Civil Liberties News ArticlesExcerpts of Key Civil Liberties News Articles in Media
The intelligence services have routinely been intercepting legally privileged communications ... according to internal MI5, MI6 and GCHQ documents. The information obtained may even have been exploited unlawfully and used by the agencies in the fighting of court cases in which they themselves are involved, the Investigatory Powers Tribunal (IPT) has been told. MP David Davis, a former shadow home secretary, said past practice was to delete such material immediately if it was ever picked up. 28 extracts of internal intelligence policies showing how legally privileged material is handled by security officials were released to lawyers pursuing a claim through the IPT. The claim has been brought by two Libyans, Abdel-Hakim Belhaj and Sami Al Saadi. They were abducted in a joint MI6-CIA operation and ... tortured by Colonel Muammar Gaddafi’s regime in 2004. Belhaj has been given permission to sue the government for his mistreatment. Davis, who attended the hearing, said: “In the past, when a bug or intercept on a criminal accidentally picked up a conversation with the criminal’s lawyer, the rule was that it was immediately deleted. Today’s hearing shows that is no longer the case. Agencies are clearly keeping records of legal privileged material, and have explicit policies to handle it. In the case of MI5 that policy includes concealing ... that they have the material. This change has been carried out without changing the law or telling parliament. This is an enormous breach of defendants’ judicial rights.”
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable sources.
Prime Minister John Key ... has denied that New Zealand’s spy agency GCSB engages in mass surveillance, mostly as a means of convincing the country to enact a new law vesting the agency with greater powers. Let me be clear: any statement that mass surveillance is not performed in New Zealand, or that the internet communications are not comprehensively intercepted and monitored, or that this is not intentionally and actively abetted by the GCSB, is categorically false. If you live in New Zealand, you are being watched. At the NSA I routinely came across the communications of New Zealanders in my work with a mass surveillance tool we share with GCSB, called “XKEYSCORE.” It allows total, granular access to the database of communications collected in the course of mass surveillance. It is not limited to or even used largely for the purposes of cybersecurity, as has been claimed, but is instead used primarily for reading individuals’ private email, text messages, and internet traffic. I know this because it was my full-time job in Hawaii, where I worked every day in an NSA facility with a top secret clearance. The prime minister’s claim to the public, that “there is no and there never has been any mass surveillance” is false. The GCSB, whose operations he is responsible for, is directly involved in the untargeted, bulk interception and algorithmic analysis of private communications sent via internet, satellite, radio, and phone networks. It means they have the ability see every website you visit, every text message you send, every call you make, every ticket you purchase, every donation you make, and every book you order online. From “I’m headed to church” to “I hate my boss” to “She’s in the hospital,” the GCSB is there. Your words are intercepted, stored, and analyzed by algorithms long before they’re ever read by your intended recipient.
Note: New Zealand's prime minister has acknowledged that Snowden may be right, as reported in this article. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
Khalid Sheikh Mohammed [is] facing a military commission at Guantanamo Bay and potentially the death penalty. He was captured in 2003 but his case still hasn't gone to trial. Last week, Maj. Jason Wright — one of the lawyers defending Mohammed — resigned from the Army. He has accused the U.S. government of "abhorrent leadership" on human rights and due process guarantees and says it is crafting a "show trial." For nearly three years, he served on Mohammed's defense team. Wright formally resigned on Aug. 26. Wright [says] that it's hard to gain any client's trust, but it was especially hard with Mohammed. His former client is one of six "high-value detainees" being prosecuted at Guantanamo for offenses that could carry the death penalty. "All six of these men have been tortured by the U.S. government," he says. Wright says Mohammed in particular has faced a level of torture "beyond comprehension." He says his client was waterboarded by the CIA 183 times and subjected to over a week of sleep deprivation; there were threats that his family would be killed. "And those are just the declassified facts that I'm able to actually speak about," Wright says. Wright wasn't allowed to discuss too many details of the detainee abuse in court. "The CIA tortured these men. They've gone to extraordinary lengths to try to keep that completely hidden from public view," Wright says. "So the statute that Congress passed has a number of protections to ensure that no information about the U.S. torture program will ever come out."
Note: Why hasn't this been covered by other major media in the US? For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
Les Goldsmith, the CEO of ESD America [marketers of the Crytophone 500], points me to a map that he and his customers have created, indicating 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July alone. Interceptors look to a typical phone like an ordinary tower. Once the phone connects with the interceptor, a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to pushing spyware to the device. “Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says. “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip. We even found one at South Point Casino in Las Vegas.” Who is running these interceptors and what are they doing with the calls? Goldsmith says we can’t be sure, but he has his suspicions. “Are some of them U.S. government interceptors?” [asks] Goldsmith. Interceptors vary widely in expense and sophistication – but in a nutshell, they are radio-equipped computers with software that can use arcane cellular network protocols and defeat the onboard encryption. For governments or other entities able to afford a price tag of “less than $100,000,” says Goldsmith, high-quality interceptors are quite realistic. Some interceptors are limited, only able to passively listen to either outgoing or incoming calls. But full-featured devices like the VME Dominator, available only to government agencies, can not only capture calls and texts, but even actively control the phone, sending out spoof texts, for example.
Note: Do you think the government might have put up fake cell towers to nab more data? For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept. The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. ICREACH [as the search engine is called] contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden. Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy. ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to a 2010 memo. Information shared through ICREACH can be used to track people’s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs.
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
The officers got the wrong man, but charged him anyway—with getting his blood on their uniforms. Police in Ferguson, Missouri, once charged a man with destruction of property for bleeding on their uniforms while four of them allegedly beat him. [A] 52-year-old welder named Henry Davis ... had been arrested for an outstanding warrant that proved to actually be for another man of the same surname, but a different middle name and Social Security number. The booking officer had no other reason to hold Davis, who ended up in Ferguson only because he missed the exit for St. Charles and then pulled off the highway because the rain was so heavy he could not see to drive. The cop who had pulled up behind him must have run his license plate and assumed he was that other Henry Davis. Davis said the cop approached his vehicle, grabbed his cellphone from his hand, cuffed him and placed him in the back seat of the patrol car, without a word of explanation. The booking officer ... proceeded to escort him to a one-man cell that already had a man in it asleep on the lone bunk. Davis balked at being a second man in a one-man cell. The booking officer summoned a number of fellow cops. One opened the cell door while another suddenly charged, propelling Davis inside and slamming him against the back wall. [A] female officer allegedly lifted Davis’ head as the cop who had initially pushed him into the cell reappeared. “He ran in and kicked me in the head,” Davis recalled. “Paramedics came. They said it was too much blood. I had to go to the hospital.” A federal magistrate ruled that the [police] perjury about the “property damage” charges was too minor to constitute a violation of due process and that Davis’ injuries were ... too minor to warrant a finding of excessive force. Never mind that a CAT scan taken after the incident confirmed that he had suffered a concussion.
Note: If you are willing to know how bad it gets, read the entire article at the link above. Then read an educational article on the skewed reporting of the New York Times on the Michael Brown murder. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
Alex Landau, who is African-American, was adopted by a white couple as a child and grew up in largely white, middle-class suburbs of Denver. "I thought that love would conquer all and skin color really didn't matter," [his mother, Patsy] Hathaway [said, speaking to her son]. "I had to learn the really hard way when they almost killed you." That was in 2009, when Landau, then a college student, was stopped by Denver police officers and severely beaten. Landau was 19 at the time, driving around Denver with a friend in the passenger seat. He noticed red and blue lights behind him. The officer who pulled him over "explained I had made an illegal left turn, and to step out of the car," Landau says. Landau thought he was safe. He wasn't in handcuffs, he says, and he'd already been patted down. "Plus there's three officers on the scene. And I had never had a negative interaction with police in my life. "So I ask them, 'Can I please see a warrant before you continue the search?' " Landau says. "And they grab me and began to hit me in the face. I was hit several times, and I remember gasping for air" and spitting blood, he says. "And then I hear an officer shout out, 'He's reaching for a gun,' " he tells his mother. "I immediately started yelling, 'No, I'm not. I'm not reaching for anything.' " Landau felt a gun against his head, he says. "And I expected to be shot. And at that point I lost consciousness. ... It took 45 stitches to close up the lacerations in my face alone," Landau says. I was just another black face in the streets, and I was almost another dead black male." In 2011, Alex was awarded a $795,000 settlement by the City of Denver.
Note: Listen to the very moving three-minute audio of this white mother and her black son who was nearly killed by police simply for being black. Then read an educational article on the skewed reporting of the New York Times on the Michael Brown murder. For more on this, see concise summaries of deeply revealing police corruption news articles from reliable major media sources.
The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither “concrete facts” nor “irrefutable evidence” to designate an American or foreigner as a terrorist. The “March 2013 Watchlisting Guidance,” a 166-page document issued last year by the National Counterterrorism Center, spells out the government’s secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings. The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place entire “categories” of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to “nominate” people to the watchlists based on what is vaguely described as “fragmentary information.” It also allows for dead people to be watchlisted. The rulebook ... was developed behind closed doors by representatives of the nation’s intelligence, military, and law-enforcement establishment, including the Pentagon, CIA, NSA, and FBI. Emblazoned with the crests of 19 agencies, it offers the most complete and revealing look into the secret history of the government’s terror list policies to date.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
A classified 2010 legal certification and other documents indicate the NSA has been given a far more elastic authority than previously known, one that allows it to intercept through U.S. companies not just the communications of its overseas targets but any communications about its targets as well. The certification — approved by the Foreign Intelligence Surveillance Court and included among a set of documents leaked by former NSA contractor Edward Snowden — lists 193 countries that would be of valid interest for U.S. intelligence. The certification also permitted the agency to gather intelligence about entities including the World Bank, the International Monetary Fund, the European Union and the International Atomic Energy Agency. The documents underscore the remarkable breadth of potential “foreign intelligence” collection. An affidavit in support of the 2010 foreign-government certification said the NSA believes that foreigners who will be targeted for collection “possess, are expected to receive and/or are likely to communicate foreign intelligence information concerning these foreign powers.” That language could allow for surveillance of academics, journalists and human rights researchers. A Swiss academic who has information on the German government’s position in the run-up to an international trade negotiation, for instance, could be targeted if the government has determined there is a foreign-intelligence need for that information. If a U.S. college professor e-mails the Swiss professor’s e-mail address or phone number to a colleague, the American’s e-mail could be collected as well, under the program’s court-approved rules.
Note: For more on this, see concise summaries of deeply revealing intelligence agency news articles from reliable major media sources.
A whistle-blower living in exile in Russia. A publisher seeking the asylum he has already been granted while his sources are imprisoned. This isn't the cast of a summer blockbuster. It's a perfect storm of real-life cases that make it clear that constitutional guarantees of a free press and government accountability are rhetorical devices, not political realities. The whistle-blower is Edward Snowden. This month marks the first anniversary of his disclosures of massive National Security Agency surveillance. The publisher is Julian Assange. Thursday marks two years since he sought refuge in the Ecuadorian Embassy in London. Meanwhile, two of Assange's sources, Chelsea Manning (formerly known as Bradley Manning) and Jeremy Hammond, remain in prison for providing WikiLeaks with confidential documents. Harassment, targeting and prosecution of whistle-blowers, journalists and publishers have become a dangerous new normal — one we should refuse to accept, especially in a time when governments are becoming more powerful and less accountable. It's time to end this assault, starting with granting Snowden amnesty and withdrawing the threat of U.S. criminal prosecution of Assange. Similar harsh treatment and excessive punishments haven't applied to the people in government who perpetrated the crimes exposed by these whistle-blowers and published by WikiLeaks. In fact, people such as national intelligence director James Clapper, who lied under oath to Congress, have avoided consequences altogether.
Note: For more on this, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
As President Obama ushers in the end of what he called America’s “long season of war,” the former tools of combat — M-16 rifles, grenade launchers, silencers and more — are ending up in local police departments, often with little public notice. During the Obama administration, according to Pentagon data, police departments have received tens of thousands of machine guns; nearly 200,000 ammunition magazines; thousands of pieces of camouflage and night-vision equipment; and hundreds of silencers, armored cars and aircraft. The equipment has been added to the armories of police departments that already look and act like military units. Police SWAT teams are now deployed tens of thousands of times each year, increasingly for routine jobs. Police departments ... are adding more firepower and military gear than ever. Some, especially in larger cities, have used federal grant money to buy armored cars and other tactical gear. And the free surplus program remains a favorite of many police chiefs who say they could otherwise not afford such equipment. The number of SWAT teams has skyrocketed since the 1980s, according to studies by Peter B. Kraska, an Eastern Kentucky University professor who has been researching the issue for decades. Recruiting videos feature clips of officers storming into homes with smoke grenades and firing automatic weapons. In Springdale, Ark., a police recruiting video is dominated by SWAT clips, including officers throwing a flash grenade into a house and creeping through a field in camouflage.
Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
The list of those caught up in the global surveillance net cast by the National Security Agency and its overseas partners, from social media users to foreign heads of state, now includes another entry: US lawyers. A top-secret document, obtained by former NSA contractor Edward J. Snowden, shows that a US law firm was monitored while representing a foreign government in trade disputes with the United States. The disclosure offers a rare glimpse of a specific instance of Americans ensnared by the eavesdroppers and is of particular interest because US lawyers with clients overseas have expressed growing concern that their confidential communications could be compromised by such surveillance. The government of Indonesia had retained the law firm for help in trade talks, according to the February 2013 document. The NSA’s Australian counterpart, the Australian Signals Directorate, notified the agency that it was conducting surveillance of the talks, including communications between Indonesian officials and the US law firm, and offered to share information. The NSA is banned from targeting Americans, including businesses, law firms, and other organizations based in the United States, for surveillance without warrants, and intelligence officials have repeatedly said the NSA does not use spy services of its partners in the so-called Five Eyes alliance — Australia, Britain, Canada, and New Zealand — to skirt the law. The Australians told officials at an NSA liaison office in Canberra, that “information covered by attorney-client privilege may be included” in the intelligence gathering. Most attorney-client conversations do not get special protections under US law from NSA eavesdropping.
Note: For more on intense deception perpetrated by the intelligence community, see the deeply revealing reports from reliable major media sources available here.
The federal government’s main terrorist watch list has grown to at least 700,000 people, with little scrutiny over how the determinations are made or the impact on those marked with the terrorist label. The government refuses to confirm or deny whether someone is on the list, officially called the Terrorist Screening Database, or divulge the criteria used to make the decisions. Even less is known about the secondary watch lists that are derived from the main one, including the no-fly list (used to prevent people from boarding aircraft), the selectee and expanded selectee lists (used to flag travelers for extra screening at airport checkpoints), the TECS database (used to vet people entering or leaving the United States), the Consular Lookout and Support System (used to screen visa applications) and the known or suspected terrorists list (used by law enforcement in routine police encounters). For people who have landed on these lists, the terrorist designation has been difficult to challenge legally. The Terrorist Screening Center, which administers the main terrorist watch list, declined to discuss its procedures, or to release current data about the number of people on various watch lists, and how many of them are American citizens.
Note: For more on government threats to civil liberties, see the deeply revealing reports from reliable major media sources available here.
The German, French, Spanish and Swedish intelligence services have all developed methods of mass surveillance of internet and phone traffic over the past five years in close partnership with Britain's GCHQ eavesdropping agency. The bulk monitoring is carried out through direct taps into fibre optic cables and the development of covert relationships with telecommunications companies. A loose but growing eavesdropping alliance has allowed intelligence agencies from one country to cultivate ties with corporations from another to facilitate the trawling of the web, according to GCHQ documents leaked by the former US intelligence contractor Edward Snowden. The files also make clear that GCHQ played a leading role in advising its European counterparts how to work around national laws intended to restrict the surveillance power of intelligence agencies. US intelligence officials have insisted the mass monitoring was carried out by the security agencies in the countries involved and shared with the US. The Guardian revealed the existence of GCHQ's Tempora programme, in which the electronic intelligence agency tapped directly into the transatlantic fibre optic cables to carry out bulk surveillance. GCHQ officials expressed admiration for the technical capabilities of German intelligence to do the same thing, [saying] the Federal Intelligence Service (BND) had "huge technological potential and good access to the heart of the internet – they are already seeing some bearers running at 40Gbps and 100Gbps". Bearers is the GCHQ term for the fibre optic cables, and gigabits per second (Gbps) measures the speed at which data runs through them.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
[In] Miram Shah, the frontier Pakistani town that has become a virtual test laboratory for drone warfare, ... residents paint a portrait of extended terror and strain within a tribal society caught between vicious militants and the American drones hunting them. Their claims of distress are now being backed by a new Amnesty International investigation that found, among other points, that at least 19 civilians in the surrounding area of North Waziristan had been killed in just two of the drone attacks since January 2012 — a time when the Obama administration has held that strikes have been increasingly accurate and free of mistakes. Miram Shah ... has become a fearful and paranoid town, dealt at least 13 drone strikes since 2008 — more than any other urban settlement in the world. Even when the missiles do not strike, buzzing drones hover day and night, scanning the alleys and markets with roving high-resolution cameras. The strikes in the area mostly occur in densely populated neighborhoods. The drones have hit a bakery, a disused girls’ school and a money changers’ market, residents say. The constant presence of circling drones — and accompanying tension over when, or whom, they will strike — is a crushing psychological burden for many residents. Sales of sleeping tablets, antidepressants and medicine to treat anxiety have soared, said Hajji Gulab Jan Dawar, a pharmacist in the town bazaar. Women were particularly troubled, he said, but men also experienced problems. State services have virtually collapsed. At the local hospital, corrupt officials are reselling supplies of medicine and fuel in the town market, doctors said.
Note: For more on the illegal killing worldwide of innocent men, women, and children by missile strikes from US drones, see the deeply revealing reports from reliable major media sources available here.
A Department of Justice memo [distributed by the FBI] instructs local police, under a program named "Communities Against Terrorism," to consider anyone who harbors "conspiracy theories" about 9/11 to be a potential terrorist. The memo thus adds 9/11-official-story skeptics to a growing list of targets described by federal law enforcement [as] security threats, such as those who express "libertarian philosophies," "Second Amendment-oriented views," interest in "self-sufficiency," "fears of Big Brother or big government," and "Declarations of Constitutional rights and civil liberties." A newly released national poll shows that 48 percent of Americans either have some doubts about the official account of 9/11, or do not believe it at all. The FBI memo entitled "Potential Indicators of Terrorist Activities Related to Sleepers" says that people who should be 'considered suspicious' [for] possible involvement in "terrorist activity" include those who hold the "attitude" described as "Conspiracy theories about Westerners." The memo continues: "e.g. (sic) the CIA arranged for 9/11 to legitimize the invasion of foreign lands." "Sleepers" refers to "sleeper cells," in FBI jargon, which are terrorists awaiting orders to be activated into terrorist activity. According to the polling firm YouGov, 38% of Americans have some doubts about the official account of 9/11, 10% do not believe it at all, and 12% are unsure about it. Among well-known doubters of the official 9/11 account are many military officers, law enforcement personnel, firefighters, and pilots.
Note: We don't normally use Digital Journal as a news source, but this article is too important to not include, and no major media source is covering the story. For evidence that search engines are actively blocking 9/11 truth videos, click here. For more on the questions raised about the official explanation of the 9/11 events by highly respected professors and former government and military officials, click here and here.
The New York Police Department has secretly labeled entire mosques as terrorism organizations, a designation that allows police to use informants to record sermons and spy on imams, often without specific evidence of criminal wrongdoing. Designating an entire mosque as a terrorism enterprise means that anyone who attends prayer services there is a potential subject of an investigation and fair game for surveillance. Since the 9/11 attacks, the NYPD has opened at least a dozen "terrorism enterprise investigations" into mosques, according to interviews and confidential police documents. Many TEIs stretch for years, allowing surveillance to continue even though the NYPD has never criminally charged a mosque or Islamic organization with operating as a terrorism enterprise. The documents show in detail how, in its hunt for terrorists, the NYPD investigated countless innocent New York Muslims and put information about them in secret police files. As a tactic, opening an enterprise investigation on a mosque is so potentially invasive that while the NYPD conducted at least a dozen, the FBI never did one, according to interviews with federal law enforcement officials. The revelations about the NYPD's massive spying operations are in documents recently obtained by The Associated Press and part of a new book, Enemies Within: Inside the NYPD's Secret Spying Unit... The book ... is based on hundreds of previously unpublished police files and interviews with current and former NYPD, CIA and FBI officials.
Note: For more on the realities of intelligence operations, see the deeply revealing reports from reliable major media sources available here.
It has been an infuriating few days for anyone who values the freedom of the press, as authorities in the United Kingdom resorted to the tactics of tyrants and thugs to squelch reporting that they simply don't like. In acts clearly calibrated for optimal intimidation, they have detained the partner of a journalist, threatened to shut down a reporting operation that has prompted a critical public debate over government spying and forced the destruction of a major publication's hard drives. It's breathtaking in its audacity - and if it comes to light that the U.S. government took any part in organizing, encouraging or supporting these acts, it will warrant immediate congressional investigation. As it is, the accelerating assaults on investigative journalism [indicate the need for] stronger protections for journalists and their sources. Using laws designed to ferret out suspected terrorists to detain a person aiding acts of journalism is a cut-and-dried abuse of government power, an act of intimidation that may well be illegal - and certainly should be. It gives the lie to the naive but oft-repeated notion that if you've done no wrong, you have nothing to fear. Such attacks on investigative journalism here and abroad appear to be escalating. The Justice Department has been caught spying on reporters at the Associated Press, and named a Fox News reporter a "co-conspirator" in a leak inquiry. Judges have threatened reporters at both the New York Times and Fox News with jail time for refusing to disclose their sources.
Note: For more on government attacks on civil liberties, see the deeply revealing reports from reliable major media sources available here.
Pop quiz: Name a state residential school where children were enrolled in medical experiments over an almost 20-year period, in which they were unknowingly fed a steady diet of radioactive isotopes, subjected to regular blood draws, and placed in solitary confinement if they refused to cooperate. Answer: the Walter E. Fernald State School in Waltham [Mass.} during the mid 20th century. Unfortunately, as Allen Hornblum, Judith Newman, and Gregory Dober painfully describe in their chilling new book, Against Their Will: The Secret History of Medical Experimentation on Children in Cold War America, Fernald was not the only institution in the country, or even in the state, where children were conscripted into sometimes deadly medical experiments. These were conducted by ambitious physicians and scientists whose belief in what they were trying to accomplish often blinded them to the potentially horrific consequences of their actions. “Against Their Will’’ opens with an overview of the eugenics movement in the United States, which found sympathizers among many luminaries of American medicine in the 19th and early 20th centuries. With its disdain for the disabled, who were considered genetically inferior, the movement paved the way for use of “defective’’ children in research. The book then provides multiple examples of medical experiments perpetrated on developmentally delayed and physically disabled children at multiple institutions across the country over the course of decades, often reading like case studies straight out of the 1947 Nazi doctors’ trial.
Note: For a long list of verifiable incidents where unknowing citizens were used as guinea pigs on a massive scale, click here.
The Army is blocking all access to The Guardian newspaper's reports about the National Security Agency's sweeping collection of data about Americans' email and phone communications, an Army spokesman said Thursday. The Monterey (Calif.) Herald reported that employees at the Presidio of Monterey, an Army public affairs base about 100 miles south of San Francisco, were unable to gain access to The Guardian's articles on former NSA contractor Edward Snowden and his professed leaks of classified information about the intelligence programs. Late Thursday, an Army spokesman told The Herald by email that the newspaper's NSA reports were, in fact, being blocked across the entire Army. He wrote that it's routine for the Defense Department to take "network hygiene" action to prevent disclosure of classified information, The Herald reported. "We make every effort to balance the need to preserve information access with operational security," the newspaper quoted the spokesman as saying. "However there are strict policies and directives in place regarding protecting and handling classified information."
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.