Civil Liberties News Stories
Excerpts of Key Civil Liberties News Stories in Major Media


Below are many highly revealing excerpts of important civil liberties news stories reported in the major media that suggest a major cover-up. Links are provided to the full stories on their mainstream media websites. If any link fails to function, read this webpage. These civil liberties news stories are listed by date posted to this webpage. You can explore the same articles listed by order of importance or by article date. By choosing to educate ourselves on these important issues and to spread the word, we can and will build a brighter future.


Civil Liberties News stories


Note: This comprehensive list of civil liberties news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Public’s rights getting slowly pared back
2014-10-11, Miami Herald
Posted: 2014-10-20 19:11:47
http://www.miamiherald.com/opinion/opn-columns-blogs/leonard-pitts-jr/article...

Last week, a federal judge told us what we already knew. Namely, that police in Ferguson, Mo. violated the rights of protesters demonstrating against the shooting death of Michael Brown. U.S. District Judge Catherine Perry struck down an ad hoc rule under which cops had said people could not stand still while peacefully protesting. Still, one’s sense of righteous vindication is tempered by the fact that police felt free to try this absurd stratagem in the first place — and by the fact that this was hardly the only recent example of police using the Constitution for Kleenex. Ferguson, let us not forget, is also the town where reporters were tear gassed and jailed and photographers ordered to stop taking pictures. In our unthinking mania for laws to “get tough on crime,” we actually made it tougher on ourselves, altering the balance of power between people and police to the point where a cop can now take your legally-earned money off your sovereign person and there’s little you can do about it. Indeed, at the height of the Ferguson protests, an L.A. cop named Sunil Dutta published in the Washington Post an Op-Ed advising that, “if you don’t want to get shot, tased, pepper-sprayed, struck with a baton or thrown to the ground, just do what I tell you.” Don’t argue, he said, even if you “believe (or know)” your rights are being violated. Deal with it later. It’s all well and good that now, several weeks after the fact, a court affirms the rights Ferguson police denied. But that’s a poor consolation prize. An argument can be made that rights which aren’t respected in the moment they are asserted are not really rights at all.

Note: For more on the history of civil rights violations in Ferguson, MO, see this deeply revealing news article. For more along these lines, see concise summaries of recent news articles about the erosion of our civil liberties from reliable major media sources.




Court Spotlights the FBI’s Super-Secret National Security Letters
2014-10-09, The Intercept
Posted: 2014-10-20 18:53:25
https://firstlook.org/theintercept/2014/10/09/court-spotlight-super-secret-na...

[National security letters], the reach of which was expanded under the Patriot Act in 2001, let the FBI get business records from telephone, banking, and Internet companies with just a declaration that the information is relevant to a counterterrorism investigation. The FBI can get such information with a subpoena or another method with some judicial oversight. Can the government make demands for data entirely in secret? That was the question yesterday before a federal appeals court in San Francisco, where government lawyers argued that National Security Letters — FBI requests for information that are so secret they can’t be publicly acknowledged by the recipients — were essential to counterterrorism investigations. One of the judges seemed to question why there was no end-date on the gag orders, and why the burden was on the recipients of NSLs to challenge them. “It leaves it to the poor person who is subject to those requirements to just constantly petition the government to get rid of it,” said the judge, N. Randy Smith. The FBI sends out thousands of NSLs each year – 21,000 in fiscal year 2012. Google, Yahoo, Facebook and Microsoft filed a brief in support of the NSL challenge, arguing that they want to “publish more detailed aggregate statistics about the volume, scope and type of NSLs that the government uses to demand information about their users.” Twitter also announced this week that it was suing the U.S. government over restrictions on how it can talk about surveillance orders. Tech companies can currently make public information about the number of NSLs or Foreign Intelligence Surveillance Court orders they receive in broad ranges, but Twitter wants to be more specific.

Note: For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.




U.S. threatened massive fine to force Yahoo to release data
2014-09-11, Washington Post
Posted: 2014-09-23 19:36:18
http://www.washingtonpost.com/business/technology/us-threatened-massive-fine-...

The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed [on September 11] that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program. The documents ... outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms. The ruling by the Foreign Intelligence Surveillance Court of Review became a key moment in the development of PRISM, helping government officials to convince other Silicon Valley companies that unprecedented data demands had been tested in the courts and found constitutionally sound. Eventually, most major U.S. tech companies, including Google, Facebook, Apple and AOL, complied. Microsoft had joined earlier, before the ruling, NSA documents have shown. PRISM was first revealed by former NSA contractor Edward Snowden last year. Documents made it clear that the program allowed the NSA to order U.S.-based tech companies to turn over e-mails and other communications to or from foreign targets without search warrants for each of those targets. Other NSA programs gave even more wide-ranging access to personal information of people worldwide, by collecting data directly from fiber-optic connections.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.




Snowden: New Zealand’s Prime Minister Isn’t Telling the Truth About Mass Surveillance
2014-09-15, The Intercept
Posted: 2014-09-23 19:34:44
https://firstlook.org/theintercept/2014/09/15/snowden-new-zealand-surveillance

Prime Minister John Key ... has denied that New Zealand’s spy agency GCSB engages in mass surveillance, mostly as a means of convincing the country to enact a new law vesting the agency with greater powers. Let me be clear: any statement that mass surveillance is not performed in New Zealand, or that the internet communications are not comprehensively intercepted and monitored, or that this is not intentionally and actively abetted by the GCSB, is categorically false. If you live in New Zealand, you are being watched. At the NSA I routinely came across the communications of New Zealanders in my work with a mass surveillance tool we share with GCSB, called “XKEYSCORE.” It allows total, granular access to the database of communications collected in the course of mass surveillance. It is not limited to or even used largely for the purposes of cybersecurity, as has been claimed, but is instead used primarily for reading individuals’ private email, text messages, and internet traffic. I know this because it was my full-time job in Hawaii, where I worked every day in an NSA facility with a top secret clearance. The prime minister’s claim to the public, that “there is no and there never has been any mass surveillance” is false. The GCSB, whose operations he is responsible for, is directly involved in the untargeted, bulk interception and algorithmic analysis of private communications sent via internet, satellite, radio, and phone networks. It means they have the ability see every website you visit, every text message you send, every call you make, every ticket you purchase, every donation you make, and every book you order online. From “I’m headed to church” to “I hate my boss” to “She’s in the hospital,” the GCSB is there. Your words are intercepted, stored, and analyzed by algorithms long before they’re ever read by your intended recipient.

Note: New Zealand's prime minister has acknowledged that Snowden may be right, as reported in this article. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.




Mysterious Phony Cell Towers Could Be Intercepting Your Calls
2014-08-27, Popular Science
Posted: 2014-09-09 06:51:43
http://www.popsci.com/article/technology/mysterious-phony-cell-towers-could-b...

Les Goldsmith, the CEO of ESD America [marketers of the Crytophone 500], points me to a map that he and his customers have created, indicating 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July alone. Interceptors look to a typical phone like an ordinary tower. Once the phone connects with the interceptor, a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to pushing spyware to the device. “Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says. “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip. We even found one at South Point Casino in Las Vegas.” Who is running these interceptors and what are they doing with the calls? Goldsmith says we can’t be sure, but he has his suspicions. “Are some of them U.S. government interceptors?” [asks] Goldsmith. Interceptors vary widely in expense and sophistication – but in a nutshell, they are radio-equipped computers with software that can use arcane cellular network protocols and defeat the onboard encryption. For governments or other entities able to afford a price tag of “less than $100,000,” says Goldsmith, high-quality interceptors are quite realistic. Some interceptors are limited, only able to passively listen to either outgoing or incoming calls. But full-featured devices like the VME Dominator, available only to government agencies, can not only capture calls and texts, but even actively control the phone, sending out spoof texts, for example.

Note: Do you think the government might have put up fake cell towers to nab more data? For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.




Guantanamo Defense Lawyer Resigns, Says U.S. Case Is 'Stacked'
2014-08-31, NPR
Posted: 2014-09-09 06:49:41
http://www.npr.org/2014/08/31/344576895/guantanamo-defense-lawyer-resigns-say...

Khalid Sheikh Mohammed [is] facing a military commission at Guantanamo Bay and potentially the death penalty. He was captured in 2003 but his case still hasn't gone to trial. Last week, Maj. Jason Wright — one of the lawyers defending Mohammed — resigned from the Army. He has accused the U.S. government of "abhorrent leadership" on human rights and due process guarantees and says it is crafting a "show trial." For nearly three years, he served on Mohammed's defense team. Wright formally resigned on Aug. 26. Wright [says] that it's hard to gain any client's trust, but it was especially hard with Mohammed. His former client is one of six "high-value detainees" being prosecuted at Guantanamo for offenses that could carry the death penalty. "All six of these men have been tortured by the U.S. government," he says. Wright says Mohammed in particular has faced a level of torture "beyond comprehension." He says his client was waterboarded by the CIA 183 times and subjected to over a week of sleep deprivation; there were threats that his family would be killed. "And those are just the declassified facts that I'm able to actually speak about," Wright says. Wright wasn't allowed to discuss too many details of the detainee abuse in court. "The CIA tortured these men. They've gone to extraordinary lengths to try to keep that completely hidden from public view," Wright says. "So the statute that Congress passed has a number of protections to ensure that no information about the U.S. torture program will ever come out."

Note: Why hasn't this been covered by other major media in the US? For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.




The US government can brand you a terrorist based on a Facebook post
2014-08-30, The Guardian (One of the UK's leading newspapers)
Posted: 2014-09-09 06:48:20
http://www.theguardian.com/commentisfree/2014/aug/30/terrorist-watch-list-rul...

The US government’s web of surveillance is vast and interconnected. You can be pulled into the National Security Agency’s database quietly and quickly. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors. The watchlist [is] based on [low] standards and secret evidence, which ensnares innocent people. Indeed, the standards are so low that the US government’s guidelines specifically allow for a single, uncorroborated source of information – including a Facebook or Twitter post – to serve as the basis for placing you on its master watchlist. Of the 680,000 individuals on that FBI master list, roughly 40% have “no recognized terrorist group affiliation”, according to the Intercept. These individuals don’t even have a connection – as the government loosely defines it – to a designated terrorist group, but they are still branded as suspected terrorists. The US [government uses] a loose standard – so-called “reasonable suspicion” – in determining who, exactly, can be watchlisted. ["Reasonable suspicion"] requires neither “concrete evidence” nor “irrefutable evidence”. Instead, an official is permitted to consider “reasonable inferences” and “to draw from the facts in light of his/her experience”.

Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.




The Day Ferguson Cops Were Caught in a Bloody Lie
2014-08-15, The Daily Beast
Posted: 2014-09-02 11:14:21
http://www.thedailybeast.com/articles/2014/08/15/the-day-ferguson-cops-were-c...

The officers got the wrong man, but charged him anyway—with getting his blood on their uniforms. Police in Ferguson, Missouri, once charged a man with destruction of property for bleeding on their uniforms while four of them allegedly beat him. [A] 52-year-old welder named Henry Davis ... had been arrested for an outstanding warrant that proved to actually be for another man of the same surname, but a different middle name and Social Security number. The booking officer had no other reason to hold Davis, who ended up in Ferguson only because he missed the exit for St. Charles and then pulled off the highway because the rain was so heavy he could not see to drive. The cop who had pulled up behind him must have run his license plate and assumed he was that other Henry Davis. Davis said the cop approached his vehicle, grabbed his cellphone from his hand, cuffed him and placed him in the back seat of the patrol car, without a word of explanation. The booking officer ... proceeded to escort him to a one-man cell that already had a man in it asleep on the lone bunk. Davis balked at being a second man in a one-man cell. The booking officer summoned a number of fellow cops. One opened the cell door while another suddenly charged, propelling Davis inside and slamming him against the back wall. [A] female officer allegedly lifted Davis’ head as the cop who had initially pushed him into the cell reappeared. “He ran in and kicked me in the head,” Davis recalled. “Paramedics came. They said it was too much blood. I had to go to the hospital.” A federal magistrate ruled that the [police] perjury about the “property damage” charges was too minor to constitute a violation of due process and that Davis’ injuries were ... too minor to warrant a finding of excessive force. Never mind that a CAT scan taken after the incident confirmed that he had suffered a concussion.

Note: If you are willing to know how bad it gets, read the entire article at the link above. Then read an educational article on the skewed reporting of the New York Times on the Michael Brown murder. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.




After A Traffic Stop, Teen Was 'Almost Another Dead Black Male'
2014-08-15, NPR
Posted: 2014-09-02 11:12:56
http://www.npr.org/2014/08/15/340419821/after-a-traffic-stop-teen-was-almost-...

Alex Landau, who is African-American, was adopted by a white couple as a child and grew up in largely white, middle-class suburbs of Denver. "I thought that love would conquer all and skin color really didn't matter," [his mother, Patsy] Hathaway [said, speaking to her son]. "I had to learn the really hard way when they almost killed you." That was in 2009, when Landau, then a college student, was stopped by Denver police officers and severely beaten. Landau was 19 at the time, driving around Denver with a friend in the passenger seat. He noticed red and blue lights behind him. The officer who pulled him over "explained I had made an illegal left turn, and to step out of the car," Landau says. Landau thought he was safe. He wasn't in handcuffs, he says, and he'd already been patted down. "Plus there's three officers on the scene. And I had never had a negative interaction with police in my life. "So I ask them, 'Can I please see a warrant before you continue the search?' " Landau says. "And they grab me and began to hit me in the face. I was hit several times, and I remember gasping for air" and spitting blood, he says. "And then I hear an officer shout out, 'He's reaching for a gun,' " he tells his mother. "I immediately started yelling, 'No, I'm not. I'm not reaching for anything.' " Landau felt a gun against his head, he says. "And I expected to be shot. And at that point I lost consciousness. ... It took 45 stitches to close up the lacerations in my face alone," Landau says. I was just another black face in the streets, and I was almost another dead black male." In 2011, Alex was awarded a $795,000 settlement by the City of Denver.

Note: Listen to the very moving three-minute audio of this white mother and her black son who was nearly killed by police simply for being black. Then read an educational article on the skewed reporting of the New York Times on the Michael Brown murder. For more on this, see concise summaries of deeply revealing police corruption news articles from reliable major media sources.




Trigger happy
2014-08-15, The Economist blog
Posted: 2014-09-02 11:11:33
http://www.economist.com/blogs/democracyinamerica/2014/08/armed-police

The shooting of Michael Brown, an 18-year-old African-American, by a police officer in Ferguson, Missouri, is a reminder that civilians—innocent or guilty—are far more likely to be shot by police in America than in any other rich country. In 2012, according to data compiled by the FBI, 410 Americans were “justifiably” killed by police—409 with guns. That figure may well be an underestimate. Not only is it limited to the number of people who were shot while committing a crime, but also, amazingly, reporting the data is voluntary. Last year, in total, British police officers actually fired their weapons three times. The number of people fatally shot was zero. In 2012 the figure was just one. Even after adjusting for the smaller size of Britain’s population, British citizens are around 100 times less likely to be shot by a police officer than Americans. Between 2010 and 2014 the police force of one small American city, Albuquerque in New Mexico, shot and killed 23 civilians; seven times more than the number of Brits killed by all of England and Wales’s 43 forces during the same period. The explanation for this gap is simple. In Britain, guns are rare. Only specialist firearms officers carry them; and criminals rarely have access to them. In America, by contrast, it is hardly surprising that cops resort to their weapons more frequently. In 2013, 30 cops were shot and killed—just a fraction of the 9,000 or so murders using guns that happen each year. Add to that a hyper-militarised police culture and a deep history of racial strife and you have the reason why so many civilians are shot by police officers.

Note: For more on this, see concise summaries of deeply revealing police corruption news articles from reliable major media sources.




The Surveillance Engine: How the NSA Built Its Own Secret Google
2014-08-25, The Intercept
Posted: 2014-09-02 11:09:41
https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-c...

The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept. The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. ICREACH [as the search engine is called] contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden. Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy. ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to a 2010 memo. Information shared through ICREACH can be used to track people’s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.




Embracing flag, Snowden says he hopes to return to U.S.
2014-08-13, USA Today
Posted: 2014-08-18 07:39:42
http://www.usatoday.com/story/news/world/2014/08/13/snowden-wired-flag/13995013/

Development of a U.S. counterattack for cyberterrorism that could do more harm than good was one of the final events that drove Edward Snowden to leak government secrets, the former National Security Agency contractor tells Wired magazine. Snowden ... said the MonsterMind program was designed to detect a foreign cyberattack and keep it from entering the country. But it also would automatically fire back. The problem, he said, is malware can be routed through an innocent third-party country. "These attacks can be spoofed," he told Wired. MonsterMind for example ... could accidentally start a war. And it's the ultimate threat to privacy because it requires the NSA to gain access to virtually all private communications coming in from overseas. "The argument is that the only way we can identify these malicious traffic flows and respond to them is if we're analyzing all traffic flows," he said. "And if we're analyzing all traffic flows, that means we have to be intercepting all traffic flows. That means violating the Fourth Amendment, seizing private communications without a warrant, without probable cause or even a suspicion of wrongdoing. For everyone, all the time. You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it," Snowden told Wired. "But if you do that, it creates a slippery slope that just increases over time. And by the time you've been in 15 years, 20 years, 25 years, you've seen it all and it doesn't shock you. And so you see it as normal."

Note: Read the cover story from Wired magazine with a deep inside report on Snowden.




Government agents 'directly involved' in most high-profile US terror plots
2014-07-21, The Guardian (One of the UK's leading newspapers)
Posted: 2014-07-29 06:20:54
http://www.theguardian.com/world/2014/jul/21/government-agents-directly-invol...

Nearly all of the highest-profile domestic terrorism plots in the United States since 9/11 featured the "direct involvement" of government agents or informants, a new report says. Some of the controversial "sting" operations "were proposed or led by informants", bordering on entrapment by law enforcement. Yet the courtroom obstacles to proving entrapment are significant, one of the reasons the stings persist. The lengthy report, released on [July 21] by Human Rights Watch, raises questions about the US criminal justice system's [respect for] civil rights and due process in post-9/11 terrorism cases. [The report] portrays a system that features not just the sting operations but secret evidence, anonymous juries, extensive pretrial detentions and convictions significantly removed from actual plots. "In some cases the FBI may have created terrorists out of law-abiding individuals by suggesting the idea of taking terrorist action or encouraging the target to act," the report alleges. Out of the 494 cases related to terrorism the US has tried since 9/11, the plurality of convictions ... are not for thwarted plots but for "material support" charges, a broad category expanded further by the 2001 Patriot Act that permits prosecutors to pursue charges with tenuous connections to a terrorist act or group. Several cases featured years-long solitary confinement for accused terrorists before their trials. Some defendants displayed signs of mental incapacity. Jurors for the 2007 plot to attack the Fort Dix army base, itself influenced by government informants, were anonymous, limiting defense counsel's ability to screen out bias.

Note: Why was this important news not picked up by any major US media? For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.




The Secret Government Rulebook For Labeling You a Terrorist
2014-07-23, The Intercept
Posted: 2014-07-29 06:18:58
https://firstlook.org/theintercept/article/2014/07/23/blacklisted/

The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither “concrete facts” nor “irrefutable evidence” to designate an American or foreigner as a terrorist. The “March 2013 Watchlisting Guidance,” a 166-page document issued last year by the National Counterterrorism Center, spells out the government’s secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings. The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place entire “categories” of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to “nominate” people to the watchlists based on what is vaguely described as “fragmentary information.” It also allows for dead people to be watchlisted. The rulebook ... was developed behind closed doors by representatives of the nation’s intelligence, military, and law-enforcement establishment, including the Pentagon, CIA, NSA, and FBI. Emblazoned with the crests of 19 agencies, it offers the most complete and revealing look into the secret history of the government’s terror list policies to date.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.




Hacking Online Polls and Other Ways British Spies Seek to Control the Internet
2014-07-14, The Intercept
Posted: 2014-07-22 10:22:49
https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-...

The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call. The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users. A newly released top-secret GCHQ document called “JTRIG Tools and Techniques” provides a comprehensive, birds-eye view of just how underhanded and invasive this unit’s operations are. The document—available in full here—is designed to notify other GCHQ units of JTRIG’s “weaponised capability” when it comes to the dark internet arts, and serves as a sort of hacker’s buffet for wreaking online havoc.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.




In NSA-intercepted data, those not targeted far outnumber the foreigners who are
2014-07-05, Washington Post
Posted: 2014-07-14 16:30:59
http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data...

Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. [90% of] account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. [Many] files, described as useless by the analysts but nonetheless retained, have a startlingly intimate, even voyeuristic quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless. The cache Snowden provided came from domestic NSA operations under the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance Act. FISA content is generally stored in closely controlled data repositories, and for more than a year. The files offer an unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which enabled the NSA to make freer use of methods that for 30 years had required probable cause and a warrant from a judge.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.




Scott Volkers: Swimming coach accused of child abuse 'too good to sack'
2014-07-10, Sydney Morning Herald (One of Australia's leading newspapers)
Posted: 2014-07-14 16:19:00
http://www.smh.com.au/nsw/scott-volkers-swimming-coach-accused-of-child-abuse...

When Australia's Susie O'Neill claimed the gold medal at the 1996 Atlanta Olympics, she dedicated her victory to Scott Volkers, the swimming coach who had taken over her training two years earlier. By this time, three women who had been Volkers' students were losing belief in themselves and the swimming community. Julie Gilbert, Kylie Rogers and Simone Boyce took the stand at the royal commission into child abuse in Sydney this week to describe their mental breakdowns, eating disorders, anxiety and isolation from a swimming hierarchy that refused to believe them or failed to explore the possibility that Volkers molested them – as girls aged 12 to 18 – in the 1980s. Volkers remained on the payroll of elite Australian swimming institutions until 2010, when he was finally forced to move to Brazil, where he still works as a leading coach. Was it Australia's win-at-all-costs swimming culture that kept him in the presence of young athletes? An exasperated Andrew Boe, the lawyer representing Gilbert, Rogers and Boyce, pointed out: "This is not an examination of whether he was a good swimming coach or not." Nor is it an examination of the guilt or innocence of Volkers – against whom charges concerning these three alleged victims were dropped in 2002 – or other swimming coaches. It is an inquiry into the institutional responses to abuse. Swimming Australia's association with Volkers [ended] in 2005, when the coach's fourth accuser came forward with claims that Volkers had groped her breasts and attempted to stimulate her vagina in the late 1990s, when she was 15. The allegations were very similar to the earlier cases.

Note: For more on this, see concise summaries of deeply revealing sexual abuse scandals news articles from reliable major media sources.




Court gave NSA broad leeway in surveillance, documents show
2014-06-30, Washington Post
Posted: 2014-07-07 08:25:08
http://www.washingtonpost.com/world/national-security/court-gave-nsa-broad-le...

A classified 2010 legal certification and other documents indicate the NSA has been given a far more elastic authority than previously known, one that allows it to intercept through U.S. companies not just the communications of its overseas targets but any communications about its targets as well. The certification — approved by the Foreign Intelligence Surveillance Court and included among a set of documents leaked by former NSA contractor Edward Snowden — lists 193 countries that would be of valid interest for U.S. intelligence. The certification also permitted the agency to gather intelligence about entities including the World Bank, the International Monetary Fund, the European Union and the International Atomic Energy Agency. The documents underscore the remarkable breadth of potential “foreign intelligence” collection. An affidavit in support of the 2010 foreign-government certification said the NSA believes that foreigners who will be targeted for collection “possess, are expected to receive and/or are likely to communicate foreign intelligence information concerning these foreign powers.” That language could allow for surveillance of academics, journalists and human rights researchers. A Swiss academic who has information on the German government’s position in the run-up to an international trade negotiation, for instance, could be targeted if the government has determined there is a foreign-intelligence need for that information. If a U.S. college professor e-mails the Swiss professor’s e-mail address or phone number to a colleague, the American’s e-mail could be collected as well, under the program’s court-approved rules.

Note: For more on this, see concise summaries of deeply revealing intelligence agency news articles from reliable major media sources.




High Court: Whistleblowers' Testimony Is Protected
2014-06-19, ABC News/Associated Press
Posted: 2014-07-01 10:31:20
http://abcnews.go.com/Politics/wireStory/high-court-whistleblower-testimony-p...

The First Amendment protects public employees from job retaliation when they are called to testify in court about official corruption, the Supreme Court ruled [on June 19]. The unanimous decision cheered whistleblower advocates, who said it could encourage more government workers to cooperate with prosecutors in public fraud cases without fear of losing their livelihoods. The justices decided in favor of Edward Lane, a former Alabama community college official who says he was fired after testifying at the criminal fraud trial of a state lawmaker. Lower courts had ruled against Lane, finding that he was testifying as a college employee, not as a citizen. Writing for the court, Justice Sonia Sotomayor said Lane's testimony was constitutionally protected because he was speaking as a citizen on a matter of public concern, even if it covered facts he learned at work. In past cases, the court has said that public employees generally do not have free-speech rights when they discuss matters learned at their jobs. "This ruling gives a green light to all public employees who have information concerning official corruption and fraud and want to expose these crimes," said Stephen Kohn, Executive Director of the National Whistleblower Center. He predicted the decision [will] have a "wide impact" on investigations of securities, banking and tax fraud. Lane was director of a college youth program at Central Alabama Community College in 2006 when he discovered that a state lawmaker, Sue Schmitz, was on the payroll but not showing up for work. Lane fired Schmitz despite warnings that doing so could jeopardize his own job.

Note: For more on this, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.




Lift Assange out of legal limbo
2014-06-17, USA Today
Posted: 2014-07-01 10:29:40
http://www.usatoday.com/story/opinion/2014/06/17/assange-wikileaks-espionage-...

A whistle-blower living in exile in Russia. A publisher seeking the asylum he has already been granted while his sources are imprisoned. This isn't the cast of a summer blockbuster. It's a perfect storm of real-life cases that make it clear that constitutional guarantees of a free press and government accountability are rhetorical devices, not political realities. The whistle-blower is Edward Snowden. This month marks the first anniversary of his disclosures of massive National Security Agency surveillance. The publisher is Julian Assange. Thursday marks two years since he sought refuge in the Ecuadorian Embassy in London. Meanwhile, two of Assange's sources, Chelsea Manning (formerly known as Bradley Manning) and Jeremy Hammond, remain in prison for providing WikiLeaks with confidential documents. Harassment, targeting and prosecution of whistle-blowers, journalists and publishers have become a dangerous new normal — one we should refuse to accept, especially in a time when governments are becoming more powerful and less accountable. It's time to end this assault, starting with granting Snowden amnesty and withdrawing the threat of U.S. criminal prosecution of Assange. Similar harsh treatment and excessive punishments haven't applied to the people in government who perpetrated the crimes exposed by these whistle-blowers and published by WikiLeaks. In fact, people such as national intelligence director James Clapper, who lied under oath to Congress, have avoided consequences altogether.

Note: For more on this, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.






Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


As of Oct. 19, 2014, we're $4,100 in the red. Kindly donate here to support this vital work.

Subscribe here to our free email list for two information-packed emails per week.


WantToKnow.info is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"