As a 501(c)(3) nonprofit, we depend almost entirely on donations from people like you.
We really need your help to continue this work! Please consider making a donation.
Subscribe here and join over 13,000 subscribers to our free weekly newsletter

Privacy Media Articles

Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

Explore our comprehensive news index on a wide variety of fascinating topics.
Explore the top 20 most revealing news media articles we've summarized.
Check out 10 useful approaches for making sense of the media landscape.

Sort articles by: Article Date | Date Posted on WantToKnow.info | Importance

How strangers can hack the phone in your pocket
2016-04-17, CBS News
http://www.cbsnews.com/news/60-minutes-overtime-how-strangers-can-hack-the-ph...

"There's really only two types of companies or two types of people which are those who have been hacked and realize it and those who have been hacked and haven't." That's what mobile security expert John Hering tells 60 Minutes correspondent Sharyn Alfonsi about the danger of cellphone hacking. To prove his point, Hering assembled a group of ace hackers. Jon Oberheide showed 60 Minutes an app he created that looks legitimate but allows him to take control of a phone and suck out ... information [such as] contacts, recent purchases and text messages. Another hacker, Adam Laurie, uses radio frequency identification to hack phones. "He didn't need my phone number," Alfonsi explains. "All he had to do was physically touch my phone." He demonstrated by brushing by her in the lobby of her hotel. When he did ... her phone [automatically] dialed Laurie, allowing him to listen in on anything discussed in the room with Alfonsi's phone. A so-called "CryptoPhone" ... alerts the user when someone is trying to attack or hack into his or her phone. "Certain government facilities will try to get into your phone if you get too close to them," Alfonsi explains. To demonstrate, Les Goldsmith, CEO of ESD America, a company that specializes in countersurveillance technologies, took Alfonsi for a ride ... near a secure government facility. As they were driving past, a red line appeared on the CryptoPhone, indicating that ... if she were using a regular phone, the government agency could hear her call and read her text messages.

Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


Microsoft sues government for secret searches
2016-04-14, CNN
http://money.cnn.com/2016/04/14/technology/microsoft-secret-search-lawsuit/

Microsoft filed a landmark lawsuit against the U.S. Department of Justice on Thursday. The company accuses the federal government of adopting a widespread, unconstitutional policy of looking through Microsoft customers' data - and forcing the company to keep quiet about it. Over the past 18 months, federal judges have approved 2,600 secret searches of Microsoft customers. In two-thirds of those cases, Microsoft can't even notify their customers that they've been searched - ever - because there's no expiration date on these judicial orders. At issue here is the 1986 Electronic Communications Privacy Act, which creates a double standard when it comes to a person's right to know when police are rummaging through their stuff. "People do not give up their rights when they move their private information from physical storage to the cloud," Microsoft says in its lawsuit. "The government, however, has exploited the transition to cloud computing as a means of expanding its power to conduct secret investigations." In its lawsuit, Microsoft claims that federal agents have been violating the company's First Amendment right to speak to its own customers, as well as their customers' Fourth Amendment right to know when they're being searched. This lawsuit also notes the odd, modern distinction that the government makes between searching your computer and searching your information on a company's computer. Law enforcement agents often remain covert when they dig through information stored on company data backup services.

Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


Surprise! NSA data will soon routinely be used for domestic policing that has nothing to do with terrorism
2016-03-10, Washington Post
https://www.washingtonpost.com/news/the-watch/wp/2016/03/10/surprise-nsa-data...

The sneak-and-peek provision of the Patriot Act that was alleged to be used only in national security and terrorism investigations has overwhelmingly been used in narcotics cases. Now the New York Times reports that National Security Agency data will be shared with other intelligence agencies like the FBI without first applying any screens for privacy. The ACLU of Massachusetts blog Privacy SOS explains [that] domestic law enforcement officials now have access to huge troves of American communications, obtained without warrants, that they can use to put people in cages. This basically formalizes what was already happening. Weve known for a couple of years now that the Drug Enforcement Administration and the IRS were getting information from the NSA. Because that information was obtained without a warrant, the agencies were instructed to engage in parallel construction when explaining to courts and defense attorneys how the information had been obtained. It certainly isnt the only time that that national security apparatus has let law enforcement agencies benefit from policies that are supposed to be reserved for terrorism investigations in order to get around the Fourth Amendment, then instructed those law enforcement agencies to misdirect, fudge and outright lie about how they obtained incriminating information. This isnt just a few rogue agents. The lying has been a matter of policy.

Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


Snowden: FBI's claim it can't unlock the San Bernardino iPhone is 'bullshit'
2016-03-09, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/technology/2016/mar/09/edward-snowden-fbi-san-bern...

Edward Snowden, the whistleblower whose NSA revelations sparked a debate on mass surveillance, has waded into the arguments over the FBIs attempt to force Apple to help it unlock the iPhone 5C of one of the San Bernardino shooters. The FBI says that only Apple can deactivate certain passcode protections on the iPhone, which will allow law enforcement to guess the passcode by using brute-force. Talking via video link from Moscow to the Common Cause Blueprint for a Great Democracy conference, Snowden said: The FBI says Apple has the exclusive technical means to unlock the phone. Respectfully, thats bullshit. Snowden then went on to tweet his support for an American Civil Liberties Union report saying that the FBIs claims in the case are fraudulent. Apple co-founder Steve Wozniak also spoke out against the FBI on the Conan OBrien show on Monday, saying: I side with Apple on this one. [The FBI] picked the lamest case you ever could. Wozniak added: Verizon turned over all the phone records and SMS messages. So they want to take this other phone that the two didnt destroy, which was a work phone. Its so lame and worthless to expect theres something on it and to get Apple to expose it. Apples clash with the FBI comes to a head in California this month when the two will meet in federal court to debate whether the smartphone manufacturer should be required to weaken security settings on the iPhone of the shooter.

Note: According to The New York Times, the FBI has been misleading the public about the San Bernadino attacks for months. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


Watchdog: Canada's Electronic Spy Agency Broke Privacy Laws
2016-01-28, ABC/Associated Press
http://abcnews.go.com/International/wireStory/watchdog-canadas-electronic-spy...

Canada's electronic spy agency broke privacy laws by sharing information about Canadians with foreign partners, a federal watchdog said Thursday. Commissioner Jean-Pierre Plouffe said in his annual report that the Communications Security Establishment passed along information known as metadata to counterparts in the United States, Britain, Australia and New Zealand. Metadata is information associated with a communication, such as a telephone number or email address, but not the message itself. The communications agency intercepts and analyzes foreign communications for intelligence information of interest to the federal government. The agency is legally authorized to collect and analyze metadata churning through cyberspace. Plouffe, who keeps an eye on the highly secretive agency, said he found that it lacks clarity regarding the sharing of certain types of metadata. Defense Minister Harjit Sajjan said the sharing won't resume until he is satisfied that the proper protections are in place. Plouffe's report noted that certain metadata was not being properly minimized, or rendered unidentifiable, prior to being shared. The CSE's failure to strip out certain Canadian identity information violated the National Defense Act and therefore the federal Privacy Act as well. Privacy advocates have stressed that metadata is far from innocuous since it can reveal a great deal about a person's online behavior and interactions.

Note: Many countries do not allow their intelligence agencies to spy on their own citizens without going through a legal process. The easy way around this that has been used for decades is to simply getting the information from a friendly country. So if the CIA wants information on you in the US, they can't spy directly, but they can ask the UK to do so and pass the information to them and thus get around the laws. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.


Obama Opens NSAs Vast Trove of Warrantless Data to Entire Intelligence Community, Just in Time for Trump
2016-01-13, The Intercept
https://theintercept.com/2017/01/13/obama-opens-nsas-vast-trove-of-warrantles...

The Obama administration on Thursday announced new rules that will let the NSA share vast amounts of private data gathered without warrant, court orders or congressional authorization with 16 other agencies, including the FBI, the Drug Enforcement Agency, and the Department of Homeland Security. The new rules allow ... those agencies to sift through raw data collected under a broad, Reagan-era executive order that gives the NSA virtually unlimited authority to intercept communications abroad. Previously, NSA analysts would filter out information they deemed irrelevant and mask the names of innocent Americans before passing it along. The last-minute adoption of the procedures is one of many examples of the Obama administration making new executive powers established by the Bush administration permanent, on the assumption that the executive branch could be trusted to police itself. Executive Order 12333 ... serves as authorization for the NSAs most massive surveillance programs. In 2014, a former state department official described NSA surveillance under 12333 as a universe of collection and storage beyond what Congress has authorized. This massive database inevitably includes vast amount of Americans communications swept up when they speak to people abroad, when they go abroad themselves, or even if their domestic communications are simply routed abroad. Thats why access was previously limited to data that had already been screened to remove unrelated information and information identifying U.S. persons.

Note: For an important viewpoint on the real complexities going on with recent reporting on Trump links to Russia, CIA involvement in Syria, and media manipulations, don't miss this provocative article by Glenn Greenwald and this interview he gave to Fox News. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


The new way police are surveilling you: Calculating your threat score
2016-01-10, Washington Post
https://www.washingtonpost.com/local/public-safety/the-new-way-police-are-sur...

A new generation of technology such as the Beware software being used in Fresno has given local law enforcement officers unprecedented power to peer into the lives of citizens. But the powerful systems also have become flash points for civil libertarians and activists, who say they represent a troubling intrusion on privacy, have been deployed with little public oversight and have potential for abuse or error. This is something thats been building since September 11, said Jennifer Lynch ... at the Electronic Frontier Foundation. First funding went to the military to develop this technology, and now it has come back to domestic law enforcement. Its the perfect storm of cheaper and easier-to-use technologies and money from state and federal governments to purchase it. Perhaps the most controversial and revealing technology is the threat-scoring software Beware. Fresno is one of the first departments in the nation to test the program. As officers respond to calls, Beware automatically runs the address. The searches return the names of residents and scans them against a range of publicly available data to generate a color-coded threat level for each person or address: green, yellow or red. Exactly how Beware calculates threat scores is something that its maker, Intrado, considers a trade secret, so it is unclear how much weight is given to a misdemeanor, felony or threatening comment on Facebook. The fact that only Intrado not the police or the public knows how Beware tallies its scores is disconcerting.

Note: Learn more in this informative article. For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the disappearance of privacy from reliable major media sources.


The new way police are surveilling you: Calculating your threat score
2016-01-10, Washington Post
https://www.washingtonpost.com/local/public-safety/the-new-way-police-are-sur...

A national debate has played out over mass surveillance by the National Security Agency. [Meanwhile], a new generation of technology ... has given local law enforcement officers unprecedented power to peer into the lives of citizens. The powerful systems also have become flash points for civil libertarians and activists. This is something thats been building since September 11, said Jennifer Lynch, a senior staff attorney at the Electronic Frontier Foundation. First funding went to the military to develop this technology, and now it has come back to domestic law enforcement. Its the perfect storm of cheaper and easier-to-use technologies and money from state and federal governments to purchase it. But perhaps the most controversial and revealing technology is the threat-scoring software Beware. As officers respond to calls, Beware automatically runs the address. The searches return the names of residents and scans them ... to generate a color-coded threat level for each person or address: green, yellow or red. Exactly how Beware calculates threat scores is something that its maker, Intrado, considers a trade secret, so ... only Intrado - not the police or the public - knows how Beware tallies its scores. The system might mistakenly increase someones threat level by misinterpreting innocuous activity on social media, like criticizing the police, and trigger a heavier response by officers.

Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


Spying on Congress and Israel: NSA Cheerleaders Discover Value of Privacy Only When Their Own Is Violated
2015-12-30, The Intercept
https://theintercept.com/2015/12/30/spying-on-congress-and-israel-nsa-cheerle...

The Wall Street Journal reported yesterday that the NSA under President Obama targeted Israeli Prime Minister Benjamin Netanyahu and his top aides for surveillance. In the process, the agency ended up eavesdropping on ... U.S. lawmakers and American-Jewish groups. People who spent many years cheering for and defending ... programs of mass surveillance are suddenly indignant now that they know the eavesdropping included them. Long-time GOP chairman of the House Intelligence Committee and unyielding NSA defender Pete Hoekstra last night was truly indignant: "WSJ report that NSA spied on Congress and Israel communications very disturbing. Actually outrageous. Maybe unprecedented abuse of power ... NSA and Obama officials need to be investigated and prosecuted. NSA loses all credibility. Scary." This pattern - whereby political officials who are vehement supporters of the Surveillance State transform overnight into crusading privacy advocates once they learn that they themselves have been spied on - is one that has repeated itself over and over. So now, with yesterdays WSJ report, we witness the tawdry spectacle of large numbers of people who for years were fine with, responsible for, and even giddy about NSA mass surveillance suddenly objecting. Overnight, privacy is of the highest value because now its their privacy, rather than just yours, that is invaded.

Note: Read the full Wall Street Journal article on how the US government is secretly spying on Israeli leaders and more. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


What the TSAs new body-scanner rules mean for you
2015-12-30, Washington Post
https://www.washingtonpost.com/lifestyle/travel/what-the-tsas-new-body-scanne...

The Transportation Security Administrations new rules for screening passengers with its controversial full-body scanners - which were quietly changed just before the busy holiday travel season - represent a significant policy reversal that could affect your next flight. Getting checked by the TSAs advanced-imaging technology used to be entirely optional, allowing those who refused a scan to be subjected to a pat-down. In fact, many observers thought the agency installed the 740 body scanners in 160 airports with an understanding that no one would be forced to use them, ever. But on a Friday in late December, the TSA revised its rules, saying an opt out is no longer an option for certain passengers. The TSA is going back on its word, says Fred Cate, a law professor at Indiana University and prominent TSA-watcher. The scanners were sold to Congress and the public on the promise that they were optional, but for at least some people, that is no longer the case. In previous court filings, the agency offered written assurance that the scanners were optional. Based on the agencys statements, a federal appeals court affirmed the legality of using the full-body scanners as long as fliers were given a choice.

Note: Read more on the controversy surrounding TSA's costly but technically questionable scanners. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


U.S. government reveals breadth of requests for Internet records
2015-11-30, Sun Times/Reuters
http://national.suntimes.com/national-world-news/7/72/2208406/u-s-government-...

The Federal Bureau of Investigation has used a secretive authority to compel Internet and telecommunications firms to hand over customer data including an individuals complete web browsing history and records of all online purchases, a court filing released Monday shows. The documents are believed to be the first time the government has provided details of its so-called national security letters, which are used by the FBI to conduct electronic surveillance without the need for court approval. National security letters have been available as a law enforcement tool since the 1970s, but their frequency and breadth expanded dramatically under the USA Patriot Act, which was passed shortly after the Sept. 11, 2001 attacks. They are almost always accompanied by an open-ended gag order barring companies from disclosing the contents of the demand for customer data. The secretive orders have long drawn the ire of tech companies and privacy advocates, who argue NSLs allow the government to snoop on user content without appropriate judicial oversight. Last year, the Obama administration announced it would permit Internet companies to disclose more about the number of NSLs they receive. But they can still only provide a range such as between 0 and 999 requests. Twitter has sued in federal court seeking the ability to publish more details in its semi-annual transparency reports. Several thousand NSLs are now issued by the FBI every year. At one point that number eclipsed 50,000 letters annually.

Note: Read more about the FBI's use of these controversial secret letters. For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.


After Paris, there will be no stopping the surveillance state now
2015-11-19, CBC (Canada's public broadcasting system)
http://www.cbc.ca/news/world/surveillance-state-neil-macdonald-1.3325327

The tools European security agencies now have at their disposal ... would make any American or Canadian intelligence officer drool. Britain has literally created a surveillance state. The British Security Industry Authority estimated three years ago the government has installed about six million closed-circuit TV cameras in the public square; one for every 10 citizens. The French, too, have vastly expanded public video surveillance in recent years. And it's all been done with overwhelming support from the general public, which feels safer for the presence of the surveillance, never mind the lack of objective proof that they are more protected against outrages, which keep on occurring. Both England and France are former colonial powers that ... long ago subordinated individual rights to collective security. Canada and America more dearly cherish individual rights. Still, a surveillance state is growing here, too. David Lyon, a professor of surveillance studies at Queen's University, has identified several public surveillance trends, all of which he says are "increasing at an accelerating rate." Canada is not about to become Western Europe, he says, but "it is incumbent upon us as a society to think about the ethical consequences" of mass surveillance. [Some] would argue that the cameras are desperately needed tools, and that anyone who isn't doing anything wrong has nothing to worry about. That of course is the police state justification. They hate us because we are free, we are told. The fact that we've responded by giving up ever more freedom doesn't seem to matter.

Note: Many of the politicians publicly defending the surveillance state receive huge sums of money from private security companies. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


Mass Surveillance Isnt the Answer to Fighting Terrorism
2015-11-17, New York Times
http://www.nytimes.com/2015/11/18/opinion/mass-surveillance-isnt-the-answer-t...

Its a wretched yet predictable ritual after each new terrorist attack: Certain politicians and government officials waste no time exploiting the tragedy for their own ends. The remarks on Monday by John Brennan, the director of the Central Intelligence Agency, took that to a new and disgraceful low ... after coordinated terrorist attacks in Paris killed 129. Mr. Brennan complained about ... the sustained national outrage following the 2013 revelations by Edward Snowden, a former National Security Agency contractor, that the agency was using provisions of the Patriot Act to secretly collect information on millions of Americans phone records. It is hard to believe anything Mr. Brennan says. Last year, he bluntly denied that the C.I.A. had illegally hacked into the computers of Senate staff members conducting an investigation into the agencys detention and torture programs when, in fact, it did. In 2011 ... he claimed that American drone strikes had not killed any civilians, despite clear evidence that they had. And his boss, James Clapper Jr., the director of national intelligence, has admitted lying to the Senate on the N.S.A.s bulk collection of data. Even putting this lack of credibility aside, its not clear what extra powers Mr. Brennan is seeking. Most of the men who carried out the Paris attacks were already on the radar of intelligence officials in France and Belgium, where several of the attackers lived. The problem in this case was not a lack of data. In fact, indiscriminate bulk data sweeps have not been useful.

Note: The above is an excellent article by the New York Times editorial board. Yet the role of the largely subservient media, which strongly supported Bush's campaign to go to war in Iraq is ignored. Read this analysis to go even deeper. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


This smart TV takes tracking to a new level
2015-11-10, Washington Post
https://www.washingtonpost.com/news/the-switch/wp/2015/11/10/this-smart-tv-ta...

When you watch your Smart TV, it could also be watching you. Vizio, a top television maker, automatically tracks the viewing habits of Smart TV owners and shares that information with advertisers in a way that could connect those preferences to what those customers do on their phones or other mobile devices. Vizio's "Smart Interactivity Program" is turned on by default for its 10 million Smart TV customers. The company analyzes snippets of what you watch, be it on Netflix or traditional television, and connects patterns in your viewing behavior with your Internet Protocol address - an online identifier that can be used to pinpoint every device connected from your home. That includes everything from your laptop and phone to your smart thermostat. That information is then shared with Vizio's partners. There are laws that limit how companies share information about video watching habits, including the Video Privacy Protection Act (VPPA). However, Vizio says that those laws do not apply to its tracking service because the company associates IP addresses with the data rather than a person's name or other "personally identifiable information." Some U.S. courts have held that IP addresses do not constitute personally identifiable information. However, privacy regulators in the European Union disagree. And IP addresses are increasingly used by data brokers to paint detailed portraits of who people are.

Note: In 21st century America, TV watches you. For more along these lines, see concise summaries of deeply revealing news articles about the disappearance of privacy.


FBI spied on Burning Man music festival, documents reveal
2015-09-06, Houston Chronicle (A leading newspaper of Houston, Texas)
http://www.chron.com/national/article/FBI-spied-on-Burning-Man-music-festival...

Newly-released documents show that FBI spied on the Burning Man festival in 2010. It remains unclear if FBI agents actually attended the event. Burning Man [takes place] in an isolated Nevada desert, where up to 70,000 people gather annually for music, art, drugs and large fires. The revelations of federal surveillance come from heavily-redacted internal FBI memos handed to ... reporter Inkoo Kang, who filed a request under the federal Freedom of Information Act for any FBI documents "mentioning the phrase 'Burning Man." In late August, a private security firm contacted the FBI's Las Vegas division for help conducting a "threat assessment" ahead of the event, to which the FBI replied that they had no worrying intelligence about Burning Man. Days later, the Las Vegas division messaged the FBI's Special Events Management Unit requesting guidance on planning an approach to the festival. A subsequent paragraph, sandwiched between two entirely-redacted paragraphs, said, "scheduled overtime for special agents assigned to work special events will be approved under certain very limited and relatively rare circumstances," raising question over whether or not FBI special agents were deployed at Burning Man. A final memo listed two "accomplishments" from the operation; one was redacted, the other was "local agency liaison established/utilized." The FBI concluded that the greatest threat present at Burning Man was "use of illegal drugs by the participants."

Note: The CIA once used art as a weapon in its propaganda campaigns. Is the investigation of a large art festival merely another erosion of privacy, or is the FBI up to something comparably strange?


Many police departments spy on you without oversight. This must end
2015-08-26, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2015/aug/26/police-want-spy-without-...

Local police around the country are increasingly using high-tech mass surveillance gear that can vacuum up private information on entire neighborhoods. Many cops are ... purposefully hiding their spying from courts to avoid any scrutiny from judges. Two important news reports from the last week have shed light on the disturbing practices. The first investigation, done by USA Todays Brad Heath, found: In one case after another ... police in Baltimore and other cities used the phone tracker, commonly known as a stingray, to locate the perpetrators of routine street crimes and frequently concealed that fact from the suspects, their lawyers and even judges. Stingrays are so controversial that some state legislatures have already passed laws restricting their use which is exactly why police want to keep [their use] secret. The Wall Street Journal also reported last week about newer devices costing as little as a few hundred dollars [that] the police supposedly dont think ... require a court order at all to use against potential suspects. These devices are handheld or can be attached to clothing. Not only are these cops violating the constitutional rights of defendants by spying on them without court orders, but, in some cases, theyre also allegedly dismissing felony cases involving potentially dangerous criminals, so they can prevent judges from ruling on whether their surveillance tactics are legal ... all to continue their blanket surveillance practices with minimal scrutiny.

Note: For more along these lines, see concise summaries of deeply revealing news articles about the erosion of privacy rights.


AT&T Helped N.S.A. Spy on an Array of Internet Traffic
2015-08-15, MSN News/New York Times
http://www.msn.com/en-us/news/us/atandt-helped-nsa-spy-on-an-array-of-interne...

The National Security Agencys ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&T. The N.S.A.s top-secret budget in 2013 for the AT&T partnership was more than twice that of the next-largest such program, [and] the company installed surveillance equipment in at least 17 of its Internet hubs on American soil, far more than its similarly sized competitor, Verizon. After the terrorist attacks of Sept. 11, 2001, AT&T ... began turning over emails and phone calls within days after the warrantless surveillance began in October 2001. In 2011, AT&T began handing over 1.1 billion domestic cellphone calling records a day to the N.S.A. after a push to get this flow operational prior to the 10th anniversary of 9/11, according to an internal agency newsletter. In a 2006 lawsuit, a retired AT&T technician named Mark Klein claimed that ... he had seen a secret room in a company building in San Francisco where the N.S.A. had installed equipment. Mr. Klein claimed that AT&T was providing the N.S.A. with access to Internet traffic that AT&T transmits for other telecom companies. Such cooperative arrangements, known in the industry as peering, mean that communications from customers of other companies could end up on AT&Ts network.

Note: The story of Klein's lawsuit was initially suppressed by the NSA and major media including the L.A. Times. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.


Facial Recognition Software Moves From Overseas Wars to Local Police
2015-08-12, New York Times
http://www.nytimes.com/2015/08/13/us/facial-recognition-software-moves-from-o...

Facial recognition software, which American military and intelligence agencies used for years in Iraq and Afghanistan to identify potential terrorists, is being eagerly adopted by dozens of police departments around the country. It is being used with few guidelines and with little oversight or public disclosure. Facial recognition ... is among an array of technologies, including StingRay tracking devices and surveillance aircraft with specialized cameras, that were used in overseas wars but have found their way into local law enforcement. The F.B.I. is pushing ahead with its $1 billion Next Generation Identification program, in which the agency will gather data like fingerprints, iris scans and photographs, as well as information collected through facial recognition software. The F.B.I. system will eventually be made accessible to more than 18,000 local, state, federal and international law enforcement agencies. But people who are not criminal suspects are included in the database, and the error rate for the software is as high as 20 percent meaning the authorities could misidentify millions of people. Among the cities that use facial recognition technology are New York and Chicago, which has linked it to 25,000 surveillance cameras. In many ways, though, San Diego County is at the forefront. Here, beat cops, detectives and even school police officers have been using hand-held devices to create a vast database of tens of thousands of photos of people usually without the persons consent.

Note: For more along these lines, read about the increasing militarization of police in the U.S. after 9/11, or see concise summaries of deeply revealing news articles about the erosion of privacy rights.


Why Smart Objects May Be a Dumb Idea
2015-08-10, New York Times
http://www.nytimes.com/2015/08/11/opinion/zeynep-tufekci-why-smart-objects-ma...

A safe that tallies the cash that is placed in it. A sniper rifle equipped with advanced computer technology for improved accuracy. A car that lets you stream music from the Internet. All of these innovations sound great, until you learn the risks that this type of connectivity carries. Recently, two security researchers, sitting on a couch and armed only with laptops, remotely took over a Chrysler Jeep Cherokee speeding along the highway ... while a Wired reporter was driving. A hacked car is a high-profile example of what can go wrong with the coming Internet of Things objects equipped with software and connected to digital networks. The selling point ... is added convenience and better safety. In reality, it is a ... train wreck in privacy and security. That smart safe? Hackers can empty it with a single USB stick while erasing all [evidence] of their crime. That high-tech rifle? Researchers managed to remotely manipulate its target selection without the shooters knowing. The Internet of Things is also a privacy nightmare. Databases that already have too much information about us will now be bursting with data on the places weve driven, the food weve purchased and more. Last week, at Def Con, the annual information security conference, researchers set up an Internet of Things Village to show how they could hack everyday objects like baby monitors, thermostats and security cameras. Connecting everyday objects introduces new risks if done at mass scale. Once a hacker is in - she's in everywhere.

Note: Read how a hacked vehicle may have resulted in journalist Michael Hastings' death in 2013. The networked computerization of everyday objects means that these objects can spy on you, accelerating the disappearance of privacy in the name of convenience. What will happen when the "internet of things" expands to include microchip implants in people?


Germany halts treason inquiry into journalists after protests
2015-07-21, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2015/jul/31/germany-halts-treason-inquiry-jo...

A treason investigation into two journalists who reported that the German state planned to increase online surveillance has been suspended by the countrys prosecutor general following protests by leading voices across politics and media. Harald Range, Germanys prosecutor general, said on Friday he was halting the investigation for the good of press and media freedom. It was the first time in more than half a century that journalists in Germany had faced charges of treason. His announcement followed a deluge of criticism and accusations that Germanys prosecutor had misplaced priorities, having failed to investigate with any conviction the NSA spying scandal revealed by whistleblower Edward Snowden, and targeting instead the two investigative journalists, Markus Beckedahl and Andre Meister. The two reporters made reference to what is believed to be a genuine intelligence report that had been classified as confidential, which proposed establishing a new intelligence department to monitor the internet, in particular social media networks. Beckedahl hit out at the prosecutors investigation against him on Friday on the state broadcaster Deutschlandfunk, calling it absurd and suggesting it was meant as a general warning to scare sources from speaking to journalists. Much of the German media called the decision an attack on the freedom of the press.

Note: The NSA recently got caught spying on German reporters, possibly as a favor to the German government. For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of public perception.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.