Privacy Media ArticlesExcerpts of Key Privacy Media Articles in Major Media
Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
The Supreme Court on Monday ruled by a 5-to-4 vote that officials may strip-search people arrested for any offense, however minor, before admitting them to jails even if the officials have no reason to suspect the presence of contraband. Justice Anthony M. Kennedy, joined by the court’s conservative wing, wrote that courts are in no position to second-guess the judgments of correctional officials. The procedures endorsed by the majority are forbidden by statute in at least 10 states. According to a supporting brief filed by the American Bar Association, international human rights treaties also ban the procedures. Justice Stephen G. Breyer, writing for the four dissenters, said the strip searches the majority allowed were “a serious affront to human dignity and to individual privacy” and should be used only when there was good reason to do so. Justice Breyer said that the Fourth Amendment should be understood to bar strip searches of people arrested for minor offenses not involving drugs or violence, unless officials had a reasonable suspicion that they were carrying contraband. People have been subjected to “the humiliation of a visual strip search” after being arrested for driving with a noisy muffler, failing to use a turn signal and riding a bicycle without an audible bell. A nun was strip-searched ... after an arrest for trespassing during an antiwar demonstration. In a study of 23,000 people admitted to a correctional facility in Orange County, N.Y., using that standard, there was at most one instance of contraband detected that would not otherwise have been found.
Note: For an abundance of major media articles showing severe erosion of civil liberties, click here.
The government will be able to monitor the calls, emails, texts and website visits of everyone in the UK under new legislation set to be announced soon. Internet firms will be required to give intelligence agency GCHQ access to communications on demand, in real time. The Home Office says the move is key to tackling crime and terrorism, but civil liberties groups have criticised it. Tory MP David Davis called it "an unnecessary extension of the ability of the state to snoop on ordinary people". A new law ... would not allow GCHQ to access the content of emails, calls or messages without a warrant. But it would enable intelligence officers to identify who an individual or group is in contact with, how often and for how long. They would also be able to see which websites someone had visited. Conservative MP and former shadow home secretary David Davis said it would make it easier for the government "to eavesdrop on vast numbers of people". "What this is talking about doing is not focusing on terrorists or criminals, it's absolutely everybody's emails, phone calls, web access..." He said that until now anyone wishing to monitor communications had been required to gain permission from a magistrate. Nick Pickles, director of the Big Brother Watch campaign group, called the move "an unprecedented step that will see Britain adopt the same kind of surveillance seen in China and Iran". The previous Labour government attempted to introduce a central, government-run database of everyone's phone calls and emails, but eventually dropped the bid after widespread anger.
Note: For more on this from BBC, click here. Though this is interesting news, many know that the government has had easy access to all people's emails, phone calls, and more for many years through systems like echelon and more. For an abundance of major media articles showing how many of the power elite want to create a big-brother society, click here.
The Obama administration is moving to relax restrictions on how counterterrorism analysts may retrieve, store and search information about Americans gathered by government agencies for purposes other than national security threats. Attorney General Eric H. Holder Jr. [has] signed new guidelines for the National Counterterrorism Center. The guidelines will lengthen to five years — from 180 days — the amount of time the center can retain private information about Americans when there is no suspicion that they are tied to terrorism, intelligence officials said. The guidelines are also expected to result in the center making more copies of entire databases and “data mining them.” They also set off civil-liberties concerns among privacy advocates who invoked the “Total Information Awareness” program. That program, proposed early in the George W. Bush administration and partially shut down by Congress after an outcry, proposed fusing vast archives of electronic records — like travel records, credit card transactions, phone calls and more. “We’re all in the dark, and for all we know it could be a rerun of Total Information Awareness, which would have allowed the government to make a computerized database of everything on everybody,” said Kate Martin, the director of the Center for National Security Studies, who criticized the administration for not making the draft guidelines public for scrutiny ahead of time.
A new federal law, signed by the president on [February 14], compels the Federal Aviation Administration to allow drones to be used for all sorts of commercial endeavors. Local police and emergency services will also be freer to send up their own drones. But while businesses, and drone manufacturers especially, are celebrating the opening of the skies to these unmanned aerial vehicles, the law raises new worries about how much detail the drones will capture about lives down below — and what will be done with that information. Some questions likely to come up: Can a drone flying over a house pick up heat from a lamp used to grow marijuana inside, or take pictures from outside someone’s third-floor fire escape? Can images taken from a drone be sold to a third party, and how long can they be kept? The American Civil Liberties Union and other advocacy groups are calling for new protections against what the A.C.L.U. has said could be “routine aerial surveillance of American life.” The new law, part of a broader financing bill for the F.A.A., came after intense lobbying by drone makers and potential customers. These manufacturers have been awaiting lucrative new opportunities at home. The market for drones is valued at $5.9 billion and is expected to double in the next decade, according to industry figures. Drones can cost millions of dollars for the most sophisticated varieties to as little as $300 for one that can be piloted from an iPhone.
Note: For more information on the use of drones by police in the US, click here. For more on the threats to civil liberties created by this new law, click here. For lots more from reliable sources on surveillance in the US, click here.
In a luxury Washington, DC, hotel last month, governments from around the world gathered to discuss surveillance technology they would rather you did not know about. The annual Intelligence Support Systems (ISS) World Americas conference is a mecca for representatives from intelligence agencies and law enforcement. But to the media or members of the public, it is strictly off limits. Behind the cloak of secrecy at the ISS World conference, tips are shared about the latest advanced ... methods used to spy on citizens – computer hacking, covert bugging and GPS tracking. The use of such methods is more commonly associated with criminal hacking groups, who have used spyware and trojan viruses to infect computers and steal bank details or passwords. But as the internet has grown, intelligence agencies and law enforcement have adopted similar techniques. "The current method of choice would seem to be spyware, or trojan horses," said Chris Soghoian, a Washington-based surveillance and privacy expert. "When there are five or six conferences held in closed locations every year, where telecommunications companies, surveillance companies and government ministers meet in secret to cut deals, buy equipment, and discuss the latest methods to intercept their citizens' communications – that I think meets the level of concern," he said. "Decades of history show that surveillance powers are abused – usually for political purposes."
Somewhere, a US government official is reading through a list of those who sent or received an email from Jacob Appelbaum, a 28-year-old computer science researcher at the University of Washington who volunteered for WikiLeaks. Among those listed will be my name, a journalist who interviewed Appelbaum for a book about the digital revolution. Appelbaum is a spokesman for Tor, a free internet anonymising software that helps people defend themselves against internet surveillance. He's spent five years teaching activists around the world how to install and use the service to avoid being monitored by repressive governments. Now, Appelbaum finds himself a target of his own government as a result of his friendship with Julian Assange and the fact WikiLeaks used the Tor software. Appelbaum has not been charged with any wrongdoing; nor has the government shown probable cause that he is guilty of any criminal offence. That matters not a jot, because, as the law stands, government officials don't need a search warrant to access our digital data. Searching someone's home requires a warrant that can only be obtained by proving probable cause, but digital searches require no such burden of proof. Most people are not aware of the ease with which governments – free, open and so-called democratic – can access and peruse our private communications.
Note: For key reports on government threats to privacy from major media sources, click here.
Your OnStar-equipped car can share an awful lot about your driving habits -- even if you're no longer an OnStar customer. A senator from New York has asked the Federal Trade Commission to open an investigation into vehicle tracking by General Motors' OnStar division. Two other senators issued calls for the company to explain and reconsider its tracking policies. OnStar, which provides a variety of services including vehicle diagnostics, driving directions and automated 911 calls to owners of mostly GM vehicles, recently announced that it reserves the right to track and sell information about vehicles' location and speed even after the driver has stopped subscribing to the service. OnStar, which has around 6 million subscribers, relies on GPS tracking and other systems built into the car. Senator Charles Schumer, a Democrat from New York,... called the tracking "one of the most brazen invasions of privacy in recent memory." Senators Al Franken and Christopher Coons, both Democrats, sent a letter to OnStar last week saying that the company's actions "appear to violate basic principles of privacy and fairness." OnStar reserves the right to sell "anonymized" information collected from vehicles to outside companies. "Anonymized" data is aggregated on cannot be traced back to any individual vehicle or person. But hackers have been able to tease out individual user information from supposedly anonymized data, Schumer noted in his announcement.
Note: For more on corporate and government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Companies have long used criminal background checks, credit reports and even searches on Google and LinkedIn to probe the previous lives of prospective employees. Now, some companies are requiring job candidates to also pass a social media background check. A year-old start-up, Social Intelligence, scrapes the Internet for everything prospective employees may have said or done online in the past seven years. Then it assembles a dossier with examples of professional honors and charitable work, along with negative information that meets specific criteria: online evidence of racist remarks; references to drugs; sexually explicit photos, text messages or videos; flagrant displays of weapons or bombs and clearly identifiable violent activity. The service ... alarms privacy advocates who say that it invites employers to look at information that may not be relevant to job performance. And what relevant unflattering information has led to job offers being withdrawn or not made? Marc S. Rotenberg, president of the Electronic Privacy Information Center, ... said that employers were entitled to gather information to make a determination about job-related expertise, but he expressed concern that “employers should not be judging what people in their private lives do away from the workplace.”
Dozens of police departments nationwide are gearing up to use a tech company's already controversial iris- and facial-scanning device that slides over an iPhone and helps identify a person or track criminal suspects. Its use has set off alarms with some who are concerned about possible civil liberties and privacy issues. The smartphone-based scanner, named Mobile Offender Recognition and Information System, or MORIS, is made by BI2 Technologies in Plymouth, Massachusetts. An iris scan, which detects unique patterns in a person's eyes, can reduce to seconds the time it takes to identify a suspect in custody. When attached to an iPhone, MORIS can photograph a person's face and run the image through software that hunts for a match in a BI2-managed database of U.S. criminal records. Constitutional rights advocates are concerned, in part because the device can accurately scan an individual's face from up to four feet away, potentially without a person's being aware of it. Experts also say that before police administer an iris scan, they should have probable cause a crime has been committed. "What we don't want is for them to become a general surveillance tool, where the police start using them routinely on the general public, collecting biometric information on innocent people," said Jay Stanley, senior policy analyst with the national ACLU in Washington, D.C.
With little notice and only occasional complaints, the American military and local authorities have been engaged in an ambitious effort to record biometric identifying information on a remarkable number of people in Afghanistan and Iraq, particularly men of fighting age. Information about more than 1.5 million Afghans has been put in databases operated by American, NATO and local forces. In Iraq, an even larger number of people, and a larger percentage of the population, have been registered. Data have been gathered on roughly 2.2 million Iraqis. A citizen in Afghanistan or Iraq would almost have to spend every minute in a home village and never seek government services to avoid ever crossing paths with a biometric system. What is different from traditional fingerprinting is that the government can scan through millions of digital files in a matter of seconds. While the systems are attractive to American law enforcement agencies, there is serious legal and political opposition to imposing routine collection on American citizens. Various federal, state and local law enforcement agencies have discussed biometric scanning, and many have even spent money on hand-held devices. But the proposed uses are much more limited, with questions being raised about constitutional rights of privacy and protection from warrantless searches.
Note: Many new technologies for domestic population control are developed, deployed, and tested by the US military in war theaters abroad, and then shared with police agencies in the US. For many examples see our "Non-lethal" Weapons article archive available here.
Military researchers are at work on another revolution in the air: shrinking unmanned drones ... to the size of insects and birds. The drones in development ... are designed to replicate the flight mechanics of moths, hawks and other inhabitants of the natural world. “We’re looking at how you hide in plain sight,” said Greg Parker, an aerospace engineer, as he held up a prototype of a mechanical hawk that in the future might carry out espionage or kill. An explosion in aerial drones is transforming the way America fights and thinks about its wars. Predator drones ... are by now a brand name, known and feared around the world. But far less known is the sheer size, variety and audaciousness of a rapidly expanding drone universe, along with the dilemmas that come with it. The Pentagon now has some 7,000 aerial drones, compared with fewer than 50 a decade ago. Within the next decade the Air Force anticipates a decrease in manned aircraft but expects its number of “multirole” aerial drones like the Reaper — the ones that spy as well as strike — to nearly quadruple, to 536. Already the Air Force is training more remote pilots, 350 this year alone, than fighter and bomber pilots combined. “It’s a growth market,” said Ashton B. Carter, the Pentagon’s chief weapons buyer. The Pentagon has asked Congress for nearly $5 billion for drones next year, and by 2030 envisions ever more stuff of science fiction: “spy flies” equipped with sensors and microcameras to detect enemies
Note: Ashton B. Carter, CIA director John Deutch, and executive director of the 9/11 Commission Philip Zelikow co-authored a 1998 article in the journal of the Council on Foreign Relations, Foreign Affairs, titled "Catastrophic Terrorism". It predicted, years in advance, a massive attack on the World Trade Center that would result in loss of civil liberties, detention without charge, torture, and endless wars abroad. The Pentagon's weapons-buying spree, now including billions of dollars for drones to be used over US soil, and for which Carter is the "chief weapons buyer," would have been impossible without the 9/11 attacks.
When two senators warned that the Patriot Act is being interpreted in a secret way that would alarm Americans if they knew the details, civil liberties activists could only speculate about what they meant. The activists' fear: that the government is using the anti-terrorism law to collect vast troves of personal information, including cellphone records, on Americans who have no link to terrorism. Sens. Ron Wyden of Oregon and Mark Udall of Colorado, both Democrats, proclaimed that the Patriot Act's surveillance powers are being used far more expansively than most Americans realize. "Today the American people do not know how their government interprets the language of the Patriot Act," Wyden said. "Someday they are going to find out, and a lot of them are going to be stunned. Some of them will undoubtedly ask their senators: 'Did you know what this law actually did? Why didn't you know? Wasn't it your job to know, before you voted on it?'" The warnings by two lawmakers with access to secret information underscore the extent to which government surveillance is shielded from view, in an age when nearly every American leaves a digital trail through the Internet and mobile devices. A clue about Wyden's concerns may be found in a separate bill he is proposing, to forbid the government from tracking, without a court order, the location of Americans through the GPS signals given out by their cellphones.
What's good for the police apparently isn't good for the people - or so the law enforcement community would have us believe when it comes to surveillance. That's a concise summary of a new trend noted by National Public Radio last week - the trend whereby law enforcement officials have been trying to prevent civilians from using cell phone cameras in public places as a means of deterring police brutality. Oddly, the effort - which employs both forcible arrests of videographers and legal proceedings against them - comes at a time when the American Civil Liberties Union reports that "an increasing number of American cities and towns are investing millions of taxpayer dollars in surveillance camera systems." The assault on civil liberties in America is a very real problem. As USA Today reported under the headline "Police brutality cases on rise since 9/11," situations "in which police, prison guards and other law enforcement authorities have used excessive force or other tactics to violate victims' civil rights increased 25 percent" between 2001 and 2007. Last year alone, more than 1,500 officers were involved in excessive force complaints, according to the National Police Misconduct Statistics and Reporting Project.
Weeks after generating an uproar for the aggressive screening of a six-year-old child in New Orleans, the TSA is again facing criticism for an enhanced pat-down. Former Miss USA Susie Castillo says she was "molested" by a TSA screener at Dallas/Fort Worth International Airport after declining to go through a body scanner due to radiation concerns. According to a detailed account from the Dallas Morning News, Castillo wrote "My private area was grazed four times!" on a complaint card after the screening. Castillo immediately shot a tearful video recounting the episode more explicitly and posted it on YouTube. The Boston Herald quotes from the video: "That's why I'm crying, that's why I'm so upset. They're making me choose to either get molested, because that's what I feel like, or go through this machine that's completely unhealthy and dangerous." TSA spokesman Luis Casanova defended the screening procedure. "Everything [the screener] did was according to protocol," Casanova said.
Note: For key articles on increasing reductions of civil liberties by governments, click here.
Security researchers have discovered that Apple's iPhone keeps track of where you go – and saves every detail of it to a secret file on the device which is then copied to the owner's computer when the two are synchronised. The file contains the latitude and longitude of the phone's recorded coordinates along with a timestamp, meaning that anyone who stole the phone or the computer could discover details about the owner's movements using a simple program. For some phones, there could be almost a year's worth of data stored, as the recording of data seems to have started with Apple's iOS 4 update to the phone's operating system, released in June 2010. "Apple has made it possible for almost anybody – a jealous spouse, a private detective – with access to your phone or computer to get detailed information about where you've been," said Pete Warden, one of the researchers. Only the iPhone records the user's location in this way, say Warden and Alasdair Allan, the data scientists who discovered the file and are presenting their findings at the Where 2.0 conference in San Francisco on [April 20]. "Alasdair has looked for similar tracking code in [Google's] Android phones and couldn't find any," said Warden.
Note: For key reports from reliable sources on threats to privacy, click here.
The US military is developing software that will let it secretly manipulate social media sites by using fake online personas to influence internet conversations and spread pro-American propaganda. A Californian corporation has been awarded a contract with United States Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, to develop what is described as an "online persona management service" that will allow one US serviceman or woman to control up to 10 separate identities based all over the world. Critics are likely to complain that it will allow the US military to create a false consensus in online conversations, crowd out unwelcome opinions and smother commentaries or reports that do not correspond with its own objectives. The discovery that the US military is developing false online personalities – known to users of social media as "sock puppets" – could also encourage other governments, private companies and non-government organisations to do the same. Once developed, the software could allow US service personnel, working around the clock in one location, to respond to emerging online conversations with any number of co-ordinated messages, blogposts, chatroom posts and other interventions.
Note: The Pentagon claims that the "fake persona" software will not be used on social networks in the United States, because that would break laws against using propaganda on US citizens. How much credence should be given to this assurance?
Giving Transportation Security Administration agents a peek under your clothes may soon be a practice that goes well beyond airport checkpoints. Newly uncovered documents show that as early as 2006, the Department of Homeland Security has been planning pilot programs to deploy mobile scanning units that can be set up at public events and in train stations, along with mobile x-ray vans capable of scanning pedestrians on city streets. The non-profit Electronic Privacy Information Center (EPIC) [has] published documents it obtained from the Department of Homeland Security showing that from 2006 to 2008 the agency planned a study of of new anti-terrorism technologies. The projects range from what the DHS describes as “a walk through x-ray screening system that could be deployed at entrances to special events” ... to “covert inspection of moving subjects” employing the same backscatter imaging technology currently used in American airports. The 173-page collection of contracts and reports, acquired through a Freedom of Information Act request, includes contracts with Siemens Corporations, Northeastern University, and Rapiscan Systems. One project allocated to Northeastern University and Siemens would mount backscatter x-ray scanners and video cameras on roving vans, along with other cameras on buildings and utility poles, to monitor groups of pedestrians, assess what they carried, and even track their eye movements. It’s not clear to what degree the technologies outlined in the DHS documents have been implemented.
Note: When WantToKnow.info manager Fred Burks worked as a language interpreter with the US State Department, he accompanied foreign dignitaries on ride-alongs with police where they were already using equipment like this over 10 years ago in clear violation of privacy laws. For other major media articles revealing clear violations of civil liberties, click here.
Skipping class, though frowned upon, is practically a rite of passage for young teens, but thanks to an elaborate system involving GPS being used by some school districts, it is practically being eliminated completely. The Orange County Register reports that the Anaheim Union High School District in California is currently participating in a pilot program which involves using a combination of Global Positioning System technology, automated telephone reminders, and one-on-one coaching to cut down on truancy. It's similar to programs being used in Baltimore and San Antonio. Basically any students in the seventh- or eighth-grade who have four or more unexcused absences over the course of a school year can be put into the Anaheim program. They will be assigned a GPS tracking device about the size of a cell phone, and they'll need to use it regularly, the newspaper said. It's worth noting that while this anti-truancy program is very elaborate and almost invasive, it is [promoted as] optional. Students and their parents are offered the chance to voluntarily participate in the "monitoring as a way to avoid continuation school or prosecution with a potential stay in juvenile hall." On top of that, parents would also be avoiding the $2,000 fine that can come from turning a blind eye to truancy if a school district chooses to pursue the issue.
Note: For other revealing media articles on microchips being used to invade privacy, click here. To better understand a program of elements within the power elite to microchip the entire population, click here.
Leaked U.S. diplomatic cables appear to show that the United States has been snooping on NATO's top official using secret sources on his own staff. Confidential cables from the U.S. mission to NATO released [on February 11] by WikiLeaks, ... said American diplomats received information on the private conversations of Secretary-General Anders Fogh Rasmussen from "a member of the NATO international staff." Instead of the staffer's name, the phrase "strictly protect" was inserted in a cable dated Sept. 10, 2009. The cable dealt with Fogh Rasmussen's proposal to improve ties with Russia by establishing contacts with the Collective Security Treaty Organization, a Russia-dominated security alliance. The cable was signed off by U.S. ambassador Ivo Daalder. There has been no known [previous] case in the past of a nation spying on the secretary-general.
Consumer Watchdog, an advocacy group largely focused in recent years on Google's privacy practices, has called [for] a congressional investigation into the Internet giant's "cozy" relationship with U.S. President Barack Obama's administration. In a letter sent [on January 24], Consumer Watchdog asked Representative Darrell Issa, the new chairman of the House Oversight and Government Reform Committee, to investigate the relationship between Google and several government agencies. "We believe Google has inappropriately benefited from close ties to the administration," the letter said. "It should not get special treatment and access because of a special relationship with the administration." Consumer Watchdog's latest complaints about the relationship of Google and the Obama administration are outlined in a 32-page report [which] questions Google's relationship with the U.S. National Security Agency and calls for the company to be more open about what consumer information it shares with the spy agency.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.