They were abducted in a joint MI6-CIA operation and ... tortured by Colonel Muammar Gaddafi’s regime in 2004. Belhaj has been given permission to sue the government for his mistreatment. Davis, who attended the hearing, said: “In the past, when a bug or intercept on a criminal accidentally picked up a conversation with the criminal’s lawyer, the rule was that it was immediately deleted. Today’s hearing shows that is no longer the case. Agencies are clearly keeping records of legal privileged material, and have explicit policies to handle it. In the case of MI5 that policy includes concealing ... that they have the material. This change has been carried out without changing the law or telling parliament. This is an enormous breach of defendants’ judicial rights.”
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable sources.
(senior federal district judge) Jed A. Rakoff’s essay in The New York Review of Books ... tries to explain why innocent people so often plead guilty. At least 20,000 people have pled guilty to and gone to jail for felonies they did not commit — if you very conservatively take criminologists’ lowest estimates, and cut them in half. Rakoff identifies three ways the criminal justice system obstructs its own “truth seeking mechanism,” a trial by jury: 1. By embracing the increasingly popular plea bargain. 97 percent of federal trials were resolved last year through plea bargain. Plea bargains ... are weighted largely in favor of the prosecutor. The notion that a plea bargain is a contractual mediation between two relatively equal parties, Rakoff argues, “is a total myth”. 2. Through mandatory minimum sentences. The combination of mandatory sentences and prosecutorial discretion forces the defendant [to] run the risk of losing the case and serve the maximum sentence or take a reduced charge, at a reduced sentence, even when innocent. 3. Via the unfettered rise of prosecutorial power. Prosecutors have far more power ... than any other party involved in the criminal justice system. The one mechanism that could check their power is the jury trial, which is becoming “virtually extinct” in federal court, Rakoff writes. One possible solution to all these problems — aside from repealing mandatory minimum sentences and generally reducing the severity of sentences — is greater judicial oversight.
For almost 40 years, Carole Hinders has dished out Mexican specialties at her modest cash-only restaurant. She deposited the earnings at a small bank branch a block away — until last year, when two tax agents knocked on her door and informed her that they had seized her checking account. She has not been charged with any crime. The money was seized solely because she had deposited less than $10,000 at a time. Using a law designed to catch drug traffickers ... the government has gone after run-of-the-mill business owners and wage earners without so much as an allegation that they have committed serious crimes. The government can take the money without ever filing a criminal complaint. Richard Weber, the chief of Criminal Investigation at the I.R.S., said in a written statement ... that making deposits under $10,000 to evade reporting requirements, called structuring, is ... a crime. The Institute for Justice, a Washington-based public interest law firm ... analyzed structuring data from the I.R.S., which made 639 seizures in 2012, up from 114 in 2005. Only one in five was prosecuted as a criminal structuring case. Law enforcement agencies get to keep a share of whatever is forfeited. This incentive has led to the creation of a law enforcement dragnet, with more than 100 multiagency task forces combing through bank reports, looking for accounts to seize. There are often legitimate business reasons for keeping deposits below $10,000, said Larry Salzman, a lawyer with the Institute for Justice. For example, he said, a grocery store owner in Fraser, Mich., had an insurance policy that covered only up to $10,000 cash.
Note: For more along these lines, see concise summaries of deeply revealing civil liberties news articles.
Did you know that when you buy an airline ticket and make other travel reservations, the federal government keeps a record of the details in a file called Passenger Name Record or PNR? If airlines don’t comply, they can’t fly in the U.S., explains Ed Hasbrouck, a privacy expert with the Identity Project who has studied the records for years and is considered the nation’s top expert. Before each trip, the system creates a travel score for you, generated by your PNR. Before an airline can issue you a boarding pass, the system must approve your passage, Hasbrouck explains. That’s one way people on the No Fly List are targeted. The idea behind extensive use of PNRs, he says, is not necessarily to watch known suspects but to find new ones. Want to appeal the process? “It’s a secret administrative process based on the score you don’t know, based on files you haven’t seen,” Hasbrouck says. The program collects seemingly trivial details. If you have an argument with an airline gate agent and that agent enters a notation ... that record stays in your PNR. “The U.S. government is getting the data and sharing it in ways we don’t fully know about with other governments,” Hasbrouck says. The information collected by the airlines is shared with third-party data companies who store it. Where? In the cloud. Make you feel safer? In Canada and the European Union, the collection of this information spurred public debate. But not here.
Note: Read this excellent article for lots more details on how the government spies on your travels. For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable sources.
Last week, a federal judge told us what we already knew. Namely, that police in Ferguson, Mo. violated the rights of protesters demonstrating against the shooting death of Michael Brown. U.S. District Judge Catherine Perry struck down an ad hoc rule under which cops had said people could not stand still while peacefully protesting. Still, one’s sense of righteous vindication is tempered by the fact that police felt free to try this absurd stratagem in the first place — and by the fact that this was hardly the only recent example of police using the Constitution for Kleenex. Ferguson, let us not forget, is also the town where reporters were tear gassed and jailed and photographers ordered to stop taking pictures. In our unthinking mania for laws to “get tough on crime,” we actually made it tougher on ourselves, altering the balance of power between people and police to the point where a cop can now take your legally-earned money off your sovereign person and there’s little you can do about it. Indeed, at the height of the Ferguson protests, an L.A. cop named Sunil Dutta published in the Washington Post an Op-Ed advising that, “if you don’t want to get shot, tased, pepper-sprayed, struck with a baton or thrown to the ground, just do what I tell you.” Don’t argue, he said, even if you “believe (or know)” your rights are being violated. Deal with it later. It’s all well and good that now, several weeks after the fact, a court affirms the rights Ferguson police denied. But that’s a poor consolation prize. An argument can be made that rights which aren’t respected in the moment they are asserted are not really rights at all.
Note: For more on the history of civil rights violations in Ferguson, MO, see this deeply revealing news article. For more along these lines, see concise summaries of recent news articles about the erosion of our civil liberties from reliable major media sources.
[National security letters], the reach of which was expanded under the Patriot Act in 2001, let the FBI get business records from telephone, banking, and Internet companies with just a declaration that the information is relevant to a counterterrorism investigation. The FBI can get such information with a subpoena or another method with some judicial oversight. Can the government make demands for data entirely in secret? That was the question yesterday before a federal appeals court in San Francisco, where government lawyers argued that National Security Letters — FBI requests for information that are so secret they can’t be publicly acknowledged by the recipients — were essential to counterterrorism investigations. One of the judges seemed to question why there was no end-date on the gag orders, and why the burden was on the recipients of NSLs to challenge them. “It leaves it to the poor person who is subject to those requirements to just constantly petition the government to get rid of it,” said the judge, N. Randy Smith. The FBI sends out thousands of NSLs each year – 21,000 in fiscal year 2012. Google, Yahoo, Facebook and Microsoft filed a brief in support of the NSL challenge, arguing that they want to “publish more detailed aggregate statistics about the volume, scope and type of NSLs that the government uses to demand information about their users.” Twitter also announced this week that it was suing the U.S. government over restrictions on how it can talk about surveillance orders. Tech companies can currently make public information about the number of NSLs or Foreign Intelligence Surveillance Court orders they receive in broad ranges, but Twitter wants to be more specific.
Note: For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
Prime Minister John Key ... has denied that New Zealand’s spy agency GCSB engages in mass surveillance, mostly as a means of convincing the country to enact a new law vesting the agency with greater powers. Let me be clear: any statement that mass surveillance is not performed in New Zealand, or that the internet communications are not comprehensively intercepted and monitored, or that this is not intentionally and actively abetted by the GCSB, is categorically false. If you live in New Zealand, you are being watched. At the NSA I routinely came across the communications of New Zealanders in my work with a mass surveillance tool we share with GCSB, called “XKEYSCORE.” It allows total, granular access to the database of communications collected in the course of mass surveillance. It is not limited to or even used largely for the purposes of cybersecurity, as has been claimed, but is instead used primarily for reading individuals’ private email, text messages, and internet traffic. I know this because it was my full-time job in Hawaii, where I worked every day in an NSA facility with a top secret clearance. The prime minister’s claim to the public, that “there is no and there never has been any mass surveillance” is false. The GCSB, whose operations he is responsible for, is directly involved in the untargeted, bulk interception and algorithmic analysis of private communications sent via internet, satellite, radio, and phone networks. It means they have the ability see every website you visit, every text message you send, every call you make, every ticket you purchase, every donation you make, and every book you order online. From “I’m headed to church” to “I hate my boss” to “She’s in the hospital,” the GCSB is there. Your words are intercepted, stored, and analyzed by algorithms long before they’re ever read by your intended recipient.
Note: New Zealand's prime minister has acknowledged that Snowden may be right, as reported in this article. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed [on September 11] that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program. The documents ... outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms. The ruling by the Foreign Intelligence Surveillance Court of Review became a key moment in the development of PRISM, helping government officials to convince other Silicon Valley companies that unprecedented data demands had been tested in the courts and found constitutionally sound. Eventually, most major U.S. tech companies, including Google, Facebook, Apple and AOL, complied. Microsoft had joined earlier, before the ruling, NSA documents have shown. PRISM was first revealed by former NSA contractor Edward Snowden last year. Documents made it clear that the program allowed the NSA to order U.S.-based tech companies to turn over e-mails and other communications to or from foreign targets without search warrants for each of those targets. Other NSA programs gave even more wide-ranging access to personal information of people worldwide, by collecting data directly from fiber-optic connections.
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
Amid widespread criticism of the deployment of military-grade weapons and vehicles by police officers in Ferguson, MO ... NPR obtained data from the Pentagon on every military item sent to local, state and federal agencies through the Pentagon's Law Enforcement Support Office — known as the 1033 program — from 2006 through April 23, 2014. We took the raw data, analyzed it and have organized it. We are making that data set available to the public. The 1033 program is the key source of ... military items being sent to local law enforcement [such as] mine-resistant, ambush-protected vehicles, or MRAPs. More than 600 of them have been sent ... mostly within the past year. The Pentagon has also distributed: 79,288 assault rifles, 205 grenade launchers, 11,959 bayonets, 3,972 combat knives, $124 million worth of night-vision equipment, including night-vision sniper scopes, 479 bomb detonator robots, 50 airplanes, 422 helicopters, [and] more than $3.6 million worth of camouflage gear and other "deception equipment." The list [also] includes building materials, musical instruments and even toiletries. Congress authorized the 1033 program in 1989 to equip local, state and federal agencies in the war on drugs. In 1996, Congress widened the program's scope to include counterterrorism. The data do not confirm whether either of those public safety goals are, in fact, driving decisions.
Khalid Sheikh Mohammed [is] facing a military commission at Guantanamo Bay and potentially the death penalty. He was captured in 2003 but his case still hasn't gone to trial. Last week, Maj. Jason Wright — one of the lawyers defending Mohammed — resigned from the Army. He has accused the U.S. government of "abhorrent leadership" on human rights and due process guarantees and says it is crafting a "show trial." For nearly three years, he served on Mohammed's defense team. Wright formally resigned on Aug. 26. Wright [says] that it's hard to gain any client's trust, but it was especially hard with Mohammed. His former client is one of six "high-value detainees" being prosecuted at Guantanamo for offenses that could carry the death penalty. "All six of these men have been tortured by the U.S. government," he says. Wright says Mohammed in particular has faced a level of torture "beyond comprehension." He says his client was waterboarded by the CIA 183 times and subjected to over a week of sleep deprivation; there were threats that his family would be killed. "And those are just the declassified facts that I'm able to actually speak about," Wright says. Wright wasn't allowed to discuss too many details of the detainee abuse in court. "The CIA tortured these men. They've gone to extraordinary lengths to try to keep that completely hidden from public view," Wright says. "So the statute that Congress passed has a number of protections to ensure that no information about the U.S. torture program will ever come out."
Note: Why hasn't this been covered by other major media in the US? For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
The US government’s web of surveillance is vast and interconnected. You can be pulled into the National Security Agency’s database quietly and quickly. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors. The watchlist [is] based on [low] standards and secret evidence, which ensnares innocent people. Indeed, the standards are so low that the US government’s guidelines specifically allow for a single, uncorroborated source of information – including a Facebook or Twitter post – to serve as the basis for placing you on its master watchlist. Of the 680,000 individuals on that FBI master list, roughly 40% have “no recognized terrorist group affiliation”, according to the Intercept. These individuals don’t even have a connection – as the government loosely defines it – to a designated terrorist group, but they are still branded as suspected terrorists. The US [government uses] a loose standard – so-called “reasonable suspicion” – in determining who, exactly, can be watchlisted. ["Reasonable suspicion"] requires neither “concrete evidence” nor “irrefutable evidence”. Instead, an official is permitted to consider “reasonable inferences” and “to draw from the facts in light of his/her experience”.
Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
Who runs the world’s most lucrative shakedown operation? If you are a big business ... America’s regulatory system. The formula is simple: find a large company that may (or may not) have done something wrong; threaten its managers; force them to use their shareholders’ money to pay an enormous fine to drop the charges in a secret settlement. Repeat with another large company. In many cases, the companies deserved some form of punishment: BNP Paribas ... abetted genocide, American banks fleeced customers. BP despoiled the Gulf of Mexico. But justice should not be based on extortion. Regulators and prosecutors are in effect conducting closed-door trials. The agencies that pocket the fines have become profit centres: Rhode Island’s bureaucrats have been on a spending spree courtesy of a $500m payout by Google, while New York’s governor and attorney-general have squabbled over a $613m settlement from JPMorgan. Not only are regulators in effect judge and jury as well as plaintiff in the cases they bring; they can also use the threat of the criminal law. The public never finds out the full facts of the case, nor discovers which specific people — with souls and bodies — were to blame. Since the cases never go to court ... it is unclear what exactly is illegal. That enables future shakedowns. Nor is it clear how the regulatory booty is being carved up. This ... risks the prospect of a selective — and potentially corrupt — system of justice in which everybody is guilty of something and punishment is determined by political deals.
Les Goldsmith, the CEO of ESD America [marketers of the Crytophone 500], points me to a map that he and his customers have created, indicating 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July alone. Interceptors look to a typical phone like an ordinary tower. Once the phone connects with the interceptor, a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to pushing spyware to the device. “Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says. “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip. We even found one at South Point Casino in Las Vegas.” Who is running these interceptors and what are they doing with the calls? Goldsmith says we can’t be sure, but he has his suspicions. “Are some of them U.S. government interceptors?” [asks] Goldsmith. Interceptors vary widely in expense and sophistication – but in a nutshell, they are radio-equipped computers with software that can use arcane cellular network protocols and defeat the onboard encryption. For governments or other entities able to afford a price tag of “less than $100,000,” says Goldsmith, high-quality interceptors are quite realistic. Some interceptors are limited, only able to passively listen to either outgoing or incoming calls. But full-featured devices like the VME Dominator, available only to government agencies, can not only capture calls and texts, but even actively control the phone, sending out spoof texts, for example.
Note: Do you think the government might have put up fake cell towers to nab more data? For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept. The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. ICREACH [as the search engine is called] contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden. Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy. ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to a 2010 memo. Information shared through ICREACH can be used to track people’s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs.
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
The shooting of Michael Brown, an 18-year-old African-American, by a police officer in Ferguson, Missouri, is a reminder that civilians—innocent or guilty—are far more likely to be shot by police in America than in any other rich country. In 2012, according to data compiled by the FBI, 410 Americans were “justifiably” killed by police—409 with guns. That figure may well be an underestimate. Not only is it limited to the number of people who were shot while committing a crime, but also, amazingly, reporting the data is voluntary. Last year, in total, British police officers actually fired their weapons three times. The number of people fatally shot was zero. In 2012 the figure was just one. Even after adjusting for the smaller size of Britain’s population, British citizens are around 100 times less likely to be shot by a police officer than Americans. Between 2010 and 2014 the police force of one small American city, Albuquerque in New Mexico, shot and killed 23 civilians; seven times more than the number of Brits killed by all of England and Wales’s 43 forces during the same period. The explanation for this gap is simple. In Britain, guns are rare. Only specialist firearms officers carry them; and criminals rarely have access to them. In America, by contrast, it is hardly surprising that cops resort to their weapons more frequently. In 2013, 30 cops were shot and killed—just a fraction of the 9,000 or so murders using guns that happen each year. Add to that a hyper-militarised police culture and a deep history of racial strife and you have the reason why so many civilians are shot by police officers.
Note: For more on this, see concise summaries of deeply revealing police corruption news articles from reliable major media sources.
The officers got the wrong man, but charged him anyway—with getting his blood on their uniforms. Police in Ferguson, Missouri, once charged a man with destruction of property for bleeding on their uniforms while four of them allegedly beat him. [A] 52-year-old welder named Henry Davis ... had been arrested for an outstanding warrant that proved to actually be for another man of the same surname, but a different middle name and Social Security number. The booking officer had no other reason to hold Davis, who ended up in Ferguson only because he missed the exit for St. Charles and then pulled off the highway because the rain was so heavy he could not see to drive. The cop who had pulled up behind him must have run his license plate and assumed he was that other Henry Davis. Davis said the cop approached his vehicle, grabbed his cellphone from his hand, cuffed him and placed him in the back seat of the patrol car, without a word of explanation. The booking officer ... proceeded to escort him to a one-man cell that already had a man in it asleep on the lone bunk. Davis balked at being a second man in a one-man cell. The booking officer summoned a number of fellow cops. One opened the cell door while another suddenly charged, propelling Davis inside and slamming him against the back wall. [A] female officer allegedly lifted Davis’ head as the cop who had initially pushed him into the cell reappeared. “He ran in and kicked me in the head,” Davis recalled. “Paramedics came. They said it was too much blood. I had to go to the hospital.” A federal magistrate ruled that the [police] perjury about the “property damage” charges was too minor to constitute a violation of due process and that Davis’ injuries were ... too minor to warrant a finding of excessive force. Never mind that a CAT scan taken after the incident confirmed that he had suffered a concussion.
Note: If you are willing to know how bad it gets, read the entire article at the link above. Then read an educational article on the skewed reporting of the New York Times on the Michael Brown murder. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
Alex Landau, who is African-American, was adopted by a white couple as a child and grew up in largely white, middle-class suburbs of Denver. "I thought that love would conquer all and skin color really didn't matter," [his mother, Patsy] Hathaway [said, speaking to her son]. "I had to learn the really hard way when they almost killed you." That was in 2009, when Landau, then a college student, was stopped by Denver police officers and severely beaten. Landau was 19 at the time, driving around Denver with a friend in the passenger seat. He noticed red and blue lights behind him. The officer who pulled him over "explained I had made an illegal left turn, and to step out of the car," Landau says. Landau thought he was safe. He wasn't in handcuffs, he says, and he'd already been patted down. "Plus there's three officers on the scene. And I had never had a negative interaction with police in my life. "So I ask them, 'Can I please see a warrant before you continue the search?' " Landau says. "And they grab me and began to hit me in the face. I was hit several times, and I remember gasping for air" and spitting blood, he says. "And then I hear an officer shout out, 'He's reaching for a gun,' " he tells his mother. "I immediately started yelling, 'No, I'm not. I'm not reaching for anything.' " Landau felt a gun against his head, he says. "And I expected to be shot. And at that point I lost consciousness. ... It took 45 stitches to close up the lacerations in my face alone," Landau says. I was just another black face in the streets, and I was almost another dead black male." In 2011, Alex was awarded a $795,000 settlement by the City of Denver.
Note: Listen to the very moving three-minute audio of this white mother and her black son who was nearly killed by police simply for being black. Then read an educational article on the skewed reporting of the New York Times on the Michael Brown murder. For more on this, see concise summaries of deeply revealing police corruption news articles from reliable major media sources.
Development of a U.S. counterattack for cyberterrorism that could do more harm than good was one of the final events that drove Edward Snowden to leak government secrets, the former National Security Agency contractor tells Wired magazine. Snowden ... said the MonsterMind program was designed to detect a foreign cyberattack and keep it from entering the country. But it also would automatically fire back. The problem, he said, is malware can be routed through an innocent third-party country. "These attacks can be spoofed," he told Wired. MonsterMind for example ... could accidentally start a war. And it's the ultimate threat to privacy because it requires the NSA to gain access to virtually all private communications coming in from overseas. "The argument is that the only way we can identify these malicious traffic flows and respond to them is if we're analyzing all traffic flows," he said. "And if we're analyzing all traffic flows, that means we have to be intercepting all traffic flows. That means violating the Fourth Amendment, seizing private communications without a warrant, without probable cause or even a suspicion of wrongdoing. For everyone, all the time. You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it," Snowden told Wired. "But if you do that, it creates a slippery slope that just increases over time. And by the time you've been in 15 years, 20 years, 25 years, you've seen it all and it doesn't shock you. And so you see it as normal."
Note: Read the cover story from Wired magazine with a deep inside report on Snowden.
The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither “concrete facts” nor “irrefutable evidence” to designate an American or foreigner as a terrorist. The “March 2013 Watchlisting Guidance,” a 166-page document issued last year by the National Counterterrorism Center, spells out the government’s secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings. The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place entire “categories” of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to “nominate” people to the watchlists based on what is vaguely described as “fragmentary information.” It also allows for dead people to be watchlisted. The rulebook ... was developed behind closed doors by representatives of the nation’s intelligence, military, and law-enforcement establishment, including the Pentagon, CIA, NSA, and FBI. Emblazoned with the crests of 19 agencies, it offers the most complete and revealing look into the secret history of the government’s terror list policies to date.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
Nearly all of the highest-profile domestic terrorism plots in the United States since 9/11 featured the "direct involvement" of government agents or informants, a new report says. Some of the controversial "sting" operations "were proposed or led by informants", bordering on entrapment by law enforcement. Yet the courtroom obstacles to proving entrapment are significant, one of the reasons the stings persist. The lengthy report, released on [July 21] by Human Rights Watch, raises questions about the US criminal justice system's [respect for] civil rights and due process in post-9/11 terrorism cases. [The report] portrays a system that features not just the sting operations but secret evidence, anonymous juries, extensive pretrial detentions and convictions significantly removed from actual plots. "In some cases the FBI may have created terrorists out of law-abiding individuals by suggesting the idea of taking terrorist action or encouraging the target to act," the report alleges. Out of the 494 cases related to terrorism the US has tried since 9/11, the plurality of convictions ... are not for thwarted plots but for "material support" charges, a broad category expanded further by the 2001 Patriot Act that permits prosecutors to pursue charges with tenuous connections to a terrorist act or group. Several cases featured years-long solitary confinement for accused terrorists before their trials. Some defendants displayed signs of mental incapacity. Jurors for the 2007 plot to attack the Fort Dix army base, itself influenced by government informants, were anonymous, limiting defense counsel's ability to screen out bias.
Note: Why was this important news not picked up by any major US media? For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.