Civil Liberties News ArticlesExcerpts of Key Civil Liberties News Articles in Media
The FBI breached its own internal rules when it spied on campaigners against the Keystone XL pipeline, failing to get approval before it cultivated informants and opened files on individuals protesting against the construction of the pipeline in Texas. Internal agency documents show for the first time how FBI agents have been closely monitoring anti-Keystone activists, in violation of guidelines designed to prevent the agency from becoming unduly involved in sensitive political issues. The hugely contentious Keystone XL pipeline, which is awaiting approval from the Obama administration, would transport tar sands oil from Canada to the Texas Gulf coast. It has been strongly opposed for years by a coalition of environmental groups ... who have been monitored by federal law enforcement agencies. Mike German, a former FBI agent ... said [the documents] indicated the agency had opened a category of investigation that is known in agency parlance as an “assessment”. Introduced as part of an expansion of FBI powers after 9/11, assessments allow agents to open intrusive investigations into individuals or groups, even if they have no reason to believe they are breaking the law. German ... said the documents also raised questions over collusion between law enforcement and TransCanada. “These documents suggest the FBI interprets its national security mandate as protecting private industry from political criticism,” he said.
Chicago's leaders took a step Wednesday typically reserved for nations trying to make amends for slavery or genocide, agreeing to pay $5.5 million in reparations to the mostly African-American victims of the city's notorious police torture scandal and to teach schoolchildren about one of the most shameful chapters of Chicago's history. Chicago has already spent more than $100 million settling and losing lawsuits related to the torture of suspects by detectives under the command of disgraced former police commander Jon Burge from the 1970s through the early 1990s. The city council's backing of the new ordinance marks the first time a U.S. city has awarded survivors of racially motivated police torture the reparations they are due under international law, according to Amnesty International. "It is a powerful word and it was meant to be a powerful word. That was intentional," Alderman Joe Moore said of the decision to describe it as reparations. "This stain cannot be removed from our city's history, but it can be used as a lesson in what not to do," said Mayor Rahm Emanuel, who stressed that Chicago had to do more than just pay the victims if it is to really get beyond this stain on its history.
Note: Jon Burge tortured false confessions out of as many as 120 prisoners, and according to the Chicago Reader, may have learned how to do this while serving as a soldier in Vietnam. Chicago police maintain hidden interrogation sites where brutal treatment of suspects is used to obtain criminal confessions. For more along these lines, see concise summaries of deeply revealing news articles about civil liberties and government corruption from reliable major media sources.
Whenever Chicago Police commander Jon Burge needed a confession, he would walk into the interrogation room and set down a little black box, his alleged victims would later tell prosecutors. The box had two wires and a crank. Burge ... would attach one wire to the suspect’s handcuffed ankles and the other to his manacled hands. Then [he] would place a plastic bag over the suspect’s head. Finally, he would crank his little black box and listen to the screams of pain as electricity coursed through the suspect’s body. As many as 120 African-American men on Chicago’s South Side ... were allegedly tortured by Burge between 1972 and 1991. On Tuesday, Chicago Mayor Rahm Emanuel announced the establishment of a $5.5 million fund for these victims. Some of the men spent years on Illinois’s death row because of confessions allegedly obtained by Burge under duress. In 2003, Governor George Ryan pardoned four men on death row who claimed to have been tortured by Burge, [whom] the Chicago Police Board voted to fire [in 1993] for his alleged torture activities. [He] was allowed to keep his $4,000 per month pension. In 2002, Cook County appointed [a special prosecutor] to investigate Burge’s conduct. The investigation took four years and cost $7 million, but the 300-page report didn’t recommend bringing any charges against the former cop. The statute of limitations for the alleged crimes had expired, Egan argued.
Note: According to the Chicago Reader, Burge may have learned how to torture prisoners while serving as a soldier in Vietnam. Chicago police maintain hidden interrogation sites where brutal treatment of suspects is used to obtain criminal confessions. For more along these lines, see concise summaries of deeply revealing news articles about civil liberties and government corruption from reliable major media sources.
Human rights campaigners have prepared a federal lawsuit aiming to permanently shut down the bulk collection of billions of US phone records – not, this time, by the National Security Agency, but by the Drug Enforcement Agency. The program ... served as a template for the NSA’s gigantic and ongoing bulk surveillance of US phone data after 9/11. The revelation of mass phone-records collection in the so-called “war on drugs” raises new questions about whether the Obama administration or its successors believe US security agencies continue to have legal leeway for warrantless bulk surveillance on American citizens. Starting in 1992, the so-called “USTO” effort operated without judicial approval, despite the US constitution’s warrant requirement. Attorney general Eric Holder ended USTO in September 2013 out of fear of scandal following Snowden’s disclosures. While Snowden did not expose USTO, several NSA programs he has exposed referenced the DEA as an NSA partner, giving the DEA another secret pathway to massive amounts of US communications records. The warrantless bulk records collection provides prosecutors the ability to enter into evidence incriminating material that could otherwise be thrown out of court, [and] has not stopped the upward growth of domestic narcotics consumption.
Note: In order to deny due process to people accused of crimes, the DEA's Special Operations Division constructs lies about the origins of data obtained from warrantless mass surveillance. Award-winning journalists have presented powerful evidence of direct DEA and CIA involvement in and support of drug running and drug cartels. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
Elite service members from four branches of the U.S. military will launch an operation this summer in which they will operate covertly among the U.S. public and travel from state to state in military aircraft. Texas, Utah and a section of southern California are labelled as hostile territory, and New Mexico isn’t much friendlier. That’s the scheme for Jade Helm 15, a new Special Operations exercise that runs from July 15 to Sept. 15. Army Special Operations Command announced it last week, saying the size and scope of the mission sets it apart from many other training exercises. The exercise has prompted widespread conspiracy theories that the United States is preparing to hatch martial law. In particular, some have expressed alarm about this map, which outlines events for the exercise in unclassified documents posted online last week. The Washington Post verified them to be legitimate by speaking to Army sources. They appear to have been prepared for local authorities. It’s also worth noting that the military has routinely launched exercises in the past in which regions of the United States are identified as hostile for the purpose of training.
Note: This Washington Post article is clearly playing down some important facts and developments. Why is the US military spending so much time and money preparing for scenarios where US soil and citizens are considered enemies? Read and educate yourself with this excellent article on Operation Jade Helm 15, one in a string of US exercises planning for mass civilian arrests under a variety of scenarios.
When Yonas Fikre stepped off a luxury private jet at Portland airport last month, the only passenger on a $200,000 flight from Sweden, he braced for the worst. The 36-year-old Eritrean-born American was finally back in Portland at the end of a five-year odyssey that began with a simple business trip but landed him in an Arab prison where he alleges he was tortured at the behest of US anti-terrorism officials because he refused to become an informant at his mosque in Oregon. Fikre is suing the FBI, two of its agents and other American officials for allegedly putting him on the US’s no-fly list – a roster of suspected terrorists barred from taking commercial flights – to pressure him to collaborate. When that failed, the lawsuit said, the FBI had him arrested, interrogated and tortured for 106 days in the United Arab Emirates. As shocking as the claims are, they are not the first to emanate from worshippers at Fikre’s mosque in Portland, where at least nine members have been barred from flying by the US authorities. “The no-fly list gives the FBI an extrajudicial tool to coerce Muslims to become informants,” said Gadeir Abbas, a lawyer who represents other clients on the list. “There’s definitely a cluster of cases like this at the FBI’s Portland office. Fikre has not been charged with any terrorism related crimes or even questioned as a potential threat on his return to the US. He remains on the no-fly list.
Note: For more along these lines, see concise summaries of deeply revealing articles about questionable intelligence agency practices from reliable sources.
A powerful new surveillance tool being adopted by police departments across the country comes with an unusual requirement: To buy it, law enforcement officials must sign a nondisclosure agreement preventing them from saying almost anything about the technology. Any disclosure about the technology, which tracks cellphones and is often called StingRay, could allow criminals and terrorists to circumvent it, the F.B.I. has said in an affidavit. But the tool is adopted in such secrecy that communities are not always sure what they are buying or whether the technology could raise serious privacy concerns. What has opponents particularly concerned about StingRay is that the technology, unlike other phone surveillance methods, can also scan all the cellphones in the area where it is being used, not just the target phone. “It’s scanning the area. What is the government doing with that information?” said Linda Lye, a lawyer for the American Civil Liberties Union of Northern California, which in 2013 sued the Justice Department to force it to disclose more about the technology. In November, in a response to the lawsuit, the government said it had asked the courts to allow the technology to capture content, not just identify subscriber location.
Note: For more along these lines, see concise summaries of deeply revealing news articles about the erosion of privacy rights from reliable major media sources.
A group of top American intellectuals have volunteered to "take" the 1,000 lash sentence imposed by the Saudi government on a prominent liberal blogger. Raif Badawi ... received the sentence for insulting his country's hardline Islamic clerics. The move, which follows widespread international outrage at the sentence, is being led by Robert P. George, a leading professor at Princeton University. Professor George said: "Together with six colleagues on the US Commission on International Religious Freedom, I sent a letter to the Saudi Ambassador to the US calling on the Saudi government to stop the horrific torture of Raif Badawi — an advocate of religious freedom and freedom of expression in the Saudi Kingdom. If the Saudi government refuses, we each asked to take 100 of Mr. Badawi's lashes so that we could suffer with him. The seven of us include Republicans and Democrats, liberals and conservatives, Christians, Jews, and a Muslim." Mr Badawi, 31, who set up a liberal website to discuss Saudi politics in which he criticised the country’s hardline religious establishment, has been sentenced to ten years in prison as well as 1,000 lashes. So harsh is the flogging that it has to be administered in individual sessions of 50 lashes a time in order to stop the recipient dying or suffering serious injury during the process. The first bout of 50 lashes was dished out to Mr Badawi on January 9, before hundreds of spectators in a public square in front of a mosque in the Red Sea city of Jeddah. The date for a second set of lashes has so far been postponed as doctors have said that Mr Badawi's injuries from the first flogging have not yet healed.
Note: Explore a treasure trove of concise summaries of incredibly inspiring news articles which will inspire you to make a difference.
The outrageous legal attack on WikiLeaks and its staffers ... is an attack on freedom of the press itself. WikiLeaks has had their Twitter accounts secretly spied on, been forced to forfeit most of their funding after credit card companies unilaterally cut them off, had the FBI place an informant inside their news organization, watched their supporters hauled before a grand jury, and been the victim of the UK spy agency GCHQ hacking of their website and spying on their readers. Now we’ve learned that, as The Guardian reported on Sunday, the Justice Department got a warrant in 2012 to seize the contents – plus the metadata on emails received, sent, drafted and deleted – of three WikiLeaks’ staffers personal Gmail accounts. The tactics used against WikiLeaks by the Justice Department in their war on leaks [are] also used against mainstream news organizations. For example, after the Washington Post revealed in 2013 the Justice Department had gotten a warrant for the personal Gmail account of Fox News reporter James Rosen in 2010 without his knowledge. Despite the ongoing legal pressure, WikiLeaks has continued to publish important documents in the public interest.
Note: In recent years, Wikileaks' radical transparency has made draft texts of the Trans-Pacific Partnership public, and uncovered a secret CIA report that suggests the US government’s policy of assassinating foreign 'terrorists' does more harm than good. So who is the real problem here?
Hardly a week goes by without a new report of some massive data theft that has put financial information, trade secrets or government records into the hands of computer hackers. The best defense against these attacks is clear: strong data encryption and more secure technology systems. U.S. intelligence agencies hold a different view. James Comey, the FBI director, is lobbying Congress to require that electronics manufacturers create intentional security holes — so-called back doors — that would enable the government to [easily] access data on every American's cellphone and computer. Building a back door into every cellphone, tablet, or laptop means deliberately creating weaknesses that hackers and foreign governments can exploit. What these officials are proposing would be bad for personal data security and bad for business. Built-in back doors have ... disastrous results. The U.S. House of Representatives recognized how dangerous this idea was and in June approved [an] amendment [to] prohibit the government from mandating that technology companies build security weaknesses into any of their products. I introduced legislation in the Senate to accomplish the same goal. Advances in technology always pose a new challenge to law enforcement agencies. But curtailing innovation on data security is no solution, and certainly won't restore public trust in tech companies or government agencies.
Note: Ron Wyden, a member of the Senate Intelligence Committee, wrote the article summarized above. The NSA routinely creates and exploits security holes in commercial encryption software and devices to spy on people, and shares the personal data it obtains with the CIA, FBI, IRS, and others through the DEA's Special Operations Division. What exactly is the FBI director asking congress for now?
One quiet consequence of this week’s sensational release of the Senate Intelligence Committee’s report on the C.I.A. detention program was a telephone call that a human rights lawyer, Meg Satterthwaite, placed to a client in Yemen, Mohamed Bashmilah. For eight years since Mr. Bashmilah, 46, was released from C.I.A. custody, Ms. Satterthwaite ... had been trying without success to get the United States government to acknowledge that it had held him in secret prisons for 19 months and to explain why. In the phone call on Wednesday, she told him that the Senate report listed him as one of 26 prisoners who, based on C.I.A. documents, had been “wrongfully detained.” After learning the news, Mr. Bashmilah pressed Ms. Satterthwaite, who heads the global justice program at New York University Law School, to tell him what might follow from the Senate’s recognition. Would there be an apology? Would there be some kind of compensation? Among the others mistakenly held for periods of months or years, according to the report, were an “intellectually challenged” man held by the C.I.A. solely to pressure a family member to provide information; two people who were former C.I.A. informants; and two brothers who were falsely linked to Al Qaeda. Ms. Satterthwaite was not able to answer Mr. Bashmilah’s question about an apology or reparation. No apology was forthcoming from the C.I.A., which declined to comment on specific cases.
Note: An ACLU lawsuit filed on behalf of Mr. Bashmilah and others flown to prisons on C.I.A. aircraft was dismissed on the grounds that it might expose state secrets. For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
Eric Garner was not the first American to be choked by the police, and he will not be the last, thanks to legal rules that prevent victims of police violence from asking federal courts to help stop deadly practices. The 1983 case City of Los Angeles v. Lyons vividly illustrates the problem. That case also involved an African-American man choked by the police without provocation. Unlike Mr. Garner, Adolph Lyons survived. He then filed a federal lawsuit, asking the city to compensate him for his injuries. He also asked the court to prevent the Los Angeles Police Department from using chokeholds in the future. The trial court ordered the L.A.P.D. to stop using chokeholds. The Supreme Court overturned this order. The court explained that Mr. Lyons would have needed to prove that he personally was likely to be choked again in order for his lawsuit to be a vehicle for systemic reform. This is the legal standard when a plaintiff asks a federal court for an injunction — or a forward-looking legal order. When the stakes are this deadly, federal courts should step in. If police departments still failed to comply, federal judges could impose penalties. How do we know? Consider school segregation. Local officials had promised change but failed to ensure it. It took decades of close supervision by federal courts to make a dent in the problem. As the courts started to leave this field in more recent years, de facto segregation returned.
(senior federal district judge) Jed A. Rakoff’s essay in The New York Review of Books ... tries to explain why innocent people so often plead guilty. At least 20,000 people have pled guilty to and gone to jail for felonies they did not commit — if you very conservatively take criminologists’ lowest estimates, and cut them in half. Rakoff identifies three ways the criminal justice system obstructs its own “truth seeking mechanism,” a trial by jury: 1. By embracing the increasingly popular plea bargain. 97 percent of federal trials were resolved last year through plea bargain. Plea bargains ... are weighted largely in favor of the prosecutor. The notion that a plea bargain is a contractual mediation between two relatively equal parties, Rakoff argues, “is a total myth”. 2. Through mandatory minimum sentences. The combination of mandatory sentences and prosecutorial discretion forces the defendant [to] run the risk of losing the case and serve the maximum sentence or take a reduced charge, at a reduced sentence, even when innocent. 3. Via the unfettered rise of prosecutorial power. Prosecutors have far more power ... than any other party involved in the criminal justice system. The one mechanism that could check their power is the jury trial, which is becoming “virtually extinct” in federal court, Rakoff writes. One possible solution to all these problems — aside from repealing mandatory minimum sentences and generally reducing the severity of sentences — is greater judicial oversight.
For almost 40 years, Carole Hinders has dished out Mexican specialties at her modest cash-only restaurant. She deposited the earnings at a small bank branch a block away — until last year, when two tax agents knocked on her door and informed her that they had seized her checking account. She has not been charged with any crime. The money was seized solely because she had deposited less than $10,000 at a time. Using a law designed to catch drug traffickers ... the government has gone after run-of-the-mill business owners and wage earners without so much as an allegation that they have committed serious crimes. The government can take the money without ever filing a criminal complaint. Richard Weber, the chief of Criminal Investigation at the I.R.S., said in a written statement ... that making deposits under $10,000 to evade reporting requirements, called structuring, is ... a crime. The Institute for Justice, a Washington-based public interest law firm ... analyzed structuring data from the I.R.S., which made 639 seizures in 2012, up from 114 in 2005. Only one in five was prosecuted as a criminal structuring case. Law enforcement agencies get to keep a share of whatever is forfeited. This incentive has led to the creation of a law enforcement dragnet, with more than 100 multiagency task forces combing through bank reports, looking for accounts to seize. There are often legitimate business reasons for keeping deposits below $10,000, said Larry Salzman, a lawyer with the Institute for Justice. For example, he said, a grocery store owner in Fraser, Mich., had an insurance policy that covered only up to $10,000 cash.
Note: For more along these lines, see concise summaries of deeply revealing civil liberties news articles.
[National security letters], the reach of which was expanded under the Patriot Act in 2001, let the FBI get business records from telephone, banking, and Internet companies with just a declaration that the information is relevant to a counterterrorism investigation. The FBI can get such information with a subpoena or another method with some judicial oversight. Can the government make demands for data entirely in secret? That was the question yesterday before a federal appeals court in San Francisco, where government lawyers argued that National Security Letters — FBI requests for information that are so secret they can’t be publicly acknowledged by the recipients — were essential to counterterrorism investigations. One of the judges seemed to question why there was no end-date on the gag orders, and why the burden was on the recipients of NSLs to challenge them. “It leaves it to the poor person who is subject to those requirements to just constantly petition the government to get rid of it,” said the judge, N. Randy Smith. The FBI sends out thousands of NSLs each year – 21,000 in fiscal year 2012. Google, Yahoo, Facebook and Microsoft filed a brief in support of the NSL challenge, arguing that they want to “publish more detailed aggregate statistics about the volume, scope and type of NSLs that the government uses to demand information about their users.” Twitter also announced this week that it was suing the U.S. government over restrictions on how it can talk about surveillance orders. Tech companies can currently make public information about the number of NSLs or Foreign Intelligence Surveillance Court orders they receive in broad ranges, but Twitter wants to be more specific.
Note: For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
Amid widespread criticism of the deployment of military-grade weapons and vehicles by police officers in Ferguson, MO ... NPR obtained data from the Pentagon on every military item sent to local, state and federal agencies through the Pentagon's Law Enforcement Support Office — known as the 1033 program — from 2006 through April 23, 2014. We took the raw data, analyzed it and have organized it. We are making that data set available to the public. The 1033 program is the key source of ... military items being sent to local law enforcement [such as] mine-resistant, ambush-protected vehicles, or MRAPs. More than 600 of them have been sent ... mostly within the past year. The Pentagon has also distributed: 79,288 assault rifles, 205 grenade launchers, 11,959 bayonets, 3,972 combat knives, $124 million worth of night-vision equipment, including night-vision sniper scopes, 479 bomb detonator robots, 50 airplanes, 422 helicopters, [and] more than $3.6 million worth of camouflage gear and other "deception equipment." The list [also] includes building materials, musical instruments and even toiletries. Congress authorized the 1033 program in 1989 to equip local, state and federal agencies in the war on drugs. In 1996, Congress widened the program's scope to include counterterrorism. The data do not confirm whether either of those public safety goals are, in fact, driving decisions.
Development of a U.S. counterattack for cyberterrorism that could do more harm than good was one of the final events that drove Edward Snowden to leak government secrets, the former National Security Agency contractor tells Wired magazine. Snowden ... said the MonsterMind program was designed to detect a foreign cyberattack and keep it from entering the country. But it also would automatically fire back. The problem, he said, is malware can be routed through an innocent third-party country. "These attacks can be spoofed," he told Wired. MonsterMind for example ... could accidentally start a war. And it's the ultimate threat to privacy because it requires the NSA to gain access to virtually all private communications coming in from overseas. "The argument is that the only way we can identify these malicious traffic flows and respond to them is if we're analyzing all traffic flows," he said. "And if we're analyzing all traffic flows, that means we have to be intercepting all traffic flows. That means violating the Fourth Amendment, seizing private communications without a warrant, without probable cause or even a suspicion of wrongdoing. For everyone, all the time. You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it," Snowden told Wired. "But if you do that, it creates a slippery slope that just increases over time. And by the time you've been in 15 years, 20 years, 25 years, you've seen it all and it doesn't shock you. And so you see it as normal."
Note: Read the cover story from Wired magazine with a deep inside report on Snowden.
When Australia's Susie O'Neill claimed the gold medal at the 1996 Atlanta Olympics, she dedicated her victory to Scott Volkers, the swimming coach who had taken over her training two years earlier. By this time, three women who had been Volkers' students were losing belief in themselves and the swimming community. Julie Gilbert, Kylie Rogers and Simone Boyce took the stand at the royal commission into child abuse in Sydney this week to describe their mental breakdowns, eating disorders, anxiety and isolation from a swimming hierarchy that refused to believe them or failed to explore the possibility that Volkers molested them – as girls aged 12 to 18 – in the 1980s. Volkers remained on the payroll of elite Australian swimming institutions until 2010, when he was finally forced to move to Brazil, where he still works as a leading coach. Was it Australia's win-at-all-costs swimming culture that kept him in the presence of young athletes? An exasperated Andrew Boe, the lawyer representing Gilbert, Rogers and Boyce, pointed out: "This is not an examination of whether he was a good swimming coach or not." Nor is it an examination of the guilt or innocence of Volkers – against whom charges concerning these three alleged victims were dropped in 2002 – or other swimming coaches. It is an inquiry into the institutional responses to abuse. Swimming Australia's association with Volkers [ended] in 2005, when the coach's fourth accuser came forward with claims that Volkers had groped her breasts and attempted to stimulate her vagina in the late 1990s, when she was 15. The allegations were very similar to the earlier cases.
Note: For more on this, see concise summaries of deeply revealing sexual abuse scandals news articles from reliable major media sources.
The American Civil Liberties Union has released the results of its year-long study of police militarization. The study looked at 800 deployments of SWAT teams among 20 local, state and federal police agencies in 2011-2012. Among the notable findings: 62 percent of the SWAT raids surveyed were to conduct searches for drugs. Just 7 percent of SWAT raids were “for hostage, barricade, or active shooter scenarios.” In at least 36 percent of the SWAT raids studied, no contraband of any kind was found. This figure could be as high as 65 percent. SWAT tactics are disproportionately used on people of color. 65 percent of SWAT deployments resulted in some sort of forced entry into a private home. In over half those raids, the police failed to find any sort of weapon, the presence of which was cited as the reason for the violent tactics. SWAT teams today are overwhelmingly used to investigate people who are still only suspected of committing nonviolent consensual crimes. And because these raids often involve forced entry into homes, often at night, they’re actually creating violence and confrontation where there was none before. In short, we have police departments that are increasingly using violent, confrontational tactics to break into private homes for increasingly low-level crimes, and they seem to believe that the public has no right to know the specifics of when, how and why those tactics are being used.
The First Amendment protects public employees from job retaliation when they are called to testify in court about official corruption, the Supreme Court ruled [on June 19]. The unanimous decision cheered whistleblower advocates, who said it could encourage more government workers to cooperate with prosecutors in public fraud cases without fear of losing their livelihoods. The justices decided in favor of Edward Lane, a former Alabama community college official who says he was fired after testifying at the criminal fraud trial of a state lawmaker. Lower courts had ruled against Lane, finding that he was testifying as a college employee, not as a citizen. Writing for the court, Justice Sonia Sotomayor said Lane's testimony was constitutionally protected because he was speaking as a citizen on a matter of public concern, even if it covered facts he learned at work. In past cases, the court has said that public employees generally do not have free-speech rights when they discuss matters learned at their jobs. "This ruling gives a green light to all public employees who have information concerning official corruption and fraud and want to expose these crimes," said Stephen Kohn, Executive Director of the National Whistleblower Center. He predicted the decision [will] have a "wide impact" on investigations of securities, banking and tax fraud. Lane was director of a college youth program at Central Alabama Community College in 2006 when he discovered that a state lawmaker, Sue Schmitz, was on the payroll but not showing up for work. Lane fired Schmitz despite warnings that doing so could jeopardize his own job.
Note: For more on this, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.