As a 501(c)(3) nonprofit, we depend almost entirely on donations from people like you.
We really need your help to continue this work! Please consider making a donation.
Subscribe here and join over 13,000 subscribers to our free weekly newsletter

Privacy News Stories

Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

Explore our comprehensive news index on a wide variety of fascinating topics.
Explore the top 20 most revealing news media articles we've summarized.
Check out 10 useful approaches for making sense of the media landscape.

Sort articles by: Article Date | Date Posted on WantToKnow.info | Importance

Connecting the Dots on PRISM, Phone Surveillance, and the NSAs Massive Spy Center
2013-06-12, Wired Magazine
Posted: 2013-06-18 13:26:14
http://www.wired.com/threatlevel/2013/06/nsa-prism-verizon-surveillance

Long before Edward Snowden walked out of the NSA with his trove of documents, whistleblowers there had been trying for years to bring attention to the massive turn toward domestic spying that the agency was making. Last year in my Wired cover story on the enormous new NSA data center in Utah, Bill Binney, the man who largely designed the agencys worldwide eavesdropping system, warned of the secret, nationwide surveillance. He told how the NSA had gained access to billions of billing records not only from AT&T but also from Verizon. I also wrote about Adrienne J. Kinne, an NSA intercept operator who attempted to blow the whistle on the NSAs illegal eavesdropping on Americans following the 9/11 attacks. She [attempted and failed] to end the illegal activity with appeals all the way up the chain of command to Major General Keith Alexander. The deception by General Alexander is especially troubling. In my new cover story for Wireds July issue ...I show how he has become the most powerful intelligence chief in the nations history. Never before has anyone in Americas intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the worlds largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the U.S. Cyber Command. As such, he has his own secret military, presiding over the Navys 10th Fleet, the 24th Air Force, and the Second Army.

Note: James Bamford, the author of this article, was the ABC producer responsible for breaking the story on Operation Northwoods, which proved a level of deception almost beyond belief at the very highest levels of the Pentagon. For more on this, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.


U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program
2013-06-07, Washington Post
Posted: 2013-06-11 07:33:25
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from...

The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs. The program, code-named PRISM, has not been made public until now. It may be the first of its kind. Equally unusual is the way the NSA extracts what it wants, according to the document: Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple. GCHQ, Britains equivalent of the NSA, also has been secretly gathering intelligence from the same internet companies through an operation set up by the NSA. PRISM was launched from the ashes of President George W. Bushs secret program of warrantless domestic surveillance in 2007, after news media disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced the president to look for new authority. Congress obliged with the Protect America Act in 2007 and the FISA Amendments Act of 2008, which immunized private companies that cooperated voluntarily with U.S. intelligence collection. Government officials and the document itself made clear that the NSA regarded the identities of its private partners as PRISMs most sensitive secret, fearing that the companies would withdraw from the program if exposed. 98 percent of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we dont harm these sources, the briefings author wrote in his speakers notes.

Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.


Everything you need to know about the NSAs phone records scandal
2013-06-06, Washington Post
Posted: 2013-06-11 07:31:12
http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/06/everything-you-nee...

The Guardian [has] released a classified court order requiring Verizon to turn over records of all domestic phone calls to the National Security Agency. The revelation has led to a renewed debate over the legality and policy merits of indiscriminate government surveillance of Americans. The court order, issued by the secret Foreign Intelligence Surveillance court, only sought metadata a fancy word for information like what numbers you called, what time you made the calls, and how long the calls were. The order does not seek the audio of calls. Of course, its possible the NSA has other programs collecting the contents of calls. In 2006 a whistleblower reported the existence of a secret, NSA-controlled room in an AT&T switching facility in San Francisco. So its possible the NSA is using rooms like that to listen to everyones phone calls. But all we know for sure is that the NSA has been requesting information about our phone calls. We only have proof of spying on Verizon customers, but its hard to imagine the NSA limiting its surveillance program to one company. There are probably similar orders in effect for AT&T and CenturyLink, the other major telephone companies. The order includes hints that the NSA is also collecting information from cellular customers. In addition to phone numbers and call times, the order seeks information about the specific cell phone tower the customer used to connect to the network during each call. Cellphones make calls using the closest tower. So if the NSA knows you made a call using a specific tower, they can safely assume you were near that tower at the time of the call.

Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.


Gov't Probe Obtains Wide Swath of AP Phone Records
2013-05-13, ABC News/Associated Press
Posted: 2013-05-21 08:09:25
http://abcnews.go.com/Politics/wireStory/govt-obtains-wide-ap-phone-records-p...

The Justice Department secretly obtained two months of telephone records of reporters and editors for The Associated Press in what the news cooperative's top executive called a "massive and unprecedented intrusion" into how news organizations gather the news. The records obtained by the Justice Department listed outgoing calls for the work and personal phone numbers of individual reporters, for general AP office numbers in New York, Washington and Hartford, Conn., and for the main number for the AP in the House of Representatives press gallery. In all, the government seized the records for more than 20 separate telephone lines assigned to AP and its journalists in April and May of 2012. The government would not say why it sought the records. Officials have previously said in public testimony that the U.S. attorney in Washington is conducting a criminal investigation into who may have provided information contained in a May 7, 2012, AP story about a foiled terror plot. The story disclosed details of a CIA operation in Yemen that stopped an al-Qaida plot in the spring of 2012 to detonate a bomb on an airplane bound for the United States. Prosecutors have sought phone records from reporters before, but the seizure of records from such a wide array of AP offices, including general AP switchboards numbers and an office-wide shared fax line, is unusual.

Note: For deeply revealing reports from reliable major media sources on government corruption, click here.


Are all telephone calls recorded and accessible to the US government?
2013-05-04, The Guardian (One of the UK's leading newspapers)
Posted: 2013-05-14 09:17:48
http://www.guardian.co.uk/commentisfree/2013/may/04/telephone-calls-recorded-...

CNN's Out Front with Erin Burnett [has been] focused on the possible involvement in the Boston Marathon attack of Katherine Russell, the 24-year-old American widow of the deceased suspect, Tamerlan Tsarnaev. Anonymous government officials are claiming that they are now focused on telephone calls between Russell and Tsarnaev that took place both before and after the attack to determine if she had prior knowledge of the plot or participated in any way. Burnett interviewed Tim Clemente, a former FBI counterterrorism agent, about whether the FBI would be able to discover the contents of past telephone conversations between the two. He quite clearly insisted that they could: BURNETT: There's no way they actually can find out what happened, right, unless she tells them? CLEMENTE: No, there is a way. We certainly have ways in national security investigations to find out exactly what was said in that conversation. We certainly can find that out. BURNETT: So they can actually get that? People are saying, look, that is incredible. CLEMENTE: No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not. On Thursday night, Clemente again appeared on CNN. He reiterated what he said the night before but added expressly that "all digital communications in the past" are recorded and stored. All digital communications - meaning telephone calls, emails, online chats and the like - are automatically recorded and stored and accessible to the government after the fact. To describe that is to define what a ubiquitous, limitless Surveillance State is.

Note: All of our communications have been monitored by government computers for years. BBC News reported in this this 1999 article about the Echelon network which monitors all communications globally. For deeply revealing reports from reliable major media sources on government and corporate threats to privacy, click here.


Domestic drones and their unique dangers
2013-03-29, The Guardian (One of the UK's leading newspapers)
Posted: 2013-04-02 09:12:09
http://www.guardian.co.uk/commentisfree/2013/mar/29/domestic-drones-unique-da...

The use of drones by domestic US law enforcement agencies is growing rapidly, both in terms of numbers and types of usage. As a result, civil liberties and privacy groups led by the ACLU ... have been devoting increasing efforts to publicizing their unique dangers and agitating for statutory limits. The belief that weaponized drones won't be used on US soil is patently irrational. Police departments are already speaking openly about how their drones "could be equipped to carry nonlethal weapons such as Tasers or a bean-bag gun." The drone industry has already developed and is now aggressively marketing precisely such weaponized drones for domestic law enforcement use. Domestic weaponized drones will be much smaller and cheaper, as well as more agile - but just as lethal [as the large missile-firing drones used by the US military overseas]. The nation's leading manufacturer of small "unmanned aircraft systems" (UAS) ... is AeroVironment, Inc. (AV). AV is now focused on drone products - such as the "Qube" - that are so small that they can be "transported in the trunk of a police vehicle or carried in a backpack." AV's website ... touts a February, 2013 Defense News article describing how much the US Army loves [its] "Switchblade" [drone]. Time Magazine heralded this tiny drone weapon as "one of the best inventions of 2012", gushing: "the Switchblade drone can be carried into battle in a backpack. It's a kamikaze: the person controlling it uses a real-time video feed from the drone to crash it into a precise target. Its tiny warhead detonates on impact."

Note: This important article also discusses drones used by government agencies such as police for purposes of continuous surveillance. But it misses entirely another major dimension: privately owned and controlled drones, which are becoming dirt cheap and within the reach of virtually anyone. Will the new "DroneWorld" in the making combine the worst features of the Police State with the Wild West?


U.S. to let spy agencies scour Americans' finances
2013-03-13, Chicago Tribune/Reuters
Posted: 2013-03-19 09:08:52
http://articles.chicagotribune.com/2013-03-13/business/chi-us-to-let-spy-agen...

The Obama administration is drawing up plans to give all U.S. spy agencies full access to a massive database that contains financial data on American citizens and others who bank in the country, according to a Treasury Department document. The proposed plan represents a major step by U.S. intelligence agencies to spot and track down [targeted persons] by bringing together financial databanks, criminal records and military intelligence. Financial institutions that operate in the United States are required by law to file reports of "suspicious customer activity," such as large money transfers or unusually structured bank accounts, to Treasury's Financial Crimes Enforcement Network (FinCEN). The Federal Bureau of Investigation already has full access to the database. However, intelligence agencies, such as the Central Intelligence Agency and the National Security Agency, currently have to make case-by-case requests for information to FinCEN. The Treasury plan would give spy agencies the ability to analyze more raw financial data than they have ever had before. Financial institutions file more than 15 million "suspicious activity reports" every year, according to Treasury. Banks, for instance, are required to report all personal cash transactions exceeding $10,000.

Note: For deeply revealing reports from reliable major media sources on the games intelligence agencies play, click here.


Raytheon software trolls social networks
2013-02-12, San Francisco Chronicle (SF's leading newspaper)
Posted: 2013-02-19 10:06:09
http://www.sfgate.com/technology/article/Raytheon-software-trolls-social-netw...

Raytheon, a Massachusetts defense contractor, has built tracking software that pulls information from social networks, according to a video obtained by the Guardian newspaper in London. "[Raytheon] has acknowledged the technology was shared with U.S. government and industry as part of a joint research and development effort, in 2010, to help build a national security system capable of analyzing 'trillions of entities' from cyberspace." Using public data from Facebook, Twitter, Gowalla and Foursquare, the software - called RIOT, or Rapid Information Overlay Technology - apparently gathers uploaded information and forms a profile of a person's every move that was registered with one of the websites. The video obtained by the newspaper starts with a demonstration by Raytheon's "principal investigator," Brian Urch, showing how easy it is to track an employee named Nick - a real person - based on all the places he has checked in using his smartphone. "When people take pictures and post them on the Internet using their smartphones, the phone will actually embed the latitude and longitude in the header data - so we're going to take advantage of that," Urch says. "So now we know where Nick's gone ... and now we'll predict where he'll be in the future." Urch goes on to analyze - using graphs and calendars - where Nick likes to spend his personal time and make predictions about his behavior. "If you ever wanted to get a hold of his laptop, you might want to visit the gym at 6 a.m. on Monday," Urch says with alarming casualness.

Note: To read the full Guardian article, click here.


TSA removing 'virtual strip search' body scanners
2013-01-19, CNN
Posted: 2013-01-22 10:23:23
http://www.cnn.com/2013/01/18/travel/tsa-body-scanners/index.html

Airport body scanners that produce graphic images of travelers' bodies will be removed from checkpoints by June, the Transportation Security Administration says, ending what critics called "virtual strip searches." Passengers will continue to pass through machines that display a generic outline of the human body, raising fewer privacy concerns. The TSA move came after Rapiscan, the manufacturer of the 174 so-called "backscatter" machines, acknowledged it could not meet a congressional-ordered deadline to install privacy software on the machines. "It is big news," said Marc Rotenberg, executive director of the Electronic Privacy Information Center. "It removes the concern that people are being viewed naked by the TSA screener." Currently, the TSA uses the 174 backscatter machines in 30 airports, and has another 76 units in storage. It uses millimeter wave machines in 170 airports. The decision to remove the backscatter machine will make moot, at least temporarily, travelers' concerns about the health effects of the machines. Backscatter machines use X-rays, while millimeter wave machines use radio waves. The TSA has long maintained both machines are safe, but recently signed an agreement with the National Academy of Sciences to study the scanners. The study will continue even though the machines are being pulled, the TSA said, because they could be reintroduced in the future.

Note: Each of those machines cost $175,000. Someone sure made a lot of money on these machines which had a very short lifespan.


Revealed: how the FBI coordinated the crackdown on Occupy
2012-12-29, The Guardian (One of the UK's leading newspapers)
Posted: 2013-01-01 08:44:13
http://www.guardian.co.uk/commentisfree/2012/dec/29/fbi-coordinated-crackdown...

New documents prove what was once dismissed as paranoid fantasy: totally integrated corporate-state repression of dissent. It was more sophisticated than we had imagined: new documents show that the violent crackdown on Occupy last fall so mystifying at the time was not just coordinated at the level of the FBI, the Department of Homeland Security, and local police. The crackdown, which involved, as you may recall, violent arrests, group disruption, canister missiles to the skulls of protesters, people held in handcuffs so tight they were injured, people held in bondage till they were forced to wet or soil themselves was coordinated with the big banks themselves. The Partnership for Civil Justice Fund, in a groundbreaking scoop that should once more shame major US media outlets (why are nonprofits now some of the only entities in America left breaking major civil liberties news?), filed this request. The document reproduced here in an easily searchable format shows a terrifying network of coordinated DHS, FBI, police, regional fusion center, and private-sector activity so completely merged into one another that the monstrous whole is, in fact, one entity: in some cases, bearing a single name, the Domestic Security Alliance Council. And it reveals this merged entity to have one centrally planned, locally executed mission. The documents, in short, show the cops and DHS working for and with banks to target, arrest, and politically disable peaceful American citizens.

Note: For analysis of these amazing documents revealing the use of joint government and corporate counterterrorism structures against peaceful protestors of financial corruption, click here and here. For a Democracy Now! video segment on this, click here.


F.B.I. Counterterrorism Agents Monitored Occupy Movement
2012-12-25, New York Times
Posted: 2013-01-01 08:42:41
http://www.nytimes.com/2012/12/25/nyregion/occupy-movement-was-investigated-b...

The Federal Bureau of Investigation used counterterrorism agents to investigate the Occupy Wall Street movement, including its communications and planning, according to newly disclosed agency records. The F.B.I. records show that as early as September 2011, an agent from a counterterrorism task force in New York notified officials of two landmarks in Lower Manhattan Federal Hall and the Museum of American Finance that their building was identified as a point of interest for the Occupy Wall Street. In the following months, F.B.I. personnel around the country were routinely involved in exchanging information about the movement with businesses, local law-enforcement agencies and universities. An October 2011 memo from the bureaus Jacksonville, Fla., field office was titled Domain Program Management Domestic Terrorist. The memo said agents discussed past and upcoming meetings of the movement, and its spread. It said agents should contact Occupy Wall Street activists to ascertain whether people who attended their events had violent tendencies. Since the Sept. 11, 2001, attacks, the F.B.I. has come under criticism for deploying counterterrorism agents to conduct surveillance and gather intelligence on organizations active in environmental, animal-cruelty and poverty issues. The records were obtained by the Partnership for Civil Justice Fund, a civil-rights organization in Washington, through a Freedom of Information request to the F.B.I.

Note: For analysis of these amazing documents revealing the use of joint government and corporate counterterrorism structures against peaceful protestors of financial corruption, click here and here. For a Democracy Now! video segment on this, click here.


GOP and Feinstein join to fulfill Obama's demand for renewed warrantless eavesdropping
2012-12-28, The Guardian (One of the UK's leading newspapers)
Posted: 2013-01-01 08:40:37
http://www.guardian.co.uk/commentisfree/2012/dec/28/fisa-feinstein-obama-demo...

The FISA Amendments Act of 2008 did much more than shield lawbreaking telecoms from all forms of legal accountability. It also legalized vast new, sweeping and almost certainly unconstitutional forms of warrantless government eavesdropping. [The] 2008 law gutted the 30-year-old FISA statute that had [barred] the government from eavesdropping on the communications of Americans without first obtaining a warrant from a court. Worst of all, the 2008 law legalized ... the NSA warrantless eavesdropping program secretly implemented by George Bush after the 9/11 attack. The 2008 FISA law provided that it would expire in four years unless renewed. Yesterday, the Senate debated its renewal. Several Senators - Democrats Jeff Merkley and Ron Wyden of Oregon along with Kentucky GOP Senator Rand Paul - each attempted to attach amendments to the law simply to provide some modest amounts of transparency and oversight to ensure that the government's warrantless eavesdropping powers were constrained and checked from abuse. The Democratic Chair of the Senate Intelligence Committee, Dianne Feinstein ... demanded renewal of the FISA law without any reforms. And then predictably, in virtually identical 37-54 votes, Feinstein and her conservative-Democratic comrades joined with virtually the entire GOP caucus ... to reject each one of the proposed amendments and thus give Obama exactly what he demanded: reform-free renewal of the law.

Note: For analysis of this Senate vote, click here. For deeply revealing reports from reliable major media sources on government assaults on privacy, click here.


U.S. Terrorism Agency to Tap a Vast Database of Citizens
2012-12-12, Wall Street Journal
Posted: 2012-12-18 10:41:37
http://online.wsj.com/article/SB10001424127887324478304578171623040640006.html

Through Freedom of Information Act requests and interviews with officials at numerous agencies, The Wall Street Journal has reconstructed the clash over the counterterrorism program within the administration of President Barack Obama. The attorney general [has] signed the changes into effect. The rules now allow the little-known National Counterterrorism Center to examine the government files of U.S. citizens for possible criminal behavior, even if there is no reason to suspect them. That is a departure from past practice, which barred the agency from storing information about ordinary Americans unless a person was a terror suspect or related to an investigation. Now, NCTC can copy entire government databasesflight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others. The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior. Previously, both were prohibited. Data about Americans "reasonably believed to constitute terrorism information" may be permanently retained. "It's breathtaking" in its scope, said a former senior administration official. The Fourth Amendment of the Constitution says that searches of "persons, houses, papers and effects" shouldn't be conducted without "probable cause" that a crime has been committed.

Note: This article requires subscription to view at the link above. To read it for free, click here. For analysis of this sweeping increase in government privacy invasions, click here. For deeply revealing reports from reliable major media sources on government privacy invasions, click here.


Push to step up domestic use of drones
2012-11-27, San Francisco Chronicle (SF's leading newspapers)
Posted: 2012-12-04 09:33:35
http://www.sfgate.com/nation/article/Push-to-step-up-domestic-use-of-drones-4...

Are unmanned aircraft, known to have difficulty avoiding collisions, safe to use in America's crowded airspace? And would their widespread use for surveillance result in unconstitutional invasions of privacy? Experts say neither question has been answered satisfactorily. Yet the federal government is rushing to open America's skies to tens of thousands of the drones - pushed to do so by a law championed by manufacturers of the unmanned aircraft. The 60-member House of Representatives' "drone caucus" - officially, the House Unmanned Systems Caucus - has helped push that agenda. And over the last four years, caucus members have drawn nearly $8 million in drone-related campaign contributions. Domestic use of drones began with limited aerial patrols of the nation's borders by Customs and Border Patrol authorities. But the industry and its allies pushed for more, leading to provisions in the FAA Modernization and Reform Act, signed into law on Feb. 14 of this year. The law requires the FAA to fully integrate the unmanned aerial vehicles into national airspace by September 2015. The FAA has predicted that 30,000 drones could be flying in the United States in less than 20 years. House members from California, Texas, Virginia and New York on the bipartisan "drone caucus" received the lion's share of the funds channeled to lawmakers from dozens of firms that are members of the Association for Unmanned Vehicle Systems International.

Note: For deeply revealing reports from reliable major media sources on drone killings and other war crimes committed by the US in its wars of aggression in the Middle East, Asia and Africa, click here.


FBI's abuse of the surveillance state is the real scandal needing investigation
2012-11-13, The Guardian (One of the UK's leading newspapers)
Posted: 2012-11-19 14:34:13
http://www.guardian.co.uk/commentisfree/2012/nov/13/petraeus-surveillance-sta...

The Petraeus scandal is receiving intense media scrutiny. Several of the emerging revelations are genuinely valuable, particularly those involving the conduct of the FBI and the reach of the US surveillance state. The FBI investigation began when Jill Kelley - a Tampa socialite friendly with Petraeus (and apparently very friendly with Gen. John Allen, the four-star U.S. commander of the war in Afghanistan) - received a half-dozen or so anonymous emails that she found vaguely threatening. She then informed a friend of hers who was an FBI agent, and a major FBI investigation was then launched that set out to determine the identity of the anonymous emailer. What is most striking is how sweeping, probing and invasive the FBI's investigation then became, all without any evidence of any actual crime - or the need for any search warrant. The FBI traced all of [Paula] Broadwell's physical locations, learned of all the accounts she uses, ended up reading all of her emails, investigated the identity of her anonymous lover (who turned out to be Petraeus), and then possibly read his emails as well. They also discovered "alleged inappropriate communication" to Kelley from Gen. Allen, who is not only the top commander in Afghanistan but was also just nominated by President Obama to be the Commander of US European Command and Supreme Allied Commander Europe (a nomination now "on hold"). This is a surveillance state run amok. It also highlights how any remnants of internet anonymity have been all but obliterated by the union between the state and technology companies.

Note: For deeply revealing reports from reliable major media sources on government surveillance, click here.


Rented computers secretly photographed users having sex
2012-09-26, BBC News
Posted: 2012-10-02 10:06:39
http://www.bbc.co.uk/news/technology-19726954

Rented computers from seven different companies secretly took photographs of their users, US authorities have said. The companies used software made by US company Designerware which could track key strokes and other personal data. The software, called PC Rental Agent, captured people engaging in "intimate acts", including sex. It is believed that PC Rental Agent has been installed in approximately 420,000 computers worldwide. The Federal Trade Commission ruling concerned a feature in the software, called Detective Mode, which would typically become activated if the user was late in returning equipment, or failed to pay for use. Detective Mode would assist the rental store in locating the overdue computer in order to pursue its return. Part of the process involved a pop-up window designed to look like a software registration screen. It would request personal information such as email addresses and telephone numbers that could then be used to pursue the users for payment and/or the return of equipment. In addition, the FTC said the software had access to much more sensitive information, including: usernames and passwords for email accounts, social media websites, and financial institutions. Among the other data collected were social security numbers; medical records; private emails to doctors; bank and credit card statements. Webcam pictures of children, partially undressed individuals, and intimate activities at home were also found. In the FTC's formal complaint document, it said the software had captured "couples engaged in sexual activities".

Note: Do you think other companies or intelligence agencies might be conducting similar monitoring? For more on this, click here.


The Program
2012-08-23, New York Times
Posted: 2012-09-04 09:03:46
http://www.nytimes.com/2012/08/23/opinion/the-national-security-agencys-domes...

[William] Binney, a 32-year veteran of the National Security Agency turned whistle-blower, ... described details about Stellar Wind, the N.S.A.s top-secret domestic spying program begun after 9/11, which was so controversial that it nearly caused top Justice Department officials to resign in protest, in 2004. The decision must have been made in September 2001, Mr. Binney told me [and] cinematographer Kirsten Johnson. Thats when the equipment started coming in. He resigned over this in 2001 and began speaking out publicly in the last year. [Binney] is among a group of N.S.A. whistle-blowers, including Thomas A. Drake, who have each risked everything their freedom, livelihoods and personal relationships to warn Americans about the dangers of N.S.A. domestic spying. The N.S.A. has technical abilities that are nearly impossible to defend against if you are targeted. The 2008 amendments to the Foreign Intelligence Surveillance Act, which oversees the N.S.A. activities, are up for renewal in December. Two members of the Senate Select Committee on Intelligence, Senators Ron Wyden of Oregon and Mark Udall of Colorado ... have been warning about secret interpretations of laws and backdoor loopholes that allow the government to collect our private communications. Thirteen senators have signed a letter expressing concern about a loophole in the law that permits the collection of United States data. The A.C.L.U. and other groups have also challenged the constitutionality of the law, and the Supreme Court will hear arguments in that case on Oct. 29.

Note: The video about this on the NY Times webpage at the link above is quite revealing. One potent comment of this 32-year NSA veteran in the video is "They wanted to highly classify the extreme impeachable crimes they were committing." For deeply revealing reports from reliable major media sources on government and corporate surveillance, click here.


TSA defies the courts
2012-07-18, Washington Times
Posted: 2012-09-04 08:56:40
http://www.washingtontimes.com/news/2012/jul/18/editorial-tsa-defies-courts/

The days of secrecy at the Transportation Security Administration (TSA) may be coming to an end. Its a widely held belief that the agencys hasty embrace of expensive, X-rated x-ray machines has more to do with closed-door lobbying efforts of manufacturers than a deliberate consideration of the devices merits. The Electronic Privacy Information Center (EPIC) [has] pushed for some transparency by asking the D.C. Circuit U.S. Court of Appeals to compel the agency to hold a public notice-and-comment period on the use of pornographic scanners, as the law requires. EPIC has a good case because on July 15, 2011, the D.C. Circuit issued a ruling insisting TSA promptly come into compliance with Administrative Procedure Act requirements regarding public hearings. TSA believed it wasnt subject to such rules because the virtual strip-searching of women, children and the elderly is an essential security operation. The last thing TSA wants is the public-relations disaster of having to collect and publish the horror tales from Americans subjected to humiliation from the nude photography and intrusive pat-down groping sessions. Its time to admit the post-Sept. 11 experiment in having the government take over airport screening duties has been a colossal flop. TSA has defied the Administrative Procedures Act, an appellate court, the public will and common decency. Its not enough just to pull the plug on the scanners; the plug should be pulled on TSA itself.

Note: According to this PBS report, "European Union regulators recently banned any body scanner that uses X-rays, 'in order not to risk jeopardizing citizens' health and safety.'" It also states, "The TSA tested the devices behind closed doors, without scrutiny from independent scientists." For lots more on this topic important to all air travelers, click here.


The new totalitarianism of surveillance technology
2012-08-15, The Guardian (One of the UK's leading newspapers)
Posted: 2012-08-21 10:03:51
http://www.guardian.co.uk/commentisfree/2012/aug/15/new-totalitarianism-surve...

Last week, New York Mayor Michael Bloomberg joined NYPD Commissioner Ray Kelly to unveil a major new police surveillance infrastructure, developed by Microsoft. The Domain Awareness System links existing police databases with live video feeds, including cameras using vehicle license plate recognition software. No mention was made of whether the system plans to use or already uses facial recognition software. But, at present, there is no law to prevent US government and law enforcement agencies from building facial recognition databases. And we know from industry newsletters that the US military, law enforcement, and the department of homeland security are betting heavily on facial recognition technology. As PC World notes, Facebook itself is a market leader in the technology but military and security agencies are close behind. According to Homeland Security Newswire, billions of dollars are being invested in the development and manufacture of various biometric technologies capable of detecting and identifying anyone, anywhere in the world via iris-scanning systems, already in use; foot-scanning technology (really); voice pattern ID software, and so on. What is very obvious is that this technology will not be applied merely to people under arrest, or to people under surveillance in accordance with the fourth amendment. No, the "targets" here [include] everyone. In the name of "national security", the capacity is being built to identify, track and document any citizen constantly and continuously.

Note: For deeply revealing reports from reliable major media sources on civil liberties, click here.


Trapwire surveillance system exposed in document leak
2012-08-13, The Guardian (One of the UK's leading newspapers)
Posted: 2012-08-21 10:01:30
http://www.guardian.co.uk/world/2012/aug/13/trapwire-surveillance-system-expo...

[Trapwire is] a CCTV surveillance system that recognises people from their face or walk and analyses whether they might be about to commit a terrorist or criminal act. According to documents released online by WikiLeaks [it] is being used in a number of countries to try to monitor people and threats. Founded by former CIA agents, Trapwire uses data from a network of CCTV systems and numberplate readers to figure out the threat level in huge numbers of locations. The documents outlining Trapwire's existence and its deployment in the US were apparently obtained in a hack of computer systems belonging to the intelligence company Stratfor at the end of last year. Documents from the US department of homeland security show that it paid $832,000 to deploy Trapwire in Washington DC and Seattle. Stratfor describes Trapwire as "a unique, predictive software system designed to detect patterns of pre-attack surveillance and logistical planning". It serves "a wide range of law enforcement personnel and public and private security officials domestically and internationally", Stratfor says. Some have expressed doubts that Trapwire could really forecast [future] acts based on data from cameras. The claims might seem overblown, but then the idea that the US could have an international monitoring system seemed absurd until the discovery of the Echelon system, used by the US to eavesdrop on electronic communications internationally.

Note: For more on the growing use of this secret technology, click here. For deeply revealing reports from reliable major media sources on privacy, click here.


Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.