As of May 26th, we're $2,800 in the red for 2016. Please donate here to support this vital work.
Subscribe here to our free email list

Privacy Media Articles
Excerpts of Key Privacy Media Articles in Major Media


Below are highly revealing excerpts of important privacy articles reported in the media suggesting a major cover-up. Links are provided to the full articles on major media websites. If any link fails to function, read this webpage. These privacy articles are listed by article date. You can also explore the articles listed by order of importance or by date posted. By choosing to educate ourselves on these important issues and to spread the word, we can and will build a brighter future.

Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


U.S. threatened massive fine to force Yahoo to release data
2014-09-11, Washington Post
http://www.washingtonpost.com/business/technology/us-threatened-massive-fine-...

The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed [on September 11] that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program. The documents ... outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms. The ruling by the Foreign Intelligence Surveillance Court of Review became a key moment in the development of PRISM, helping government officials to convince other Silicon Valley companies that unprecedented data demands had been tested in the courts and found constitutionally sound. Eventually, most major U.S. tech companies, including Google, Facebook, Apple and AOL, complied. Microsoft had joined earlier, before the ruling, NSA documents have shown. PRISM was first revealed by former NSA contractor Edward Snowden last year. Documents made it clear that the program allowed the NSA to order U.S.-based tech companies to turn over e-mails and other communications to or from foreign targets without search warrants for each of those targets. Other NSA programs gave even more wide-ranging access to personal information of people worldwide, by collecting data directly from fiber-optic connections.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


The U.S. Government’s Secret Plans to Spy for American Corporations
2014-09-05, The Intercept
https://firstlook.org/theintercept/2014/09/05/us-governments-plans-use-econom...

Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. [But] the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations. But a secret 2009 report issued by [Director of National Intelligence James Clapper's] office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies. One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” How could U.S. intelligence agencies solve that problem? The report recommends “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means), and counterintelligence”.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


The US government can brand you a terrorist based on a Facebook post
2014-08-30, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2014/aug/30/terrorist-watch-list-rul...

The US government’s web of surveillance is vast and interconnected. You can be pulled into the National Security Agency’s database quietly and quickly. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors. The watchlist [is] based on [low] standards and secret evidence, which ensnares innocent people. Indeed, the standards are so low that the US government’s guidelines specifically allow for a single, uncorroborated source of information – including a Facebook or Twitter post – to serve as the basis for placing you on its master watchlist. Of the 680,000 individuals on that FBI master list, roughly 40% have “no recognized terrorist group affiliation”, according to the Intercept. These individuals don’t even have a connection – as the government loosely defines it – to a designated terrorist group, but they are still branded as suspected terrorists. The US [government uses] a loose standard – so-called “reasonable suspicion” – in determining who, exactly, can be watchlisted. ["Reasonable suspicion"] requires neither “concrete evidence” nor “irrefutable evidence”. Instead, an official is permitted to consider “reasonable inferences” and “to draw from the facts in light of his/her experience”.

Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.


Mysterious Phony Cell Towers Could Be Intercepting Your Calls
2014-08-27, Popular Science
http://www.popsci.com/article/technology/mysterious-phony-cell-towers-could-b...

Les Goldsmith, the CEO of ESD America [marketers of the Crytophone 500], points me to a map that he and his customers have created, indicating 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July alone. Interceptors look to a typical phone like an ordinary tower. Once the phone connects with the interceptor, a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to pushing spyware to the device. “Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says. “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip. We even found one at South Point Casino in Las Vegas.” Who is running these interceptors and what are they doing with the calls? Goldsmith says we can’t be sure, but he has his suspicions. “Are some of them U.S. government interceptors?” [asks] Goldsmith. Interceptors vary widely in expense and sophistication – but in a nutshell, they are radio-equipped computers with software that can use arcane cellular network protocols and defeat the onboard encryption. For governments or other entities able to afford a price tag of “less than $100,000,” says Goldsmith, high-quality interceptors are quite realistic. Some interceptors are limited, only able to passively listen to either outgoing or incoming calls. But full-featured devices like the VME Dominator, available only to government agencies, can not only capture calls and texts, but even actively control the phone, sending out spoof texts, for example.

Note: Do you think the government might have put up fake cell towers to nab more data? For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


The Surveillance Engine: How the NSA Built Its Own Secret Google
2014-08-25, The Intercept
https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-c...

The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept. The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. ICREACH [as the search engine is called] contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden. Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy. ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to a 2010 memo. Information shared through ICREACH can be used to track people’s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


New Facebook Messenger App Has Some Frightening Terms And Conditions
2014-08-18, Fox News (Memphis, Tennessee affiliate)
http://www.myfoxmemphis.com/story/26248710/new-facebook-messenger-app-has-som...

Could your smartphone be recording video of you without you knowing it? And if so, who is on the other end watching it? A new Facebook Messenger App could be violating your privacy. If you download and install the social network's new messenger app to an android device, you're giving Facebook permission to call or text people from your phone, delete your personal data even access your camera microphone. Facebook says it only needs that access to make your messaging experience better, and that these terms have been in place for months. So why are we telling you about it now? That's because some mobile Facebook users are about to find out you won't be able to access your messages through the Facebook app anymore. Instead if you want to read a message from a friend or coworker you'll have to download the messenger app and consent to any fine print. The messenger app has over 6000 reviews on the iTunes app store. Most of them are not too positive. The real question is will people still download it? And as for the people who did download it, it seems a lot are just choosing to disconnect.

Note: Many apps have terms and conditions that people never read before downloading the allow the app developer to access and even change phone logs, record conversations, and much more. Learn more in this eye-opening video. For more along these lines, see concise summaries of deeply revealing news articles about the erosion of privacy rights from reliable major media sources.


Embracing flag, Snowden says he hopes to return to U.S.
2014-08-13, USA Today
http://www.usatoday.com/story/news/world/2014/08/13/snowden-wired-flag/13995013/

Development of a U.S. counterattack for cyberterrorism that could do more harm than good was one of the final events that drove Edward Snowden to leak government secrets, the former National Security Agency contractor tells Wired magazine. Snowden ... said the MonsterMind program was designed to detect a foreign cyberattack and keep it from entering the country. But it also would automatically fire back. The problem, he said, is malware can be routed through an innocent third-party country. "These attacks can be spoofed," he told Wired. MonsterMind for example ... could accidentally start a war. And it's the ultimate threat to privacy because it requires the NSA to gain access to virtually all private communications coming in from overseas. "The argument is that the only way we can identify these malicious traffic flows and respond to them is if we're analyzing all traffic flows," he said. "And if we're analyzing all traffic flows, that means we have to be intercepting all traffic flows. That means violating the Fourth Amendment, seizing private communications without a warrant, without probable cause or even a suspicion of wrongdoing. For everyone, all the time. You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it," Snowden told Wired. "But if you do that, it creates a slippery slope that just increases over time. And by the time you've been in 15 years, 20 years, 25 years, you've seen it all and it doesn't shock you. And so you see it as normal."

Note: Read the cover story from Wired magazine with a deep inside report on Snowden.


For some firms, NSA eavesdropping means business
2014-08-12, San Francisco Chronicle (SF's leading newspaper)
http://www.sfgate.com/technology/article/For-some-firms-NSA-eavesdropping-mea...

To many Americans, online eavesdropping by the U.S. National Security Agency is an outrage, a threat to privacy and freedom. To some, it's a business opportunity. A small but growing number of companies have introduced Internet and communications services designed to shield users from the government's eyes. A few even advertise their products as "NSA-proof." Many of the companies have been offering encrypted online services for years, scrambling their customers' data and communications in ways that require the right computer-generated "key" to decode. They are at least as concerned with thwarting private hackers and corporate spies as they are with blocking federal agents. But some entrepreneurs in the field found motivation in the NSA, after learning that the agency has been collecting troves of Internet and phone data on ordinary citizens for years. "Privacy and democracy go hand in hand - that's why this is so important," said Jason Stockman, one of the creators of ProtonMail, which began offering an encrypted e-mail service in May. "Our goal is to protect people against mass surveillance." But most companies will quickly admit that if the NSA - or some foreign intelligence service - really wants your data, they can't guarantee protection. Since the NSA conducts its business in secret, its full capabilities remain a matter of speculation. Most companies that invoke the NSA in their marketing focus on encryption.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Before Snowden: The Whistleblowers Who Tried To Lift The Veil
2014-07-22, NPR
http://www.npr.org/2014/07/22/333741495/before-snowden-the-whistleblowers-who...

Bill Binney worked at the National Security Agency [for] nearly three decades as one of its leading crypto-mathematicians. He then became one of its leading whistleblowers. The NSA is overseen by Congress, the courts and other government departments. It's also supposed to be watched from the inside by its own workers. But over the past dozen years, whistleblowers like Binney have had a rough track record. Those who tried unsuccessfully to work within the system say Edward Snowden — the former National Security Agency contractor who shared top-secret documents with reporters — learned from their bitter experience. For Binney, the decision to quit the NSA and become a whistleblower began a few weeks after the terrorist attacks of Sept. 11, 2001, when he says he discovered the spy agency had begun using software he'd created to scoop up information on Americans — all without a court order. "I had to get out of there, because they were using the program I built to do domestic spying, and I didn't want any part of it, I didn't want to be associated with it," he says. "I look at it as basically treason. They were subverting the Constitution." Binney says he and two other NSA colleagues who also quit tried sounding the alarm with congressional committees. But because they did not have documents to prove their charges, nobody believed them. Snowden, he says, did not repeat that mistake. "He recognized right away, it was very clear to me, that if he wanted anybody to believe him, he'd have to take a lot of documentation with him — which is what he did," Binney says.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Racy Photos Were Often Shared at N.S.A., Snowden Says
2014-07-21, New York Times
http://www.nytimes.com/2014/07/21/us/politics/edward-snowden-at-nsa-sexually-...

The former National Security Agency contractor Edward J. Snowden said in a wide-ranging interview ... that the oversight of surveillance programs was so weak that members of the United States military working at the spy agency sometimes shared sexually explicit photos they intercepted. He also said the British government often pioneered the most invasive surveillance programs because its intelligence services operate with fewer restrictions intended to protect individual privacy than its counterparts in the United States and other allies. “In the course of their daily work they stumble across something that is completely unrelated to their work, for example an intimate nude photo of someone in a sexually compromising situation but they’re extremely attractive,” he said. “So what do they do? They turn around in their chair and they show a co-worker. And their co-worker says: ‘Oh, hey, that’s great. Send that to Bill down the way.’ ” Mr. Snowden said that type of sharing ... was “seen as the fringe benefits of surveillance positions.” He said that this was never reported and that the system for auditing surveillance programs was “incredibly weak.” Mr. Snowden had particularly stark criticism for the British government’s surveillance programs, because in Britain the respect for individual privacy, he said, “is not strongly encoded in law or policy.” Because it has fewer restrictions, British intelligence platforms “are used as a testing ground” for programs of all five intelligence partners, a group referred to as “Five Eyes,” which includes Britain, Canada, Australia, New Zealand and the United States.”

Note: For more on this, see concise summaries of deeply revealing privacy news articles from reliable major media sources.


Meet Executive Order 12333: The Reagan rule that lets the NSA spy on Americans
2014-07-18, Washington Post
https://www.washingtonpost.com/opinions/meet-executive-order-12333-the-reagan...

In March I received a call from the White House counsel’s office regarding a speech I had prepared for my boss at the State Department. The speech was about the impact ... of National Security Agency surveillance practices. The draft stated that “if U.S. citizens disagree with congressional and executive branch determinations about the proper scope of signals intelligence activities, they have the opportunity to change the policy through our democratic process.” But the White House counsel’s office told me that no, that wasn’t true. I was instructed to amend the line. Some intelligence practices remain so secret, even from members of Congress, that there is no opportunity for our democracy to change them. Public debate about the bulk collection of U.S. citizens’ data by the NSA has focused largely on Section 215 of the Patriot Act. Based in part on classified facts that I am prohibited by law from publishing, I believe that Americans should be even more concerned about the collection and storage of their communications under Executive Order 12333 than under Section 215. Unlike Section 215, the executive order authorizes collection of the content of communications, not just metadata, even for U.S. persons. It does not require that the affected U.S. persons be suspected of wrongdoing and places no limits on the volume of communications by U.S. persons that may be collected and retained. None of the reforms that Obama announced earlier this year will affect such collection.

Note: The above was written by John Napier Tye, former section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights and Labor. A 2014 Washington Post investigation sheds more light on the NSA's legally dubious domestic mass surveillance program. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


Edward Snowden urges professionals to encrypt client communications
2014-07-17, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/jul/17/edward-snowden-professionals-enc...

The NSA whistleblower, Edward Snowden, has urged lawyers, journalists, doctors, accountants, priests and others with a duty to protect confidentiality to upgrade security in the wake of the spy surveillance revelations. Snowden said professionals were failing in their obligations to their clients, sources, patients and parishioners in what he described as a new and challenging world. "What last year's revelations showed us was irrefutable evidence that unencrypted communications on the internet are no longer safe. Any communications should be encrypted by default," he said. Snowden's plea for the professions to tighten security came during an extensive and revealing interview with the Guardian in Moscow. During the seven hours of interview, Snowden: • Said if he ended up in US detention in Guantánamo Bay he could live with it. • Does not have any regrets. • Said that ... he was independently secure, living on savings, and money from awards and speeches he has delivered online round the world. • Made a startling claim that a culture exists within the NSA in which, during surveillance, nude photographs picked up of people in "sexually compromising" situations are routinely passed around. He works online late into the night; a solitary, digital existence not that dissimilar to his earlier life. He said he was using part of that time to work on the new focus for his technical skills, designing encryption tools to help professionals such as journalists protect sources and data. He is negotiating foundation funding for the project, a contribution to addressing the problem of professions wanting to protect client or patient data, and in this case journalistic sources.

Note: Read the transcript of the Guardian's new interview of Edward Snowden. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Hacking Online Polls and Other Ways British Spies Seek to Control the Internet
2014-07-14, The Intercept
https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-...

The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call. The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users. A newly released top-secret GCHQ document called “JTRIG Tools and Techniques” provides a comprehensive, birds-eye view of just how underhanded and invasive this unit’s operations are. The document—available in full here—is designed to notify other GCHQ units of JTRIG’s “weaponised capability” when it comes to the dark internet arts, and serves as a sort of hacker’s buffet for wreaking online havoc.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Scott Volkers: Swimming coach accused of child abuse 'too good to sack'
2014-07-10, Sydney Morning Herald (One of Australia's leading newspapers)
http://www.smh.com.au/nsw/scott-volkers-swimming-coach-accused-of-child-abuse...

When Australia's Susie O'Neill claimed the gold medal at the 1996 Atlanta Olympics, she dedicated her victory to Scott Volkers, the swimming coach who had taken over her training two years earlier. By this time, three women who had been Volkers' students were losing belief in themselves and the swimming community. Julie Gilbert, Kylie Rogers and Simone Boyce took the stand at the royal commission into child abuse in Sydney this week to describe their mental breakdowns, eating disorders, anxiety and isolation from a swimming hierarchy that refused to believe them or failed to explore the possibility that Volkers molested them – as girls aged 12 to 18 – in the 1980s. Volkers remained on the payroll of elite Australian swimming institutions until 2010, when he was finally forced to move to Brazil, where he still works as a leading coach. Was it Australia's win-at-all-costs swimming culture that kept him in the presence of young athletes? An exasperated Andrew Boe, the lawyer representing Gilbert, Rogers and Boyce, pointed out: "This is not an examination of whether he was a good swimming coach or not." Nor is it an examination of the guilt or innocence of Volkers – against whom charges concerning these three alleged victims were dropped in 2002 – or other swimming coaches. It is an inquiry into the institutional responses to abuse. Swimming Australia's association with Volkers [ended] in 2005, when the coach's fourth accuser came forward with claims that Volkers had groped her breasts and attempted to stimulate her vagina in the late 1990s, when she was 15. The allegations were very similar to the earlier cases.

Note: For more on this, see concise summaries of deeply revealing sexual abuse scandals news articles from reliable major media sources.


In NSA-intercepted data, those not targeted far outnumber the foreigners who are
2014-07-05, Washington Post
http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data...

Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. [90% of] account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. [Many] files, described as useless by the analysts but nonetheless retained, have a startlingly intimate, even voyeuristic quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless. The cache Snowden provided came from domestic NSA operations under the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance Act. FISA content is generally stored in closely controlled data repositories, and for more than a year. The files offer an unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which enabled the NSA to make freer use of methods that for 30 years had required probable cause and a warrant from a judge.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Court gave NSA broad leeway in surveillance, documents show
2014-06-30, Washington Post
http://www.washingtonpost.com/world/national-security/court-gave-nsa-broad-le...

A classified 2010 legal certification and other documents indicate the NSA has been given a far more elastic authority than previously known, one that allows it to intercept through U.S. companies not just the communications of its overseas targets but any communications about its targets as well. The certification — approved by the Foreign Intelligence Surveillance Court and included among a set of documents leaked by former NSA contractor Edward Snowden — lists 193 countries that would be of valid interest for U.S. intelligence. The certification also permitted the agency to gather intelligence about entities including the World Bank, the International Monetary Fund, the European Union and the International Atomic Energy Agency. The documents underscore the remarkable breadth of potential “foreign intelligence” collection. An affidavit in support of the 2010 foreign-government certification said the NSA believes that foreigners who will be targeted for collection “possess, are expected to receive and/or are likely to communicate foreign intelligence information concerning these foreign powers.” That language could allow for surveillance of academics, journalists and human rights researchers. A Swiss academic who has information on the German government’s position in the run-up to an international trade negotiation, for instance, could be targeted if the government has determined there is a foreign-intelligence need for that information. If a U.S. college professor e-mails the Swiss professor’s e-mail address or phone number to a colleague, the American’s e-mail could be collected as well, under the program’s court-approved rules.

Note: For more on this, see concise summaries of deeply revealing intelligence agency news articles from reliable major media sources.


Supreme Court says police must get warrants for most cellphone searches
2014-06-25, Washington Post
http://www.washingtonpost.com/national/supreme-court-police-must-get-warrants...

The Supreme Court unequivocally ruled [on June 25] that privacy rights are not sacrificed to 21st-century technology, saying unanimously that police generally must obtain a warrant before searching the cellphone of someone they arrest. While the specific protection may not affect the average American, the court made a bold statement that the same concern about government prying that animated the nation’s birth applies to the abundance of digital information about an individual in the modern world. Modern cellphones “hold for many Americans the privacies of life,” Chief Justice John G. Roberts Jr. wrote for a court united behind the opinion’s expansive language. “The fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the Founders fought.” Roberts said that in most cases when police seize a cellphone from a suspect, the answer is simple: “Get a warrant.” The ruling has no impact on National Security Agency data-collection programs revealed in the past year or law enforcement use of aggregated digital information. But lawyers involved in those issues said the emphatic declarations signaled the justices’ interest in the dangers of government overreach. Stephen Vladeck, a law professor at American University, said the decision is more than simply a warning to government officials employing high-tech forms of government surveillance. “This is a cruise missile across the bow of lawyers defending warrantless search programs,” Vladeck said.

Note: For more on this, see concise summaries of deeply revealing privacy news articles from reliable major media sources.


US Pushing Local Cops to Stay Mum on Surveillance
2014-06-12, ABC News/Associated Press
http://abcnews.go.com/Politics/wireStory/us-pushing-local-cops-stay-mum-surve...

The Obama administration has been quietly advising local police not to disclose details about surveillance technology they are using to sweep up basic cellphone data from entire neighborhoods. Citing security reasons, the U.S. has intervened in routine state public records cases and criminal trials regarding use of the technology. This has resulted in police departments withholding materials or heavily censoring documents in rare instances when they disclose any [information] about the purchase and use of such powerful surveillance equipment. One well-known type of this surveillance equipment is known as a Stingray. The equipment tricks cellphones into identifying some of their owners' account information, like a unique subscriber number, and transmitting data to police as if it were a phone company's tower. That allows police to obtain cellphone information without having to ask for help from service providers ... and can locate a phone without the user even making a call or sending a text message. The Obama administration is asking agencies to withhold common information about the equipment, such as how the technology is used and how to turn it on. "These extreme secrecy efforts are in relation to very controversial, local government surveillance practices using highly invasive technology," said Nathan Freed Wessler, a staff attorney with the American Civil Liberties Union, which has fought for the release of these types of records. "People should have the facts about what the government is doing to them."

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Internet Giants Erect Barriers to Spy Agencies
2014-06-07, New York Times
http://www.nytimes.com/2014/06/07/technology/internet-giants-erect-barriers-t...

[Google engineers] are making it far more difficult — and far more expensive — for the National Security Agency and the intelligence arms of other governments around the world to pierce their systems. As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps. After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant. But governments are fighting back, harder than ever. The cellphone giant Vodafone reported ... that a “small number” of governments around the world have demanded the ability to tap directly into its communication networks [and] noted that some countries did not issue warrants to obtain phone, email or web-searching traffic, because “the relevant agencies and authorities already have permanent access to customer communications via their own direct link.”

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Vodafone: governments use secret cables to tap phones
2014-06-06, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/technology/internet-security/10880208/Vodafone-gov...

Government agencies are able to listen to phone conversations live and even track the location of citizens without warrants using secret cables connected directly to network equipment, admits Vodafone today. The company said that secret wires have been connected to its network and those belonging to competitors, giving government agencies the ability to tap in to phone and broadband traffic. In many countries this is mandatory for all telecoms companies, it said. Vodafone is today publishing its first Law Enforcement Disclosure Report which will describe exactly how the governments it deals with are eavesdropping on citizens. It is calling for an end to the use of “direct access” eavesdropping and transparency on the number of warrants issued giving access to private data. Gus Hosein, executive director of Privacy International, said: "Vodafone is taking a commendable step by taking this issue on at an international scale. And they are trying to identify the legal basis for governments' claimed powers. Governments around the world are unashamedly abusing privacy by demanding access to communications and data, and alarmingly, sometimes granting themselves direct access to the networks. Now that Vodafone has been more open, the entire industry has cover to take the necessary next step of pushing back. Pushing back against bad requests is a start, pushing back against bad laws is the next step. The usefulness of transparency reports hinges on governments abiding by the rule of law. We now know that these reports only provide a limited picture of what is going on.”

Note: For more on government surveillance of the world's population, see the deeply revealing reports from reliable major media sources available here.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.