As a 501(c)(3) nonprofit, we depend almost entirely on donations from people like you.
We really need your help to continue this work! Please consider making a donation.
Subscribe here and join over 13,000 subscribers to our free weekly newsletter

Privacy News Articles

Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

Explore our comprehensive news index on a wide variety of fascinating topics.
Explore the top 20 most revealing news media articles we've summarized.
Check out 10 useful approaches for making sense of the media landscape.

Sort articles by: Article Date | Date Posted on WantToKnow.info | Importance


The Captain of Operation Warp Speed
2020-10-19, Wall Street Journal
https://www.wsj.com/articles/the-captain-of-operation-warp-speed-11602278486

Previous vaccines have taken a decade or more to develop, and more than half of the past 20 years have failed in clinical trials. However, four [COVID-19] vaccine candidates have entered the final phase of clinical trials prior to approval by the Food and Drug Administration. Operation Warp Speed ... organized government agencies and private companies with the goal of developing, manufacturing and distributing hundreds of millions of vaccine doses, with starting doses to be available by early 2021. At the head of the operation is Moncef Slaoui, a Moroccan-born Belgian-American scientist. Operation Warp Speed … has invested in six vaccine candidates (Moderna, Pfizer / BioNTech, Johnson & Johnson, AstraZeneca, Novavax, and Sanofi / GSK) with the hope that at least one ... will prove safe and effective in clinical trials. Four of the six vaccine candidates have already been shown to be safe and effective in the first two test phases, which test whether the vaccinations produce so-called neutralizing antibodies. Serious health problems regularly arise during vaccination attempts. "We know how to distribute vaccines to any location in the US," says Slaoui. "It happens every year for flu and shingles." Tracking systems need to be "incredibly precise" to ensure that patients are each given two doses of the same vaccine and to monitor them for adverse health effects. Operation Warp Speed … has selected medical distributor McKesson and cloud operators Google and Oracle to collect and track vaccine data.

Note: The above article is also available here. Don't miss this excellent article which raises many important questions about this operation. For more along these lines, see concise summaries of deeply revealing news articles on the coronavirus and vaccines from reliable major media sources.


U.S. Court: Mass Surveillance Program Exposed by Snowden Was Illegal
2020-09-02, US News & World Report/Reuters
https://www.usnews.com/news/top-news/articles/2020-09-02/us-court-mass-survei...

Seven years after former National Security Agency contractor Edward Snowden blew the whistle on the mass surveillance of Americans' telephone records, an appeals court has found the program was unlawful. The U.S. Court of Appeals for the Ninth Circuit said the warrantless telephone dragnet that secretly collected millions of Americans' telephone records violated the Foreign Intelligence Surveillance Act and may well have been unconstitutional. Snowden, who fled to Russia in the aftermath of the 2013 disclosures and still faces U.S. espionage charges, said on Twitter that the ruling was a vindication of his decision to go public with evidence of the National Security Agency's domestic eavesdropping operation. "I never imagined that I would live to see our courts condemn the NSA's activities as unlawful and in the same ruling credit me for exposing them," Snowden said. Evidence that the NSA was secretly building a vast database of U.S. telephone records ... was the first and arguably the most explosive of the Snowden revelations published by the Guardian newspaper in 2013. Up until that moment, top intelligence officials publicly insisted the NSA never knowingly collected information on Americans at all. After the program's exposure, U.S. officials fell back on the argument that the spying had played a crucial role in fighting domestic extremism. But the Ninth Circuit ruled Wednesday that those claims were "inconsistent with the contents of the classified record."

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


Inside TikTok owners dystopian Chinese censorship machine
2020-07-12, The Telegraph (One of the UK's leading newspapers)
https://www.telegraph.co.uk/technology/2020/07/12/inside-tiktoks-dystopian-ch...

It's a fairly ordinary evening on TikTok, the video-sharing app. Things do not seem so different on Douyin, the Chinese version of TikTok, where a live streaming boom has minted new social media millionaires. Behind the scenes, however, Chinese streamers are subject to an elaborate regime of automated surveillance and censorship. One system can use facial recognition to scan live streamers' broadcasts and guess their age. Another checks whether users' faces match their state ID cards. Another system assigns streamers, who are expected to uphold "public order and good customs", a "safety rating", similar to a "credit score". If the score dips below a certain level, they are punished automatically. Meanwhile, speech and text recognition is used to ferret out sins such as "feudal superstition" [and] defamation of the Communist Party. These methods are laid bare in a little-known document from TikTok and Douyin's parent company, ByteDance, and unearthed by New York City journalist Izzy Niu, which explains how the apps have adapted China's strict internet censorship laws to the unprecedented speed and chaos of live streaming. The document raises difficult questions for TikTok, which faces privacy probes in the US and UK and has already been banned in India. Some of these methods are common in the West, too. Both Facebook and YouTube use AI to police their services, and have massively expanded their censorship during the pandemic.

Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy from reliable major media sources.


The U.S. wants smartphone location data to fight coronavirus. Privacy advocates are worried.
2020-03-18, NBC News
https://www.nbcnews.com/tech/tech-news/u-s-wants-smartphone-location-data-fig...

The White House and the Centers for Disease Control and Prevention are asking Facebook, Google and other tech giants to give them greater access to Americans' smartphone location data in order to help them combat the spread of the coronavirus, according to four people at companies involved in the discussions who are not authorized to speak about them publicly. Federal health officials say they could use anonymous, aggregated user data collected by the tech companies to map the spread of the virus a practice known as "syndromic surveillance" and prevent further infections. They could also use the data to see whether people were practicing "social distancing." The federal effort [was] first reported by The Washington Post. The government officials have held at least two calls in recent days with representatives from the companies, the sources said. Those officials are "very serious" about making this happen, a person at one of the tech companies said. Similar and more aggressive surveillance practices have already been put to use in China, South Korea and Israel. The moves have set off alarm bells among privacy advocates who fear what the government may do with users' data. Facebook already provides health researchers and nongovernmental organizations in some countries with anonymized data to help disease prevention efforts. Representatives from Facebook, Google, Twitter, Apple, Amazon, Microsoft, IBM and Cisco all took part in the call with White House and federal health officials.

Note: For more along these lines, see concise summaries of deeply revealing news articles on the coronavirus pandemic and the disappearance of privacy from reliable major media sources.


The Trump Administration Is Using the Full Power of the U.S. Surveillance State Against Whistleblowers
2019-08-04, The Intercept
https://theintercept.com/2019/08/04/whistleblowers-surveillance-fbi-trump/

While we all live under extensive surveillance, for government employees and contractors - especially those with a security clearance - privacy is virtually nonexistent. Everything they do on their work computers is monitored. Even when they try to outsmart their work computer by taking photos directly of their screen, video cameras in their workplace might be recording their every move. Government workers with security clearance promise never [to] divulge classified information to anyone who is not authorized to receive it. But for many whistleblowers, the decision to go public results from troubling insights into government activity, coupled with the belief that as long as that activity remains secret, the system will not change. The growing use of the Espionage Act, a 1917 law that criminalizes the release of national defense information by anyone with intent or reason to believe that it is to be used to the injury of the United States or to the advantage of a foreign nation, shows how the system is rigged against whistleblowers. Government insiders charged under the law are not allowed to defend themselves by arguing that their decision to share what they know was prompted by an impulse to help Americans confront and end government abuses. The act is blind to the possibility that the publics interest ... might outweigh the governments interest, Jameel Jaffer, head of the Knight First Amendment Institute, wrote recently. It is blind to the difference between whistle-blowers and spies.

Note: The above article includes the stories of four whistleblowers charged under the Espionage act. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


How to Stop Apps From Tracking Your Location
2018-12-10, New York Times
https://www.nytimes.com/2018/12/10/technology/prevent-location-data-sharing.html

Hundreds of apps can follow your movements and share the details with advertisers, retailers and even hedge funds. Its difficult to know for sure whether location data companies are tracking your phone. Any app that collects location data may share your information with other companies, as long as it mentions that somewhere in its privacy policy. You can head off much of the tracking on your own device by spending a few minutes changing settings. Heres how to limit the snooping. How do I stop location tracking on iOS? Some apps have internal settings where you can indicate that you dont want your location used for targeted advertising or other purposes. But the easiest method is to go through your devices main privacy menu. First, open Settings and select Privacy, which has a blue icon with a white hand. Then select Location Services, which is at the top and has a little arrow. Youll see a list of apps, along with the location setting for each. Tap on apps you want to adjust. Selecting Never blocks tracking by that app. The option While Using the App ensures that the app gets location only while in use. Choosing Always, allows the app to get location data even when not in use. How do I stop it on Android? First, open the Settings on your phone. On the main settings page, tap Security & location. On the next screen, tap Location, which can be found in the Privacy section. On the Location screen, tap App-level permissions. Youll see a list of apps. To turn off location for an app, slide the toggle to the left.

Note: For more details, read the entire article at the link above. For more along these lines, see concise summaries of deeply revealing privacy news articles from reliable major media sources.


Undercover cops break Facebook rules to track protesters, ensnare criminals
2018-10-05, NBC News
https://www.nbcnews.com/news/us-news/undercover-cops-break-facebook-rules-tra...

In the summer of 2015, as Memphis exploded with protests over the police killing of a 19-year-old man, activists began hearing on Facebook from someone called Bob Smith. His profile picture [was] a Guy Fawkes mask, the symbol of anti-government dissent. Smith acted as if he supported the protesters. Over the next three years, dozens of them accepted his friend requests, allowing him to observe private discussions. He described himself as a far-left Democrat, a fellow protester and a man of color. But Smith was not real. He was the creation of a white detective in the Memphis Police Departments Office of Homeland Security whose job was to keep tabs on local activists. The detective, Tim Reynolds, outed himself in August under questioning by the American Civil Liberties Union of Tennessee, which sued the police department for allegedly violating a 1978 agreement that prohibited police from conducting surveillance of lawful protests. The revelation validated many activists distrust of local authorities. It also provided a rare look into the ways American law enforcement operates online. Social media monitoring - including the use of software to crunch data about peoples online activity - illustrates a policing revolution that has allowed authorities to not only track people but also map out their networks, said Rachel Levinson-Waldman, senior counsel at [the] Brennan Center for Justice. But there are few laws governing this kind of monitoring.

Note: Memphis police were recently reported to have systematically spied on community activists. For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the erosion of civil liberties.


Memphis police accused of using fake accounts to surveil black activists
2018-08-01, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/us-news/2018/aug/01/memphis-police-black-lives-ma...

A trove of documents released by the city of Memphis late last week appear to show that its police department has been systematically using fake social media profiles to surveil local Black Lives Matter activists, and that it kept dossiers and detailed power point presentations on dozens of Memphis-area activists. The surveillance project was operated through the Memphis police departments office of homeland security. In a deposition for a lawsuit filed by the American Civil Liberties Union over the information gathering, officials said it ... began to focus on local individuals or groups that were staging protests [around 2016]. This included the publication of daily joint information briefings on potential protests and known protesters. The briefings regularly included information about meetings on private property, panel discussions, town halls, and even innocuous events like Black Owned Food Truck Sunday. A good deal of that information appears to have been obtained by a fake MPD Facebook profile for a Bob Smith, which the ACLU said was used to view private posts, join private groups, and otherwise pose as a member of the activist community. The briefings, which contained ... photographs, dates of birth, addresses, and mental health histories were distributed beyond the department according to the ACLU lawsuit, to a number of local businesses including the regions largest employer FedEx and the county school district.

Note: For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the erosion of civil liberties.


The cashless society is a con and big finance is behind it
2018-07-19, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/commentisfree/2018/jul/19/cashless-society-con-bi...

All over the western world banks are shutting down cash machines and branches. They are trying to push you into using their digital payments and digital banking infrastructure. Financial institutions ... are trying to nudge us towards a cashless society and digital banking. The true motive is corporate profit. Payments companies such as Visa and Mastercard want to increase the volume of digital payments services they sell, while banks want to cut costs. The nudge requires two parts. First, they must increase the inconvenience of cash. Second, they must vigorously promote the alternative. But a cashless society is not in your interest. It is in the interest of banks and payments companies. Their job is to make you believe that it is in your interest too, and they are succeeding in doing that. The recent Visa chaos, during which millions of people who have become dependent on digital payment suddenly found themselves stranded when the monopolistic payment network crashed, was a temporary setback. Digital systems may be convenient, but they often come with central points of failure. Cash, on the other hand, does not crash. It does not rely on external data centres, and is not subject to remote control or remote monitoring. The cash system allows for an unmonitored off the grid space. This is also the reason why financial institutions and financial technology companies want to get rid of it. Cash transactions are outside the net that such institutions cast to harvest fees and data.

Note: For more on this questionable trend, see this article and this one in the UK's Guardian. For more along these lines, see concise summaries of deeply revealing news articles on financial industry corruption and the disappearance of privacy.


Inside Chinas Dystopian Dreams: A.I., Shame and Lots of Cameras
2018-07-08, New York Times
https://www.nytimes.com/2018/07/08/business/china-surveillance-technology.html

China is reversing the commonly held vision of technology as a great democratizer, bringing people more freedom and connecting them to the world. In China, it has brought control. Cameras scan train stations for Chinas most wanted. Billboard-size displays ... list the names of people who dont pay their debts. Facial recognition scanners guard the entrances to housing complexes. Already, China has an estimated 200 million surveillance cameras. Such efforts supplement other systems that track internet use and communications, hotel stays, train and plane trips and even car travel. Invasive mass-surveillance software has been set up in the west to track members of the Uighur Muslim minority and map their relations with friends and family. [At] the intersection south of Changhong Bridge in the city of Xiangyang ... police put up cameras linked to facial recognition technology and a big, outdoor screen. Photos of lawbreakers were displayed alongside their names and government I.D. numbers. Chinas surveillance companies are also looking to test the appetite for high-tech surveillance abroad. At home, China is preparing its people for next-level surveillance technology. A recent state-media propaganda film called Amazing China showed off a ... virtual map that provided police with records of utility use. If there are anomalies, the system sends an alert, a narrator says, as Chinese police officers pay a visit to an apartment with a record of erratic utility use.

Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy.


The NSAs Hidden Spy Hubs in Eight U.S. Cities
2018-06-25, The Intercept
https://theintercept.com/2018/06/25/att-internet-nsa-spy-hubs/

Thousands of people pass by the buildings each day and rarely give them a second glance, because their function is not publicly known. They are an integral part of one of the worlds largest telecommunications networks and they are also linked to a controversial National Security Agency surveillance program. Atlanta, Chicago, Dallas, Los Angeles, New York City, San Francisco, Seattle, and Washington, D.C.. In each of these cities, The Intercept has identified an AT&T facility containing networking equipment that transports large quantities of internet traffic across the United States and the world. A body of evidence including classified NSA documents, public records, and interviews with several former AT&T employees indicates that the buildings are central to an NSA spying initiative that has for years monitored billions of emails, phone calls, and online chats passing across U.S. territory. The NSA considers AT&T to be one of its most trusted partners and has lauded the companys extreme willingness to help. Little known, however, is that its scope is not restricted to AT&Ts customers. According to the NSAs documents, it values AT&T not only because it has access to information that transits the nation, but also because it maintains unique relationships with other phone and internet providers. The NSA exploits these relationships for surveillance purposes, commandeering AT&Ts massive infrastructure and using it as a platform to covertly tap into communications processed by other companies.

Note: The NSA was authorized in 2016 to share communications data it collected without warrants on Americans with 16 intelligence and law enforcement agencies. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


Facebook Gave Device Makers Deep Access to Data on Users and Friends
2018-06-03, New York Times
https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-par...

As Facebook sought to become the worlds dominant social media service, it struck agreements allowing phone and other device makers access to vast amounts of its users personal information. Facebook has reached data-sharing partnerships with at least 60 device makers - including Apple, Amazon, BlackBerry, Microsoft and Samsung. The partnerships ... raise concerns about the companys privacy protections and compliance with a 2011 consent decree with the Federal Trade Commission. Facebook allowed the device companies access to the data of users friends without their explicit consent, even after declaring that it would no longer share such information with outsiders. Some device makers could retrieve personal information even from users friends who believed they had barred any sharing. In interviews, several former Facebook software engineers and security experts said they were surprised at the ability to override sharing restrictions. Its like having door locks installed, only to find out that the locksmith also gave keys to all of his friends so they can come in and rifle through your stuff without having to ask you for permission, said Ashkan Soltani, a research and privacy consultant who formerly served as the F.T.C.s chief technologist.

Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy.


I Downloaded the Information That Facebook Has on Me. Yikes.
2018-04-11, New York Times
https://www.nytimes.com/2018/04/11/technology/personaltech/i-downloaded-the-i...

I downloaded a copy of my Facebook data last week. I didnt expect to see much. But when I opened my file, it was like opening Pandoras box. I learned that about 500 advertisers - many that I had never heard of, like Bad Dad, a motorcycle parts store, and Space Jesus, an electronica band - had my contact information, which could include my email address, phone number and full name. Facebook also had my entire phone book, including the number to ring my apartment buzzer. The social network had even kept a permanent record of the roughly 100 people I had deleted from my friends list over the last 14 years. Facebook said unfamiliar advertisers might appear [in the file] because they might have obtained my contact information from elsewhere, compiled it into a list of people they wanted to target and uploaded that list into Facebook. Brands can obtain your information [by] buying ... from a data provider like Acxiom, which has amassed one of the worlds largest commercial databases on consumers. Lets be clear: Facebook is just the tip of the iceberg when it comes to what information tech companies have collected on me. Knowing this, I also downloaded copies of my Google data with a tool called Google Takeout. The data sets were exponentially larger than my Facebook data. Here was the biggest surprise: In a folder labeled Ads, Google kept a history of many news articles I had read. Be warned: Once you see the vast amount of data that has been collected about you, you wont be able to unsee it.

Note: Those who want to download their own Facebook data can use this link. For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy.


Department Of Homeland Security Compiling Database Of Journalists And 'Media Influencers'
2018-04-06, Forbes
https://www.forbes.com/sites/michellefabio/2018/04/06/department-of-homeland-...

Bloomberg Government reports on a FedBizOpps.gov posting by the Department of Homeland Security (DHS) with the relatively benign-sounding subject Media Monitoring Services. The details of the attached Statement of Work, however, outline a plan to gather and monitor the public activities of media professionals and influencers and are enough to cause nightmares of constitutional proportions, particularly as the freedom of the press is under attack worldwide. As part of its "media monitoring," the DHS seeks to track more than 290,000 global news sources as well as social media. The successful contracting company will have "24/7 access to a password protected, media influencer database" ... in order to "identify any and all media coverage related to the Department of Homeland Security or a particular event." The database will be browsable by "location, beat and type of influencer," and for each influencer, the chosen contractor should "present contact details and ... an overview of the previous coverage published by the media influencer." Increasing government encroachment on the freedom of the press is the sinister backdrop to all of this. Freedom House ... recently concluded that global media freedom has reached its lowest level in the past 13 years. The independent watchdog organization blames "new threats to journalists and media outlets in major democracies" as well as "further crackdowns on independent media in authoritarian countries like Russia and China."

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the manipulation of public perception.


Monsanto demands Avaaz hands over all of its campaign data
2018-02-23, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/environment/2018/feb/23/monsanto-demands-avaaz-ha...

A US court will today hear a request from Monsanto for access to a huge batch of internal communications by Avaaz, in a move that the campaign group says could have grave repercussions for online activism and data privacy. Monsanto is seeking the release of all lobby documents ... where the firm or its herbicide ingredient glyphosate have been mentioned. Avaaz says this would include personal information about its employees, as well as the email addresses of more than four million signatories to petitions against Monsantos GM and glyphosate policies. A victory for Monsanto in todays hearing would cost the online advocacy group thousands of person-hours of work time, and hundreds of thousands of dollars, according to Avaazs lawyers. It could even raise the prospect of a migration out of online activism by campaigners concerned about corporate surveillance. Monsantos [request] demands all documents Avaaz employees have created, maintained, received, sent or copied, where these involve discussion about glyphosate, Monsanto, or the World Health Organizations International Agency for Research on Cancer, which found glyphosate to probably be carcinogenic. Monsanto filed its request shortly after a bitter EU regulatory battle ended with its license for glyphosate the core ingredient in Roundup being extended by just five years, rather than the 15 years originally sought.

Note: Read more on Avaaz and the power of online activism. Major lawsuits are beginning to unfold over Monsanto's lies to regulators and the public on the dangers of its products, most notably Roundup. For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and health.


Spending bill limited Congress' oversight of secret intelligence activities
2018-01-23, USA Today
https://www.usatoday.com/story/news/politics/2018/01/23/senate-intel-leaders-...

The White House can now direct US intelligence agencies to spend money and take covert action without approval of congressional oversight committees under a provision slipped into the bill that ended the government shutdown, leaders of the Senate intelligence committee say. A provision in the bill - requested by the White House and Pentagon - gives intelligence agencies an exemption from the law that requires them to get authorization from the intelligence committees before they spend taxpayer money, said Sen. Richard Burr, R-N.C., and chairman of the Senate panel. Section 504 of the National Security Act gives the committees the power to withhold money from the intelligence agencies if they object to surveillance programs or other intelligence activities. Burr and [Sen. Mark] Warner said the provision to weaken their oversight power comes just after they promised civil liberties advocates in the Senate that they would ensure that the FBI and other intelligence agencies don't overstep their bounds in carrying out a controversial surveillance program recently renewed by Congress. That surveillance program, Section 702 of the Foreign Intelligence Surveillance Act ... sweeps up emails, text messages, photos and other communication from an unknown number of Americans, and allows federal agents to search that data without a warrant. Burr and Warner both supported a six-year renewal of the program earlier this month.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


Hackers are flooding the internet with more fake domain names. Heres how you can protect yourself
2018-01-18, PBS
https://www.pbs.org/newshour/nation/hackers-are-flooding-the-internet-with-mo...

The use of fake internet domain names to trick consumers into giving up personal information is more widespread than experts originally thought. This is largely because of the heightened use of Internationalized Domain Names (IDNs), which use homographs carefully crafted to look exactly like their English counterparts. Hackers create domain names that replace an English-language character with a look-alike character from another language - replacing the Latin letter a with the Cyrillic letter a, for instance - as a way of luring users to fake websites where theyre prompted to enter their personal information. [A new] report from ... Farsight Security identified 125 different websites, from social networking giants like Facebook and Twitter to luxury brands like Gucci and financial websites like Wells Fargo, being imitated by fake domain addresses. Between Oct. 17 and Jan. 10, the group observed more than 116,000 imitator domains of these sites in real time. Take a popular financial site like BankofAmerica.com. Cybercriminals take this domain and ... create a website that looks strikingly similar to the original Bank of America page. A user types in their login information and password on this fake Bank of America site, automatically giving cybercriminals their credentials to log in to the real thing. Most phishing attempts reach internet users through email, so you should be suspicious of any emails that include ... login links to different accounts combined with demands to update information.

Note: Read the complete Farsight Security report for more information on these common cyberattacks and how to protect yourself from them.


The White House's Leak Hunt Is Battling the Wrong Enemy With the Wrong Weapons
2017-11-05, NBC News
https://www.nbcnews.com/think/opinion/why-white-house-searching-leakers-inste...

The Trump administration has declared all-out war on leakers. But the administration is battling the wrong enemy with the wrong weapons. Digital secrets stolen from the National Security Agency represent the real ... security problem. More than half a billion pages have been swiped. The stolen data includes some of the NSAs most prized cyber weapons. Most were created by the agencys own hacker team, the Tailored Access Operations (TAO) unit. Government hackers search for ways to crack into widely used computer operating systems, such as Microsoft Windows. When they discover a way in ... rather than notify the companies that their products are dangerously flawed, the NSA often secretly stores these vulnerabilities and later converts them into powerful cyber weapons, known as exploits. Like burglars tools, the exploits can secretly open a crack in a system, such as Windows, and insert an implant containing NSA malware - enabling the agency to take control of any computer using that Windows program. Unknown to the public, the NSA has for years been negligent in protecting its top-secret material, including these cyber weapons. Meanwhile, the Trump administration continues searching for someone who passed a few tidbits about White House bickering to a reporter, rather than focus on the NSA losing potentially deadly cyber weapons.

Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


Critics fault FBI over domestic terrorist threats
2017-10-20, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/nation/article/Critics-fault-FBI-over-domestic-terroris...

The FBI counterterrorism divisions identification of a movement it calls black identity extremists is the latest addition to the list of protesters and dissidents the agency puts under the domestic terrorism umbrella. But many national security experts say the designation [is] simply a label that allows the FBI to conduct additional surveillance on basically anyone whos black and politically active, said Michael German, who left the FBI in 2004. While the practice of labeling certain protest groups as domestic terrorists is not unique to President Trumps administration, Hina Shamsi ... at the American Civil Liberties Union, said theres concern that abusive and unjustified investigations by the FBI are rising. The problem, Shamsi said, is partly in the overly broad definition of domestic terrorism in the Patriot Act as a violation of the criminal laws ... intended to influence the policy of a government by intimidation or coercion. Eighty-four members of Congress cited that intention to intimidate or coerce in a letter to the Justice Department last week that asked whether the department had labeled Dakota Access Pipeline protesters domestic terrorists. The Justice Department did not respond to questions about the letter. The FBI report that focused on black identity extremists ... had interest groups questioning whether the designation has been used to single out members of Black Lives Matter.

Note: The Department of Homeland Security has reportedly been monitoring the Black Lives Matter movement since 2014, in some cases producing "minute-by-minute reports on protesters movements". For more along these lines, read about Cointelpro, the program used by corrupt intelligence agencies to spy on and attack the U.S. civil rights movement beginning in the 1960's. See also concise summaries of deeply revealing news articles about the erosion of civil liberties.


US government demands details on all visitors to anti-Trump protest website
2017-08-15, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/world/2017/aug/14/donald-trump-inauguration-prote...

The US government is seeking to unmask every person who visited an anti-Trump website in what privacy advocates say is an unconstitutional fishing expedition for political dissidents. The warrant appears to be an escalation of the Department of Justices (DoJ) campaign against anti-Trump activities, including the harsh prosecution of inauguration day protesters. On 17 July, the DoJ served a website-hosting company, DreamHost, with a search warrant for every piece of information it possessed that was related to a website that was used to coordinate protests during Donald Trumps inauguration. The warrant ... seeks to get the IP addresses of 1.3 million people who visited [the site], as well as the date and time of their visit and information about what browser or operating system they used. The warrant was made public Monday, when DreamHost announced its plans to challenge the government in court. The government has aggressively prosecuted activists arrested during the 20 January protests in Washington DC. In April, the US attorneys office in Washington DC filed a single indictment charging more than 217 people with identical crimes, including felony rioting. The Electronic Frontier Foundation, which has been advising DreamHost, characterized the warrant as unconstitutional. I cant conceive of a legitimate justification other than casting your net as broadly as possible, senior staff attorney Mark Rumold [said]. What they would be getting is a list of everyone who has ever been interested in attending these protests.

Note: In May, United Nations officials said that the US treatment of activists was increasingly "incompatible with US obligations under international human rights law". For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of privacy.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.