Privacy News StoriesExcerpts of Key Privacy News Stories in Major Media
Note: This comprehensive list of privacy news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
In a luxury Washington, DC, hotel last month, governments from around the world gathered to discuss surveillance technology they would rather you did not know about. The annual Intelligence Support Systems (ISS) World Americas conference is a mecca for representatives from intelligence agencies and law enforcement. But to the media or members of the public, it is strictly off limits. Behind the cloak of secrecy at the ISS World conference, tips are shared about the latest advanced ... methods used to spy on citizens – computer hacking, covert bugging and GPS tracking. The use of such methods is more commonly associated with criminal hacking groups, who have used spyware and trojan viruses to infect computers and steal bank details or passwords. But as the internet has grown, intelligence agencies and law enforcement have adopted similar techniques. "The current method of choice would seem to be spyware, or trojan horses," said Chris Soghoian, a Washington-based surveillance and privacy expert. "When there are five or six conferences held in closed locations every year, where telecommunications companies, surveillance companies and government ministers meet in secret to cut deals, buy equipment, and discuss the latest methods to intercept their citizens' communications – that I think meets the level of concern," he said. "Decades of history show that surveillance powers are abused – usually for political purposes."
Somewhere, a US government official is reading through a list of those who sent or received an email from Jacob Appelbaum, a 28-year-old computer science researcher at the University of Washington who volunteered for WikiLeaks. Among those listed will be my name, a journalist who interviewed Appelbaum for a book about the digital revolution. Appelbaum is a spokesman for Tor, a free internet anonymising software that helps people defend themselves against internet surveillance. He's spent five years teaching activists around the world how to install and use the service to avoid being monitored by repressive governments. Now, Appelbaum finds himself a target of his own government as a result of his friendship with Julian Assange and the fact WikiLeaks used the Tor software. Appelbaum has not been charged with any wrongdoing; nor has the government shown probable cause that he is guilty of any criminal offence. That matters not a jot, because, as the law stands, government officials don't need a search warrant to access our digital data. Searching someone's home requires a warrant that can only be obtained by proving probable cause, but digital searches require no such burden of proof. Most people are not aware of the ease with which governments – free, open and so-called democratic – can access and peruse our private communications.
Note: For key reports on government threats to privacy from major media sources, click here.
Dozens of police departments nationwide are gearing up to use a tech company's already controversial iris- and facial-scanning device that slides over an iPhone and helps identify a person or track criminal suspects. Its use has set off alarms with some who are concerned about possible civil liberties and privacy issues. The smartphone-based scanner, named Mobile Offender Recognition and Information System, or MORIS, is made by BI2 Technologies in Plymouth, Massachusetts. An iris scan, which detects unique patterns in a person's eyes, can reduce to seconds the time it takes to identify a suspect in custody. When attached to an iPhone, MORIS can photograph a person's face and run the image through software that hunts for a match in a BI2-managed database of U.S. criminal records. Constitutional rights advocates are concerned, in part because the device can accurately scan an individual's face from up to four feet away, potentially without a person's being aware of it. Experts also say that before police administer an iris scan, they should have probable cause a crime has been committed. "What we don't want is for them to become a general surveillance tool, where the police start using them routinely on the general public, collecting biometric information on innocent people," said Jay Stanley, senior policy analyst with the national ACLU in Washington, D.C.
Companies have long used criminal background checks, credit reports and even searches on Google and LinkedIn to probe the previous lives of prospective employees. Now, some companies are requiring job candidates to also pass a social media background check. A year-old start-up, Social Intelligence, scrapes the Internet for everything prospective employees may have said or done online in the past seven years. Then it assembles a dossier with examples of professional honors and charitable work, along with negative information that meets specific criteria: online evidence of racist remarks; references to drugs; sexually explicit photos, text messages or videos; flagrant displays of weapons or bombs and clearly identifiable violent activity. The service ... alarms privacy advocates who say that it invites employers to look at information that may not be relevant to job performance. And what relevant unflattering information has led to job offers being withdrawn or not made? Marc S. Rotenberg, president of the Electronic Privacy Information Center, ... said that employers were entitled to gather information to make a determination about job-related expertise, but he expressed concern that “employers should not be judging what people in their private lives do away from the workplace.”
With little notice and only occasional complaints, the American military and local authorities have been engaged in an ambitious effort to record biometric identifying information on a remarkable number of people in Afghanistan and Iraq, particularly men of fighting age. Information about more than 1.5 million Afghans has been put in databases operated by American, NATO and local forces. In Iraq, an even larger number of people, and a larger percentage of the population, have been registered. Data have been gathered on roughly 2.2 million Iraqis. A citizen in Afghanistan or Iraq would almost have to spend every minute in a home village and never seek government services to avoid ever crossing paths with a biometric system. What is different from traditional fingerprinting is that the government can scan through millions of digital files in a matter of seconds. While the systems are attractive to American law enforcement agencies, there is serious legal and political opposition to imposing routine collection on American citizens. Various federal, state and local law enforcement agencies have discussed biometric scanning, and many have even spent money on hand-held devices. But the proposed uses are much more limited, with questions being raised about constitutional rights of privacy and protection from warrantless searches.
Note: Many new technologies for domestic population control are developed, deployed, and tested by the US military in war theaters abroad, and then shared with police agencies in the US. For many examples see our "Non-lethal" Weapons article archive available here.
When two senators warned that the Patriot Act is being interpreted in a secret way that would alarm Americans if they knew the details, civil liberties activists could only speculate about what they meant. The activists' fear: that the government is using the anti-terrorism law to collect vast troves of personal information, including cellphone records, on Americans who have no link to terrorism. Sens. Ron Wyden of Oregon and Mark Udall of Colorado, both Democrats, proclaimed that the Patriot Act's surveillance powers are being used far more expansively than most Americans realize. "Today the American people do not know how their government interprets the language of the Patriot Act," Wyden said. "Someday they are going to find out, and a lot of them are going to be stunned. Some of them will undoubtedly ask their senators: 'Did you know what this law actually did? Why didn't you know? Wasn't it your job to know, before you voted on it?'" The warnings by two lawmakers with access to secret information underscore the extent to which government surveillance is shielded from view, in an age when nearly every American leaves a digital trail through the Internet and mobile devices. A clue about Wyden's concerns may be found in a separate bill he is proposing, to forbid the government from tracking, without a court order, the location of Americans through the GPS signals given out by their cellphones.
What's good for the police apparently isn't good for the people - or so the law enforcement community would have us believe when it comes to surveillance. That's a concise summary of a new trend noted by National Public Radio last week - the trend whereby law enforcement officials have been trying to prevent civilians from using cell phone cameras in public places as a means of deterring police brutality. Oddly, the effort - which employs both forcible arrests of videographers and legal proceedings against them - comes at a time when the American Civil Liberties Union reports that "an increasing number of American cities and towns are investing millions of taxpayer dollars in surveillance camera systems." The assault on civil liberties in America is a very real problem. As USA Today reported under the headline "Police brutality cases on rise since 9/11," situations "in which police, prison guards and other law enforcement authorities have used excessive force or other tactics to violate victims' civil rights increased 25 percent" between 2001 and 2007. Last year alone, more than 1,500 officers were involved in excessive force complaints, according to the National Police Misconduct Statistics and Reporting Project.
Weeks after generating an uproar for the aggressive screening of a six-year-old child in New Orleans, the TSA is again facing criticism for an enhanced pat-down. Former Miss USA Susie Castillo says she was "molested" by a TSA screener at Dallas/Fort Worth International Airport after declining to go through a body scanner due to radiation concerns. According to a detailed account from the Dallas Morning News, Castillo wrote "My private area was grazed four times!" on a complaint card after the screening. Castillo immediately shot a tearful video recounting the episode more explicitly and posted it on YouTube. The Boston Herald quotes from the video: "That's why I'm crying, that's why I'm so upset. They're making me choose to either get molested, because that's what I feel like, or go through this machine that's completely unhealthy and dangerous." TSA spokesman Luis Casanova defended the screening procedure. "Everything [the screener] did was according to protocol," Casanova said.
Note: For key articles on increasing reductions of civil liberties by governments, click here.
Security researchers have discovered that Apple's iPhone keeps track of where you go – and saves every detail of it to a secret file on the device which is then copied to the owner's computer when the two are synchronised. The file contains the latitude and longitude of the phone's recorded coordinates along with a timestamp, meaning that anyone who stole the phone or the computer could discover details about the owner's movements using a simple program. For some phones, there could be almost a year's worth of data stored, as the recording of data seems to have started with Apple's iOS 4 update to the phone's operating system, released in June 2010. "Apple has made it possible for almost anybody – a jealous spouse, a private detective – with access to your phone or computer to get detailed information about where you've been," said Pete Warden, one of the researchers. Only the iPhone records the user's location in this way, say Warden and Alasdair Allan, the data scientists who discovered the file and are presenting their findings at the Where 2.0 conference in San Francisco on [April 20]. "Alasdair has looked for similar tracking code in [Google's] Android phones and couldn't find any," said Warden.
Note: For key reports from reliable sources on threats to privacy, click here.
The US military is developing software that will let it secretly manipulate social media sites by using fake online personas to influence internet conversations and spread pro-American propaganda. A Californian corporation has been awarded a contract with United States Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, to develop what is described as an "online persona management service" that will allow one US serviceman or woman to control up to 10 separate identities based all over the world. Critics are likely to complain that it will allow the US military to create a false consensus in online conversations, crowd out unwelcome opinions and smother commentaries or reports that do not correspond with its own objectives. The discovery that the US military is developing false online personalities – known to users of social media as "sock puppets" – could also encourage other governments, private companies and non-government organisations to do the same. Once developed, the software could allow US service personnel, working around the clock in one location, to respond to emerging online conversations with any number of co-ordinated messages, blogposts, chatroom posts and other interventions.
Note: The Pentagon claims that the "fake persona" software will not be used on social networks in the United States, because that would break laws against using propaganda on US citizens. How much credence should be given to this assurance?
Giving Transportation Security Administration agents a peek under your clothes may soon be a practice that goes well beyond airport checkpoints. Newly uncovered documents show that as early as 2006, the Department of Homeland Security has been planning pilot programs to deploy mobile scanning units that can be set up at public events and in train stations, along with mobile x-ray vans capable of scanning pedestrians on city streets. The non-profit Electronic Privacy Information Center (EPIC) [has] published documents it obtained from the Department of Homeland Security showing that from 2006 to 2008 the agency planned a study of of new anti-terrorism technologies. The projects range from what the DHS describes as “a walk through x-ray screening system that could be deployed at entrances to special events” ... to “covert inspection of moving subjects” employing the same backscatter imaging technology currently used in American airports. The 173-page collection of contracts and reports, acquired through a Freedom of Information Act request, includes contracts with Siemens Corporations, Northeastern University, and Rapiscan Systems. One project allocated to Northeastern University and Siemens would mount backscatter x-ray scanners and video cameras on roving vans, along with other cameras on buildings and utility poles, to monitor groups of pedestrians, assess what they carried, and even track their eye movements. It’s not clear to what degree the technologies outlined in the DHS documents have been implemented.
Note: When WantToKnow.info manager Fred Burks worked as a language interpreter with the US State Department, he accompanied foreign dignitaries on ride-alongs with police where they were already using equipment like this over 10 years ago in clear violation of privacy laws. For other major media articles revealing clear violations of civil liberties, click here.
Starting in the early 1900s, hundreds of thousands of American children were warehoused in institutions by state governments. And the federal government did nothing to stop it. The justification? The kids had been labeled feeble-minded, and were put away in conditions that can only be described as unspeakable. A large proportion of the kids who were locked up were not retarded at all. They were simply poor, uneducated kids with no place to go, who ended up in institutions like the Fernald School in Waltham, Mass. The Fernald School, and others like it, was part of a popular American movement in the early 20th century called the Eugenics movement. The idea was to separate people considered to be genetically inferior from the rest of society, to prevent them from reproducing. Eugenics is usually associated with Nazi Germany, but in fact, it started in America. Not only that, it continued here long after Hitler's Germany was in ruins. Few of the attendants [at Fernald] showed any kindness. And ... there was sexual abuse. The place was tailor made for it. The school [also] allowed them to be used as human guinea pigs. In 1994 Senate hearings, it came out that scientists from MIT had been giving radioactive oatmeal to the boys ... in a nutrition study for Quaker Oats. All they knew is that they'd been asked to join a science club. The boys were recruited with special treats [like] extra milk. “But they forgot to mention the milk was radioactive,” says David White-Lief, an attorney who worked on the state task force investigating the science club. “These experiments, because of the lack of informed consent, violated the Nuremburg Code established just 10 years earlier,” says White-Lief.
Note: The extreme racism of the Nazis was quite popular among certain groups in the U.S. For lots more on how these ideas came to pervade some groups in U.S. intelligence services, click here. For a powerful list of military and government sponsored experiments on human guinea pigs with links for verification, click here.
Skipping class, though frowned upon, is practically a rite of passage for young teens, but thanks to an elaborate system involving GPS being used by some school districts, it is practically being eliminated completely. The Orange County Register reports that the Anaheim Union High School District in California is currently participating in a pilot program which involves using a combination of Global Positioning System technology, automated telephone reminders, and one-on-one coaching to cut down on truancy. It's similar to programs being used in Baltimore and San Antonio. Basically any students in the seventh- or eighth-grade who have four or more unexcused absences over the course of a school year can be put into the Anaheim program. They will be assigned a GPS tracking device about the size of a cell phone, and they'll need to use it regularly, the newspaper said. It's worth noting that while this anti-truancy program is very elaborate and almost invasive, it is [promoted as] optional. Students and their parents are offered the chance to voluntarily participate in the "monitoring as a way to avoid continuation school or prosecution with a potential stay in juvenile hall." On top of that, parents would also be avoiding the $2,000 fine that can come from turning a blind eye to truancy if a school district chooses to pursue the issue.
Note: For other revealing media articles on microchips being used to invade privacy, click here. To better understand a program of elements within the power elite to microchip the entire population, click here.
Leaked U.S. diplomatic cables appear to show that the United States has been snooping on NATO's top official using secret sources on his own staff. Confidential cables from the U.S. mission to NATO released [on February 11] by WikiLeaks, ... said American diplomats received information on the private conversations of Secretary-General Anders Fogh Rasmussen from "a member of the NATO international staff." Instead of the staffer's name, the phrase "strictly protect" was inserted in a cable dated Sept. 10, 2009. The cable dealt with Fogh Rasmussen's proposal to improve ties with Russia by establishing contacts with the Collective Security Treaty Organization, a Russia-dominated security alliance. The cable was signed off by U.S. ambassador Ivo Daalder. There has been no known [previous] case in the past of a nation spying on the secretary-general.
Consumer Watchdog, an advocacy group largely focused in recent years on Google's privacy practices, has called [for] a congressional investigation into the Internet giant's "cozy" relationship with U.S. President Barack Obama's administration. In a letter sent [on January 24], Consumer Watchdog asked Representative Darrell Issa, the new chairman of the House Oversight and Government Reform Committee, to investigate the relationship between Google and several government agencies. "We believe Google has inappropriately benefited from close ties to the administration," the letter said. "It should not get special treatment and access because of a special relationship with the administration." Consumer Watchdog's latest complaints about the relationship of Google and the Obama administration are outlined in a 32-page report [which] questions Google's relationship with the U.S. National Security Agency and calls for the company to be more open about what consumer information it shares with the spy agency.
Former Minnesota Gov. Jesse Ventura is suing the Department of Homeland Security and the Transportation Security Administration, saying full-body scans and pat-downs at airport checkpoints are violating his rights. Ventura filed his lawsuit [on January 24] in federal court in Minnesota. He says the new security measures violate his right to be free from unreasonable searches and seizures. He's asking a federal court to order officials to stop subjecting him to these searches. Ventura was governor of Minnesota from 1999 through 2002. He now hosts the television program "Conspiracy Theory." The lawsuit says Ventura had a hip replacement in 2008, and his titanium implant sets off metal detectors.
Note: Jesse Ventura is one of the heros of our time. Do a video search on his name to watch episodes of his amazingly revealing "Conspiracy Theory" programs.
The suspect's house, just west of this city, sat on a hilltop at the end of a steep, exposed driveway. Agents with the Texas Department of Public Safety believed the man inside had a large stash of drugs and a cache of weapons. The Texas agents did what no state or local law enforcement agency had done before in a high-risk operation: They launched a drone. A bird-size device called a Wasp floated hundreds of feet into the sky and instantly beamed live video to agents on the ground. The SWAT team stormed the house and arrested the suspect. "The nice thing is it's covert," said Bill C. Nabors Jr., chief pilot with the Texas DPS, "You don't hear it, and unless you know what you're looking for, you can't see it." The drone technology that has revolutionized warfare in Iraq, Afghanistan and Pakistan is entering the national airspace. The operation outside Austin presaged what could prove to be one of the most far-reaching and potentially controversial uses of drones: as a new and relatively cheap surveillance tool in domestic law enforcement. By 2013, the FAA expects to have formulated new rules that would allow police across the country to routinely fly lightweight, unarmed drones up to 400 feet above the ground - high enough for them to be largely invisible eyes in the sky. Such technology could allow police to record the activities of the public below with high-resolution, infrared and thermal-imaging cameras.
Note: For lots more from reliable sources on government and corporate threats to privacy, click here.
Undercover police officers routinely adopted a tactic of "promiscuity" with the blessing of senior commanders, according to a former agent who worked in a secretive unit of the Metropolitan police for four years. The former undercover policeman claims that sexual relationships with activists were sanctioned for both men and women officers infiltrating anarchist, leftwing and environmental groups. Sex was a tool to help officers blend in, the officer claimed, and was widely used as a technique to glean intelligence. He said undercover officers, particularly those infiltrating environmental and leftwing groups, viewed having sex with a large number of partners "as part of the job". His comments contradict claims last week from the Association of Chief Police Officers that operatives were absolutely forbidden to sleep with activists. The claims follow the unmasking of undercover PC Mark Kennedy, who had sexual relationships with several women during the seven years he spent infiltrating a ring of environmental activists. Another two covert officers have been named in the past fortnight who also had sex with the protesters they were sent to spy on, fuelling allegations that senior officers had authorised sleeping around as a legitimate means of gathering intelligence.
Note: For a comprehensive overview of the still-ongoing revelations about police provocateur Mark Kennedy and his cohorts in the UK police infiltration of environmental and related activist groups, click here.
Coming to you soon from the Pentagon: the diary to end all diaries — a multimedia, digital record of everywhere you go and everything you see, hear, read, say and touch. Known as LifeLog, the project has been put out for contractor bids by the Defense Advanced Research Projects Agency, or DARPA, the agency that helped build the Internet and that is now developing the next generation of [surveillance] tools. The agency ... [considers] LifeLog ... a tool to capture "one person's experience in and interactions with the world" through a camera, microphone and sensors worn by the user. Everything from heartbeats to travel to Internet chatting would be recorded. The goal is to create breakthrough software that helps analyze behavior, habits and routines, according to Pentagon documents reviewed by The Associated Press. The products of the unclassified project would be available to both the private sector and other government agencies — a concern to privacy advocates. John Pike of Global Security.org, a defense analysis group, is dubious the project has military application. "I have a much easier time understanding how Big Brother would want this than how (Defense Secretary Donald) Rumsfeld would use it," Pike said. "They have not identified a military application."
Note: For more on this at Wired, click here.
Scotland Yard has admitted giving MPs inaccurate information by denying "covert officers" were deployed at London's G20 protests in April 2009. In a statement, the Metropolitan Police said it had established that covert officers had been deployed to the protests. The letter came after ... the unmasking of undercover policeman Mark Kennedy, who attended many demonstrations during seven years living as a spy among green activists. Giving evidence at the select committee in 2009, Commander Bob Broadhurst told MPs then: "The only officers we deploy for intelligence purposes at public order are forward intelligence team officers who are wearing full police uniforms with a yellow jacket with blue shoulders. There were no plain clothes officers deployed at all." The Met statement released on Wednesday said: "Having made thorough checks on the back of recent media reporting we have now established that covert officers were deployed during the G20 protests. Therefore the information that was given by Commander Bob Broadhurst to the Home Affairs Select Committee saying that 'We had no plain-clothes officers deployed within the crowd' was not accurate."
Note: For lots more on the police provocateur Mark Kennedy, click here.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.