As a 501(c)(3) nonprofit, we depend almost entirely on donations from people like you.
We really need your help to continue this work! Please consider making a donation.
Subscribe here and join over 13,000 subscribers to our free weekly newsletter

Big Brother News Articles

Below are key excerpts of revealing news articles on Big Brother from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

Explore our comprehensive news index on a wide variety of fascinating topics.
Explore the top 20 most revealing news media articles we've summarized.
Check out 10 useful approaches for making sense of the media landscape.

Sort articles by: Article Date | Date Posted on WantToKnow.info | Importance


Revealed: how US and UK spy agencies defeat internet privacy and security
2013-09-05, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments. The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic "the use of ubiquitous encryption across the internet". Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and the most closely guarded secret of all collaboration with technology companies and internet service providers themselves. Through these covert partnerships, the agencies have inserted secret vulnerabilities known as backdoors or trapdoors into commercial encryption software. "Backdoors are fundamentally in conflict with good security," said Christopher Soghoian, principal technologist and senior policy analyst at the American Civil Liberties Union. "Backdoors expose all users of a backdoored system, not just intelligence agency targets, to heightened risk of data compromise."

Note: For an excellent article in the New York Times on this, click here. For a guide from the Guardian on "How to remain secure against NSA surveillance", click here.


Bush-Era NSA Whistleblower Makes Most Explosive Allegations Yet About Extent of Govt Surveillance and You Wont Believe Who He Says They Spied On
2013-06-20, The Blaze
http://www.theblaze.com/stories/2013/06/20/bush-era-nsa-whistleblower-makes-m...

Russ Tice, a former intelligence analyst and Bush-era NSA whistleblower, claimed Wednesday that the intelligence community has ordered surveillance on a wide range of groups and individuals, including high-ranking military officials, lawmakers and diplomats. They went after and I know this because I had my hands literally on the paperwork for these sort of things they went after high-ranking military officers. They went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees," [said] Tice. But they went after other ones, too. They went after lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House. Then Tice dropped the bombshell about Obama. "In summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois ... thats the president of the United States now. FBI whistleblower Sibel Edmonds and Tice agreed that such wide-ranging surveillance of officials could provide the intelligence agencies with unthinkable power to blackmail their opponents. I was worried that the intelligence community now has sway over what is going on, Tice said. Tice first blew the whistle on ... domestic spying across multiple agencies in 2005.

Note: Listen to Tice's shocking revelations in this interview. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and throughout intelligence agencies.


NSA surveillance played little role in foiling terror plots, experts say
2013-06-12, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/world/2013/jun/12/nsa-surveillance-data-terror-attack

Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA's vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks. The defence of the controversial data collection operations ... has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA's use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks. But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations. The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA's secret programmes were limited in their value as he was captured only after the event. Headley ... had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.

Note: For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.


Everything you need to know about the NSAs phone records scandal
2013-06-06, Washington Post
http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/06/everything-you-nee...

The Guardian [has] released a classified court order requiring Verizon to turn over records of all domestic phone calls to the National Security Agency. The revelation has led to a renewed debate over the legality and policy merits of indiscriminate government surveillance of Americans. The court order, issued by the secret Foreign Intelligence Surveillance court, only sought metadata a fancy word for information like what numbers you called, what time you made the calls, and how long the calls were. The order does not seek the audio of calls. Of course, its possible the NSA has other programs collecting the contents of calls. In 2006 a whistleblower reported the existence of a secret, NSA-controlled room in an AT&T switching facility in San Francisco. So its possible the NSA is using rooms like that to listen to everyones phone calls. But all we know for sure is that the NSA has been requesting information about our phone calls. We only have proof of spying on Verizon customers, but its hard to imagine the NSA limiting its surveillance program to one company. There are probably similar orders in effect for AT&T and CenturyLink, the other major telephone companies. The order includes hints that the NSA is also collecting information from cellular customers. In addition to phone numbers and call times, the order seeks information about the specific cell phone tower the customer used to connect to the network during each call. Cellphones make calls using the closest tower. So if the NSA knows you made a call using a specific tower, they can safely assume you were near that tower at the time of the call.

Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.


U.S. to let spy agencies scour Americans' finances
2013-03-13, Chicago Tribune/Reuters
http://articles.chicagotribune.com/2013-03-13/business/chi-us-to-let-spy-agen...

The Obama administration is drawing up plans to give all U.S. spy agencies full access to a massive database that contains financial data on American citizens and others who bank in the country, according to a Treasury Department document. The proposed plan represents a major step by U.S. intelligence agencies to spot and track down [targeted persons] by bringing together financial databanks, criminal records and military intelligence. Financial institutions that operate in the United States are required by law to file reports of "suspicious customer activity," such as large money transfers or unusually structured bank accounts, to Treasury's Financial Crimes Enforcement Network (FinCEN). The Federal Bureau of Investigation already has full access to the database. However, intelligence agencies, such as the Central Intelligence Agency and the National Security Agency, currently have to make case-by-case requests for information to FinCEN. The Treasury plan would give spy agencies the ability to analyze more raw financial data than they have ever had before. Financial institutions file more than 15 million "suspicious activity reports" every year, according to Treasury. Banks, for instance, are required to report all personal cash transactions exceeding $10,000.

Note: For deeply revealing reports from reliable major media sources on the games intelligence agencies play, click here.


Rented computers secretly photographed users having sex
2012-09-26, BBC News
http://www.bbc.co.uk/news/technology-19726954

Rented computers from seven different companies secretly took photographs of their users, US authorities have said. The companies used software made by US company Designerware which could track key strokes and other personal data. The software, called PC Rental Agent, captured people engaging in "intimate acts", including sex. It is believed that PC Rental Agent has been installed in approximately 420,000 computers worldwide. The Federal Trade Commission ruling concerned a feature in the software, called Detective Mode, which would typically become activated if the user was late in returning equipment, or failed to pay for use. Detective Mode would assist the rental store in locating the overdue computer in order to pursue its return. Part of the process involved a pop-up window designed to look like a software registration screen. It would request personal information such as email addresses and telephone numbers that could then be used to pursue the users for payment and/or the return of equipment. In addition, the FTC said the software had access to much more sensitive information, including: usernames and passwords for email accounts, social media websites, and financial institutions. Among the other data collected were social security numbers; medical records; private emails to doctors; bank and credit card statements. Webcam pictures of children, partially undressed individuals, and intimate activities at home were also found. In the FTC's formal complaint document, it said the software had captured "couples engaged in sexual activities".

Note: Do you think other companies or intelligence agencies might be conducting similar monitoring? For more on this, click here.


The new totalitarianism of surveillance technology
2012-08-15, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/2012/aug/15/new-totalitarianism-surve...

Last week, New York Mayor Michael Bloomberg joined NYPD Commissioner Ray Kelly to unveil a major new police surveillance infrastructure, developed by Microsoft. The Domain Awareness System links existing police databases with live video feeds, including cameras using vehicle license plate recognition software. No mention was made of whether the system plans to use or already uses facial recognition software. But, at present, there is no law to prevent US government and law enforcement agencies from building facial recognition databases. And we know from industry newsletters that the US military, law enforcement, and the department of homeland security are betting heavily on facial recognition technology. As PC World notes, Facebook itself is a market leader in the technology but military and security agencies are close behind. According to Homeland Security Newswire, billions of dollars are being invested in the development and manufacture of various biometric technologies capable of detecting and identifying anyone, anywhere in the world via iris-scanning systems, already in use; foot-scanning technology (really); voice pattern ID software, and so on. What is very obvious is that this technology will not be applied merely to people under arrest, or to people under surveillance in accordance with the fourth amendment. No, the "targets" here [include] everyone. In the name of "national security", the capacity is being built to identify, track and document any citizen constantly and continuously.

Note: For deeply revealing reports from reliable major media sources on civil liberties, click here.


Rothschild and Rockefeller families team up for some extra wealth creation
2012-05-30, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/finance/newsbysector/banksandfinance/9300784/Roths...

The Rothschild and Rockefeller families have teamed up to buy assets from banks and other distressed sellers in a union between two of the best-known names in financial history. RIT Capital Partners, which is chaired by Lord Rothschild, has taken a 37pc stake in Rockefeller Financial Services, the familys wealth advisory and asset management wing. It has snapped up the holding from French bank Socit Gnrale for less than 100m. The transatlantic alliance cements a five-decade acquaintance between the now ennobled Jacob Rothschild, 76, and David Rockefeller, 96, the grandson of the ruthlessly acquisitive American oilman and philanthropist John D Rockefeller. The two patricians now plan to capitalise on their family names to buy other asset managers or their portfolios, using their networks of top-notch contacts to ensure they get a seat at the table for any deal. The Rockefeller group goes back to 1882, set up to invest the family money made by John D Rockefellers Standard Oil, the forerunner for todays Exxon Corporation, which he built with a Darwinian aggression. Do you know the only thing that gives me pleasure? Its to see my dividends coming in, he once said. The Rothschild banking dynasty has its roots in the 18th century when Mayer Amschel Rothschild set up a business in Frankfurt. That sprang to fame in 1815 when it bought government bonds in anticipation of Napoleons defeat at Waterloo.

Note: Why is that these two hugely wealthy families get so little press coverage? Could it be that their wealth and influence exerts control over the major media? For more on secret societies which command huge hidden power, see the deeply revealing reports from reliable major media sources available here.


Rothschild loses libel case, and reveals secret world of money and politics
2012-02-11, The Independent (One of the UK's leading newspapers)
http://www.independent.co.uk/news/uk/home-news/rothschild-loses-libel-case-an...

Nathaniel Rothschild, scion of the banking dynasty and friend of seemingly everyone in the spheres of finance, business and politics, ... has lost his libel case against the Daily Mail, which he sued for "substantial damages" over its account of his and [Lord] Mandelson's extraordinary trip to Russia in January 2005. Mr Rothschild claimed he was subjected to "sustained and unjustified" attacks in the May 2010 article, which portrayed him as a "puppet master", dangling his friend Lord Mandelson in front of the Russian oligarch Oleg Deripaska to ease the passage of colossal business deals. It began on Mr Rothschild's private jet from the World Economic Forum in Davos to Moscow, where they met Mr Deripaska, the aluminium plant manager who became the richest oligarch of them all, and continued on Mr Deripaska's private jet to his chalet in Siberia. The judge rejected the notion that Mr Rothschild and Mr Mandelson had flown out as friends, not business associates, and said Mr Rothschild's behaviour had in part been "inappropriate". "That conduct foreseeably brought Lord Mandelson's public office and personal integrity into disrepute," the judge said. That leading politicians, bankers and businessmen associate with each other in fashions that blur the boundaries between work and pleasure is a secret too great to be maintained with any success, but it doesn't make the details, on the rare occasions they actually emerge, any more palatable.

Note: For lots more from major media sources on corporate and government corruption, click here and here.


Monitoring America
2010-12-20, Washington Post
http://projects.washingtonpost.com/top-secret-america/articles/monitoring-ame...

Nine years after the terrorist attacks of 2001, the United States is assembling a vast domestic intelligence apparatus to collect information about Americans, using the FBI, local police, state homeland security offices and military criminal investigators. The system, by far the largest and most technologically sophisticated in the nation's history, collects, stores and analyzes information about thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing. The months-long investigation [by The Washington Post], based on nearly 100 interviews and 1,000 documents, found that: * Technologies and techniques honed for use on the battlefields of Iraq and Afghanistan have migrated into the hands of law enforcement agencies in America. * The FBI is building a database with the names and certain personal information, such as employment history, of thousands of U.S. citizens and residents whom a local police officer or a fellow citizen believed to be acting suspiciously. * Law enforcement agencies have hired as trainers self-described experts whose extremist views on Islam and terrorism are considered inaccurate and counterproductive by the FBI and U.S. intelligence agencies. * The Department of Homeland Security sends its state and local partners intelligence reports with little meaningful guidance, and state reports have sometimes inappropriately reported on lawful meetings.

Note: This report is part of a series, "Top Secret America," by The Washington Post. For more, click here.


Gaza flotilla activists were shot in head at close range
2010-06-04, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/world/2010/jun/04/gaza-flotilla-activists-autopsy-r...

Israel was tonight under pressure to allow an independent inquiry into its assault on the Gaza aid flotilla after autopsy results on the bodies of those killed, obtained by the Guardian, revealed they were peppered with 9mm bullets, many fired at close range. Nine Turkish men on board the Mavi Marmara were shot a total of 30 times and five were killed by gunshot wounds to the head, according to the vice-chairman of the Turkish council of forensic medicine, [Yalcin Buyuk]. The results revealed that a 60-year-old man, Ibrahim Bilgen, was shot four times in the temple, chest, hip and back. A 19-year-old, named as Fulkan Dogan, who also has US citizenship, was shot five times from less that 45cm, in the face, in the back of the head, twice in the leg and once in the back. Two other men were shot four times, and five of the victims were shot either in the back of the head or in the back. The new information about the manner and intensity of the killings undermines Israel's insistence that its soldiers opened fire only in self defence and in response to attacks by the activists. "Given the very disturbing evidence which contradicts the line from the Israeli media and suggests that Israelis have been very selective in the way they have addressed this, there is now an overwhelming need for an international inquiry," said Andrew Slaughter MP, a member of the all party group on Britain and Palestine.


Head of IMF Proposes New Reserve Currency
2010-02-26, ABC News/Associated Press
http://abcnews.go.com/Business/wireStory?id=9958995

Dominique Strauss-Kahn, the head of the International Monetary Fund, suggested [that] the organization might one day be called on to provide countries with a global reserve currency that would serve as an alternative to the U.S. dollar. "That day has not yet come, but I think it is intellectually healthy to explore these kinds of ideas now," he said in a speech on the future mandate of the 186-nation Washington-based lending organization. Strauss-Kahn said such an asset could be similar to but distinctly different from the IMF's special drawing rights, or SDRs, the accounting unit that countries use to hold funds within the IMF. It is based on a basket of major currencies. He said having other alternatives to the dollar "would limit the extent to which the international monetary system as a whole depends on the policies and conditions of a single, albeit dominant, country." Several countries, including China and Russia, have called for an alternative to the dollar as a reserve currency.

Note: For a treasure trove of reports from reliable sources on the hidden realities behind the world financial and economic crisis, click here.


Who's in Big Brother's Database?
2009-11-05, New York Review of Books
http://www.nybooks.com/articles/23231

On a remote edge of Utah's dry and arid high desert ... hard-hatted construction workers with top-secret clearances are preparing to build [a] mammoth $2 billion structure. It's being built by the ultra-secret National Security Agency ... to house trillions of phone calls, e-mail messages, and [electronic data trails of all kinds]. The NSA is also completing work on another data archive, this one in San Antonio, Texas, which will be nearly the size of the Alamodome. Just how much information will be stored in these windowless cybertemples? A recent report prepared by the MITRE Corporation, a Pentagon think tank, [states] "Sensor data volume could potentially increase to the level of Yottabytes [10-to-the-24th-power bytes] by 2015." Once vacuumed up and stored in these near-infinite "libraries," the data are then analyzed by powerful infoweapons, supercomputers running complex algorithmic programs, to determine who among us may be or may one day become a terrorist. Emerging [after 9/11] as the most powerful chief the spy world has ever known was the director of the NSA. He is in charge of an organization three times the size of the CIA and empowered in 2008 by Congress to spy on Americans to an unprecedented degree. These new centers in Utah, Texas, and possibly elsewhere will likely become the centralized repositories for the data intercepted by the NSA in America's version of the "big brother database."

Note: James Bamford, the author of this review of a new book on the history of the NSA, has himself written three important books on the agency. For many revealing reports from reliable sources on the developing capacity by government and corporate surveillance to construct a "Big Brother" states, click here.


Control of Cybersecurity Becomes Divisive Issue
2009-04-17, New York Times
http://www.nytimes.com/2009/04/17/us/politics/17cyber.html?partner=rss&emc=rs...

The National Security Agency has been campaigning to lead the governments rapidly growing cybersecurity programs, raising privacy and civil liberties concerns among some officials who fear that the move could give the spy agency too much control over government computer networks. The security agencys interest in taking over the dominant role has met resistance, including the resignation of the Homeland Security Department official who was until last month in charge of coordinating cybersecurity efforts throughout the government. Rod Beckstrom, who resigned in March as director of the National Cyber Security Center at the Homeland Security Department, said ... that he feared that the N.S.A.s push for a greater role in guarding the governments computer systems could give it the power to collect and analyze every e-mail message, text message and Google search conducted by every employee in every federal agency. Mr. Beckstrom said he believed that an intelligence service that is supposed to focus on foreign targets should not be given so much control over the flow of information within the United States government. To detect threats against the computer infrastructure including hackers, viruses and intrusions by foreign agents and terrorists cybersecurity guardians must have virtually unlimited access to networks. Mr. Beckstrom argues that those responsibilities should be divided among agencies. I have very serious concerns about the concentration of too much power in one agency, he said. Power over information is so important, and it is so difficult to monitor, that we need to have checks and balances.

Note: For further disturbing reports from reliable sources on government efforts to establish total surveillance systems, click here.


Apocalypse now? 30 days when the world didn't end
2008-09-09, Times of London (One of the U.K.'s leading newspapers)
http://www.timesonline.co.uk/tol/comment/faith/article4717864.ece

The beginning of the first serious experiments using CERNs Large Hadron Collider this week has given rise to a welter of fanciful scare stories about the obliteration of the Earth by a pocket black hole or a cascade reaction of exotic particles. Similar predictions have been made around the launch of several other particle physics experiments and even the first atomic weapons tests. Predictions of the worlds end are nothing new though. Weve picked out 30 of the most memorable apocalypses that never, for one reason or another, quite happened. 1: 2,800BC: The oldest surviving prediction of the worlds imminent demise was found inscribed upon an Assyrian clay tablet which stated: "Our earth is degenerate in these latter days. There are signs that the world is speedily coming to an end. Bribery and corruption are common." 4: Mar 25, 970 AD. The Lotharingian computists believed they had found evidence in the Bible that a conjunction of certain feast days prefigured the end times. They were just one of a wide scattering of millennial cults springing up in advance of that first Millennium. The millennial panic endured for at least 30 years after the fateful date had come and gone, with some adjustment made to allow 1,000 years after the crucifixion, rather than the nativity. 8: 1648: Having made close study of the kabbalah, theTurkish rabbi Sabbatai Zevi predicted that the Messiah would make a miraculous return in 1648, and that his name would be Sabbatai Zevi. 9: 1666: A year packed with apocalyptic portent. With a date containing the figures commonly accepted as the biblical Number of the Beast and following a protracted period of plague in England, it was little surprise that many should believe the Great Fire of London to be a herald of the Last Days.


Civil liberties group criticizes new FBI authority
2008-07-02, Boston Globe/Associated Press
http://www.boston.com/news/nation/washington/articles/2008/07/02/civil_libert...

Nearly 40 years ago, the FBI was roundly criticized for investigating Americans without evidence [that] they had broken any laws. Now, critics fear the FBI may be gearing up to do it again. Tentative Justice Department guidelines, to be released later this summer, would let agents investigate people whose backgrounds -- and potentially their race or ethnicity -- match the traits of terrorists. Such profiling ... echoes the FBI's now-defunct COINTELPRO, an operation under Director J. Edgar Hoover in the 1950s and 1960s to monitor and disrupt groups with communist and socialist ties. Before it was shut down in 1971, the domestic spying operation -- formally known as Counterintelligence Programs -- had expanded to include civil rights groups, anti-war activists, ... state legislators and journalists. Among the FBI's targets were Martin Luther King Jr., Malcolm X, and John Lennon, along with members of black [political] groups ... and student protesters. The new proposal to allow investigations of Americans with no evidence of wrongdoing is "COINTELPRO for the 21st century," said Barry Steinhardt of the American Civil Liberties Union. "But this is much more insidious because it could involve more people. In the days of COINTELPRO, they were watching only a few people. Now they could be watching everyone."

Note: For many disturbing reports on threats to civil liberties, click here.


Rule by fear or rule by law?
2008-02-04, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2008/02/04/ED5OUPQJ7.DTL

Since 9/11, and seemingly without the notice of most Americans, the federal government has assumed the authority to institute martial law, arrest a wide swath of dissidents (citizen and noncitizen alike), and detain people without legal or constitutional recourse in the event of "an emergency influx of immigrants in the U.S., or to support the rapid development of new programs." Beginning in 1999, the government has entered into a series of single-bid contracts with Halliburton subsidiary Kellogg, Brown and Root (KBR) to build detention camps at undisclosed locations within the United States. The government has also contracted with several companies to build thousands of railcars, some reportedly equipped with shackles, ostensibly to transport detainees. According to diplomat and author Peter Dale Scott, the KBR contract is part of a Homeland Security plan titled ENDGAME, which sets as its goal the removal of "all removable aliens" and "potential terrorists." What kind of "new programs" require the construction and refurbishment of detention facilities in nearly every state of the union with the capacity to house perhaps millions of people? The 2007 National Defense Authorization Act (NDAA) ... gives the executive the power to invoke martial law. The Military Commissions Act of 2006 ... allows for the indefinite imprisonment of anyone who ... speaks out against the government's policies. The law calls for secret trials for citizens and noncitizens alike. What could the government be contemplating that leads it to make contingency plans to detain without recourse millions of its own citizens?

Note: This important warning from former U.S. Congressman Dan Hamburg and Lewis Seiler should be read in its entirety. For more chilling reports on serious threats to our civil liberties, click here.


Judges OK warrantless monitoring of Web use
2007-07-07, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2007/07/07/BAGMNQSJDA1.DTL

Federal agents do not need a search warrant to monitor a suspect's computer use and determine the e-mail addresses and Web pages the suspect is contacting, a federal appeals court ruled Friday. In a drug case from San Diego County, the Ninth U.S. Circuit Court of Appeals in San Francisco likened computer surveillance to the "pen register" devices that officers use to pinpoint the phone numbers a suspect dials, without listening to the phone calls themselves. In Friday's ruling, the court said computer users should know that they lose privacy protections with e-mail and Web site addresses when they are communicated to the company whose equipment carries the messages. The search is no more intrusive than officers' examination of a list of phone numbers or the outside of a mailed package, neither of which requires a warrant, Judge Raymond Fisher said in the 3-0 ruling. Defense lawyer Michael Crowley disagreed. His client, Dennis Alba, was sentenced to 30 years in prison after being convicted of operating a laboratory in Escondido that manufactured the drug ecstasy. Some of the evidence against Alba came from agents' tracking of his computer use. The court upheld his conviction and sentence. Expert evidence in Alba's case showed that the Web addresses obtained by federal agents included page numbers that allowed the agents to determine what someone read online, Crowley said. The ruling "further erodes our privacy," the attorney said. "The great political marketplace of ideas is the Internet, and the government has unbridled access to it."

Note: So now every email you send and read can be monitored legally. Why didn't this make news headlines?


Pentagon restricting testimony in Congress
2007-05-10, Boston Globe
http://www.boston.com/news/nation/washington/articles/2007/05/10/pentagon_res...

The Pentagon has placed unprecedented restrictions on who can testify before Congress, reserving the right to bar lower-ranking officers, enlisted soldiers, and career bureaucrats from appearing before oversight committees or having their remarks transcribed. The guidelines, described in an April 19 memo to the staff director of the House Armed Services Committee, adds that all field-level officers and enlisted personnel must be "deemed appropriate" by the Department of Defense before they can participate in personal briefings for members of Congress or their staffs. In addition, according to the memo, the proceedings must not be recorded. Any officers who are allowed to testify must be accompanied by an official from the administration. Veterans of the legislative process -- who say they have never heard of such guidelines before -- maintain that the Pentagon has no authority to set such ground rules. A Pentagon spokesman confirmed that the guidelines are new. The memo has fueled complaints that the Bush administration is trying to restrict access to information about the war in Iraq. [A] special House oversight panel, according to aides, has written at least 10 letters to the Pentagon since February seeking information and has received only one official reply. Nor has the Pentagon fully complied with repeated requests for all the monthly assessments of Iraqi security forces.

Note: When the military begins to control the legislative, democracy begins to shift towards dictatorship. And for reliable information how the Pentagon cannot account for hundreds of billions of dollars, click here.


A monstrous war crime
2007-03-28, The Guardian (One of the U.K.'s leading newspapers)
http://www.guardian.co.uk/Iraq/Story/0,,2044345,00.html

Our collective failure has been to take our political leaders at their word. This week the BBC reported that the government's own scientists advised ministers that the Johns Hopkins study on Iraq civilian mortality was accurate and reliable. Published in the Lancet ...it estimated that 650,000 Iraqi civilians had died since the American and British led invasion in March 2003. Immediately after publication, the prime minister's official spokesman said that the Lancet's study "was not one we believe to be anywhere near accurate". The foreign secretary ... said that the Lancet figures were "extrapolated" and a "leap". President Bush said: "I don't consider it a credible report". Scientists at the UK's Department for International Development thought differently. They concluded that the study's methods were "tried and tested". Indeed, the Johns Hopkins approach would likely lead to an "underestimation of mortality". The Ministry of Defence's chief scientific adviser ... recommended "caution in publicly criticising the study". When these recommendations went to the prime minister's advisers, they were horrified. Tony Blair was advised to say: "The overriding message is that there are no accurate or reliable figures of deaths in Iraq". At a time when we are celebrating our enlightened abolition of slavery 200 years ago, we are continuing to commit one of the worst international abuses of human rights of the past half-century. Two hundred years from now, the Iraq war will be mourned as the moment when Britain violated its delicate democratic constitution and joined the ranks of nations that use extreme pre-emptive killing as a tactic of foreign policy.

Note: This article is written by Richard Horton, the editor of the highly esteemed British medical journal Lancet.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.