Big Brother News Stories
Below are key excerpts of revealing news articles on Big Brother from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
A handful of military personnel from the 4th Psychological Operations Group, based at Fort Bragg, NC, have until recently been working in CNN's headquarters in Atlanta. [A] Dutch journalist named Abe de Vries came up with this important story ... and remains properly astounded that no mainstream news medium in the US has evinced any interest in it. De Vries ... originally [came] upon the story [following] a military symposium in Arlington, VA that discussed the use of the press in military operations. De Vries saw a good story, picked up the phone, and finally reached Maj. Thomas Collins of the US Army Information Service, who duly confirmed the presence of these Army psy-ops experts at CNN. "Psy-ops personnel, soldiers, and officers," De Vries quoted Collins as telling him, "have been working in CNN's headquarters ... through our program, training with industry. They helped in the production of news." Eason Jordan, who identified himself as CNN's president of news-gathering and international networks, [confirmed] that CNN had hosted a total of five interns from US Army psy-ops. Jordan said the program began ... just before the end of the war against Serbia and only recently terminated. Executives at CNN now describe the Army psy-ops intern tours at CNN as having been insignificant. The commanding officer of the psy-ops group certainly thought them of sufficient significance to mention at that high-level Pentagon powwow in Arlington about propaganda and psychological warfare.
Note: This article strangely has been removed from the Los Angeles Times archives. The link above shows a scanned image of the actual newspaper. The article was first published in the San Jose Mercury News on March 23, 2000, though the article is also strangely not available in their archives. U.S. Congressional testimony in the 1970s revealed that the CIA paid employees of major media networks to influence public opinion. The CIA's Operation Mockingbird revealed blatant efforts by the CIA to manipulate public opinion in the U.S., thus violating its charter.
Approximately half of adult Americans photographs are stored in facial recognition databases that can be accessed by the FBI, without their knowledge or consent, in the hunt for suspected criminals. About 80% of photos in the FBIs network are non-criminal entries, including pictures from drivers licenses and passports. The algorithms used to identify matches are inaccurate about 15% of the time, and are more likely to misidentify black people than white people. These are just some of the damning facts presented at last weeks House oversight committee hearing, where politicians and privacy campaigners criticized the FBI and called for stricter regulation of facial recognition technology at a time when it is creeping into law enforcement and business. The FBI first launched its advanced biometric database ... in 2010, augmenting the old fingerprint database with further capabilities including facial recognition. The bureau did not inform the public ... nor did it publish a privacy impact assessment, required by law, for five years. The FBI made arrangements with 18 different states to gain access to their databases of drivers license photos. Last year, the US government accountability office (GAO) analyzed the FBIs use of facial recognition technology and found it to be lacking in accountability, accuracy and oversight. It doesnt know how often the system incorrectly identifies the wrong subject, explained the GAOs Diana Maurer. Innocent people could bear the burden of being falsely accused.
WikiLeaks dump of messages to and from Clintons campaign chief offer an unprecedented view into the workings of the elite, and how it looks after itself. The emails [are] being slowly released ... from the hacked account of Hillary Clintons campaign chair John Podesta. Their significance goes far beyond mere scandal: they ... furnish us with an opportunity to observe the upper reaches of the American status hierarchy. In one now-famous email chain, for example, the reader can watch current US trade representative Michael Froman, writing from a Citibank email address in 2008, appear to name President Obamas cabinet even before the great hope-and-change election was decided. This genre of Podesta email, in which people try to arrange jobs for themselves or their kids, points us toward the most fundamental thing we know about the people at the top of this class: their loyalty to one another and the way it overrides everything else. Of course Hillary Clinton staffed her state department with investment bankers and then did speaking engagements for investment banks as soon as she was done at the state department. Of course she appears to think that any kind of bank reform should come from the industry itself. And of course no elite bankers were ever prosecuted by the Obama administration. Read these emails and you understand, with a start, that the people at the top tier of American life all know each other. They are all engaged in promoting one anothers careers, constantly.
Note: For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
The [FDA] amassed a stockpile of pistols, shotguns, and semiautomatic rifles, along with ample supplies of ammunition, liquid explosives, gun scopes, and suppressors. Between 2006 and 2014, [the Animal and Plant Health Inspection Service, an agency of the USDA] spent nearly $4.8 million to arm itself. And far from being an outlier, it is one of dozens of federal agencies that spends lavishly on guns, ammunition, and military-style equipment. A report issued this month by American Transparency ... chronicles the explosive - and expensive - trend toward militarizing federal agencies, most of which have no military responsibilities. Between 2006 and 2014, the report shows, 67 federal bureaus, departments, offices, and services spent at least $1.48 billion on ammunition and material one might expect to find in the hands of SWAT teams, Special Forces soldiers - or terrorists. The Internal Revenue Service, for example, now spends more than $1 million annually on firearms, ammunition, and military gear. Since 2006, the Department of Veterans Affairs ... has poured nearly $11.7 million into guns and ammo. Even the Smithsonian Institution and the Social Security Administration have each devoted hundreds of thousands of dollars to weaponry. There are now fewer US Marines than there are officers at federal administrative agencies with the authority to carry weapons and make arrests.
Note: The Washington Post in 2009 reported that military influence over US civilian authorities was quietly increasing, and the militarization of US police has been well-documented. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the erosion of civil liberties.
Senior CIA officials have for years intentionally deceived parts of the agency workforce by transmitting internal memos that contain false information. The practice is known by the term eyewash. Officials said there is no clear mechanism for labeling eyewash cables or distinguishing them from legitimate records being examined by the CIAs inspector general, turned over to Congress or declassified for historians. Senate investigators uncovered apparent cases of eyewashing as part of a multi-year probe of the CIAs interrogation program, according to officials who said that the Senate Intelligence Committee found glaring inconsistencies in CIA communications about classified operations, including drone strikes. Former CIA officials ... acknowledged that the internal mechanisms for managing eyewash cables were largely informal. Skeptics described the safeguards as inadequate. When you introduce falsehoods into the communications stream then you can destabilize the whole system of intelligence oversight and compliance with the law, said Steven Aftergood, a government secrecy expert at the Federation of American Scientists. It wasnt that long ago that we had a CIA executive director who was engaged in criminal activity - you dont want someone like him preparing eyewash cables, Aftergood said, referring to Kyle Dusty Foggo, the former No. 3 executive at the agency.
Note: Read more about the strange case of Kyle "Dusty" Foggo, the CIA executive convicted of fraud in connection with secret CIA prisons. For more along these lines, see concise summaries of deeply revealing Intelligence agency corruption news articles from reliable major media sources.
The Brothers is a riveting chronicle of government-sanctioned murder, casual elimination of inconvenient regimes, relentless prioritization of American corporate interests and cynical arrogance on the part of two men. John Foster Dulles and his brother, Allen, were ... lawyers, partners in the immensely powerful firm of Sullivan & Cromwell. John Foster Dulles served as secretary of state from 1953 to 1959; his brother ran the C.I.A. from 1953 to 1961. In his detailed, wellconstructed and highly readable book, Stephen Kinzer ... shows how the brothers drove Americas interventionist foreign policy. Kinzer highlights John Foster Dulless central role in channeling funds from the United States to Nazi Germany in the 1930s. Sullivan & Cromwell floated bonds for Krupp A. G., the arms manufacturer, and also worked for I. G. Farben, the chemicals conglomerate that later manufactured Zyklon B, the gas used to murder millions of Jews. For the Dulles brothers, and for much of the American government, threats to corporate interests were categorized as support for communism. There are also reminders in Kinzers book of dark events in the history of American intelligence. Sixty years ago, Frank Olson, a C.I.A. officer, was reported to have jumped to his death during mind-control experiments in which psychoactive drugs were administered to unknowing victims. But last year, Kinzer reports, Olsons family filed suit, claiming he had actually been murdered after visiting secret C.I.A. prisons in Europe.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
In March I received a call from the White House counsels office regarding a speech I had prepared for my boss at the State Department. The speech was about the impact ... of National Security Agency surveillance practices. The draft stated that if U.S. citizens disagree with congressional and executive branch determinations about the proper scope of signals intelligence activities, they have the opportunity to change the policy through our democratic process. But the White House counsels office told me that no, that wasnt true. I was instructed to amend the line. Some intelligence practices remain so secret, even from members of Congress, that there is no opportunity for our democracy to change them. Public debate about the bulk collection of U.S. citizens data by the NSA has focused largely on Section 215 of the Patriot Act. Based in part on classified facts that I am prohibited by law from publishing, I believe that Americans should be even more concerned about the collection and storage of their communications under Executive Order 12333 than under Section 215. Unlike Section 215, the executive order authorizes collection of the content of communications, not just metadata, even for U.S. persons. It does not require that the affected U.S. persons be suspected of wrongdoing and places no limits on the volume of communications by U.S. persons that may be collected and retained. None of the reforms that Obama announced earlier this year will affect such collection.
Note: The above was written by John Napier Tye, former section chief for Internet freedom in the State Departments Bureau of Democracy, Human Rights and Labor. A 2014 Washington Post investigation sheds more light on the NSA's legally dubious domestic mass surveillance program. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The tools European security agencies now have at their disposal ... would make any American or Canadian intelligence officer drool. Britain has literally created a surveillance state. The British Security Industry Authority estimated three years ago the government has installed about six million closed-circuit TV cameras in the public square; one for every 10 citizens. The French, too, have vastly expanded public video surveillance in recent years. And it's all been done with overwhelming support from the general public, which feels safer for the presence of the surveillance, never mind the lack of objective proof that they are more protected against outrages, which keep on occurring. Both England and France are former colonial powers that ... long ago subordinated individual rights to collective security. Canada and America more dearly cherish individual rights. Still, a surveillance state is growing here, too. David Lyon, a professor of surveillance studies at Queen's University, has identified several public surveillance trends, all of which he says are "increasing at an accelerating rate." Canada is not about to become Western Europe, he says, but "it is incumbent upon us as a society to think about the ethical consequences" of mass surveillance. [Some] would argue that the cameras are desperately needed tools, and that anyone who isn't doing anything wrong has nothing to worry about. That of course is the police state justification. They hate us because we are free, we are told. The fact that we've responded by giving up ever more freedom doesn't seem to matter.
Note: Many of the politicians publicly defending the surveillance state receive huge sums of money from private security companies. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
Russ Tice, a former intelligence analyst and Bush-era NSA whistleblower, claimed Wednesday that the intelligence community has ordered surveillance on a wide range of groups and individuals, including high-ranking military officials, lawmakers and diplomats. They went after and I know this because I had my hands literally on the paperwork for these sort of things they went after high-ranking military officers. They went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees," [said] Tice. But they went after other ones, too. They went after lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House. Then Tice dropped the bombshell about Obama. "In summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois ... thats the president of the United States now. FBI whistleblower Sibel Edmonds and Tice agreed that such wide-ranging surveillance of officials could provide the intelligence agencies with unthinkable power to blackmail their opponents. I was worried that the intelligence community now has sway over what is going on, Tice said. Tice first blew the whistle on ... domestic spying across multiple agencies in 2005.
Note: Listen to Tice's shocking revelations in this interview. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and throughout intelligence agencies.
Some of President Reagans top advisers have operated a virtual parallel government outside the traditional Cabinet departments and agencies almost from the day Reagan took office, congressional investigators and administration officials have concluded. Investigators believe that the advisers activities extended well beyond the secret arms sales to Iran and aid to the contras now under investigation. Lt. Col. Oliver North, for example, helped draw up a controversial plan to suspend the Constitution in the event of a national crisis, such as nuclear war, violent and widespread internal dissent or national opposition to a U.S. military invasion abroad. The advisers conducted their activities through secret contacts throughout the government with persons who acted at their direction but did not officially report to them. The activities of those contacts were coordinated by the National Security Council, the officials and investigators said. There appears to have been no formal directive for the advisers activities, which knowledgeable sources described as a parallel government. In a secret assessment of the activities, the lead counsel for the Senate Iran-contra committee called it a secret government-within-a-government. The arrangement permitted Reagan administration officials to claim that they were not involved in controversial or illegal activities, the officials said. It was the ultimate plausible deniability, said a well-briefed official who has served the Reagan administration since 1982 and who often collaborated on covert assistance to the Nicaraguan contras.
Note: See a downloaded copy of this article and the amazing full text. A recent Boston Globe article suggests that US national security policy continues to be made by concealed, unaccountable institutions within a corrupt government.
Jade Helm 15, the controversial Special Operations exercise that spawned a wave of conspiracy theories about a government takeover, will open next week without any media allowed to observe it, a military spokesman said. Embedded reporters wont be permitted at any point during the exercise, in which military officials say that secretive Special Operations troops will maneuver through private and publicly owned land in several southern states. The exercise is scheduled for July 15 through September 15 and is expected to include more than 1,200 troops. Army Special Operations Command announced the exercise in March, saying its size and scope would set it apart from most training exercises. For months, some protesters have said Jade Helm is setting the stage for future martial law. Texas Gov. Greg Abbott, a Republican, called in April for the Texas State Guard to monitor the exercise [to] improve communication between Special Operations forces and civilians in Texas. The Washington Post has several times requested access to observe the exercise, making the case to the military that first-hand media coverage would help explain the mission. [Army spokesman Lt. Col. Mark] Lastoria said it is not possible to allow a journalist to travel with Special Operations forces in the field. The military has granted access to Special Operations in the past, however. In one recent example, a journalist observed the exercise Robin Sage in North Carolina.
Note: See interesting information on Jade Helm 15 based on government documents concluding that it is largely an artificial intelligence operation.
Elite service members from four branches of the U.S. military will launch an operation this summer in which they will operate covertly among the U.S. public and travel from state to state in military aircraft. Texas, Utah and a section of southern California are labelled as hostile territory, and New Mexico isnt much friendlier. Thats the scheme for Jade Helm 15, a new Special Operations exercise that runs from July 15 to Sept. 15. Army Special Operations Command announced it last week, saying the size and scope of the mission sets it apart from many other training exercises. The exercise has prompted widespread conspiracy theories that the United States is preparing to hatch martial law. In particular, some have expressed alarm about this map, which outlines events for the exercise in unclassified documents posted online last week. The Washington Post verified them to be legitimate by speaking to Army sources. They appear to have been prepared for local authorities. Its also worth noting that the military has routinely launched exercises in the past in which regions of the United States are identified as hostile for the purpose of training.
Note: This Washington Post article is clearly playing down some important facts and developments. Why is the US military spending so much time and money preparing for scenarios where US soil and citizens are considered enemies? Read and educate yourself with this excellent article on Operation Jade Helm 15, one in a string of US exercises planning for mass civilian arrests under a variety of scenarios.
Olympic National Park and Olympic National Forest in Washington State are ... where the US Navy aims to conduct its Northwest Electromagnetic Radiation Warfare training program. It will fly ... 2,900 training exercises over wilderness, communities and cities across the Olympic Peninsula for 260 days per year, with exercises lasting up to 16 hours per day. No public notices for the Navy's plans were published in any media that directly serve the Olympic Peninsula. But word spread. Public outcry forced the Navy to extend the public comment period until November 28 and schedule more public meetings. According to the US Navy's Information Dominance Roadmap 2013-2028, the Navy states it "will require new capabilities to fully employ integrated information in warfare by expanding the use of advanced electronic warfare." The purpose of these war games is to train to deny the enemy "all possible frequencies of electromagnetic radiation (i.e. electromagnetic energy) for use in such applications as communication systems..." David King, the mayor of Port Townsend, a town on the Northeast corner of the Olympic Peninsula, has voiced his opposition to the plan, along with numerous other public officials. Mike Welding, the Naval Air Station at Whidbey Island spokesman, recently admitted to reporters, "If someone is in the exclusion area for more than 15 minutes, that's a ballpark estimate for when there would be some concern for potential to injure, to receive burns."
Note: We don't generally use truth-out.org as a reliable source, but as no major media are covering this most important development, we're including this article here. To verify this information, please click on some of the links in the article and see the U.S. Navy's "Information Dominance Roadmap".
In June 2011, (WikiLeaks founder) Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt. The stated reason for the visit was a book. Schmidt was penning a treatise with Jared Cohen, the director of Google Ideas. Cohen had moved to Google from the U.S. State Department. Schmidt arrived first, accompanied by his then partner, Lisa Shields ... a vice president of the Council on Foreign Relations. Two months later, WikiLeaks release of State Department cables was coming to an abrupt end. Two years later, in the wake of his early 2013 visits to China, North Korea and Burma, it would come to be appreciated that the chairman of Google might be conducting, in one way or another, back-channel diplomacy for Washington. In 1999 ... Schmidt joined the New America Foundation. The foundation and its 100 staff serve as an influence mill, using its network of approved national security, foreign policy and technology pundits to place hundreds of articles and op-eds per year. In 2003, the U.S. National Security Agency (NSA) had already started systematically violating the Foreign Intelligence Surveillance Act (FISA). During the same period, Google ... was accepting NSA money to the tune of $2 million to provide the agency with search tools. In 2012, Google arrived on the list of top-spending Washington, D.C., lobbyists. Whether it is being just a company or more than just a company, Googles geopolitical aspirations are firmly enmeshed within the foreign-policy agenda of the worlds largest superpower.
Note: Read the complete Newsweek article summarized above for Julian Assange's detailed accounting of the connections between Washington D.C. insiders, Google and related technology companies, intelligence agencies, and civil society organizations. For more about Wikileaks, read this news article summary. For more on the geopolitical big picture, see these concise summaries of deeply revealing news articles from reliable major media sources.
Nigeria's president has formally launched a national electronic identity card, which all Nigerians will have to have by 2019 if they want to vote ... the first biometric card which can also be used to make electronic payments. MasterCard is providing the prepaid payment element and it hopes millions of Nigerians without bank accounts will now gain access to financial services. An attempt to introduce national ID cards in Nigeria 10 years ago failed. Analysts blame corruption for its failure. MasterCard said combining an identity card with a payment card for those aged 16 and over was a significant move. "It breaks down one of the most significant barriers to financial inclusion - proof of identity," MasterCard's Daniel Monehin said in a statement. The new cards show a person's photograph, name, age and unique ID number - and 10 fingerprints and an iris are scanned during enrolment. These details are intended to ensure that there are no duplicates on the system. During the pilot phase, which began registering names last October, 13 million MasterCard-branded ID cards will be issued. There are enrolment centres in all 36 states and there is no fee to get the card, though people will be charged in the event that it needs to be replaced. The Nigerian Identity Management Commission (NIMC), which is behind the rollout, is trying to integrate several government databases including those for driving licences, voter registration, health insurance, taxes and pensions.
Note: This identification scheme is underwritten by a major financial services company, and directly connects a citizen's political identity, financial identity, and biological identity to a centralized electronic database. To understand some of the dangers of this, see concise summaries of deeply revealing microchip implant news articles from reliable major media sources.
My biggest battle with the NSA came before my book [The Puzzle Palace] was even published. I had obtained the criminal file that the Justice Department had opened on the NSA. Marked as Top Secret, the file was so sensitive that only two original copies existed. Never before or since has an entire agency been the subject of a criminal investigation. Senior officials at the NSA were even read their Miranda rights. Issued on June 6, 1975, the report noted that both the NSA and CIA had engaged in questionable and possibly illegal electronic surveillance. As a result, Attorney General Edward Levi established a secret internal task force to look into the potential for criminal prosecution. Focusing particularly on NSA, the task force probed more deeply into domestic eavesdropping than any part of the executive branch had ever done before. The reports prosecutive summary also pointed to the NSAs top-secret charter issued by the Executive Branch, which exempts the agency from legal restraints placed on the rest of the government. This ... meant the NSA did not have to follow any restrictions placed on electronic surveillance unless it was expressly directed to do so. In short, the report asked, how can you prosecute an agency that is above the law? More than three decades later, the NSA, like a mom-and-pop operation that has exploded into a global industry, now employs sweeping powers of surveillance that Frank Church could scarcely have imagined in the days of wired phones and clunky typewriters. At the same time, the Senate intelligence committee he once chaired has done an about face, protecting the agencies from the public rather than the public from the agencies. Without adequate oversight, or penalties for abuse, the only protection that citizens have comes not from Congress or the courts, but from whistleblowers.
Note: James Bamford is the courageous ABC producer and investigative reporter who first exposed the declassified Operation Northwoods files in the May of 2001. These files showed beyond a shadow of a doubt that the top Pentagon generals were willing to carry out false flag terrorism activities which would kill innocent civilians in order to foment war fever against Cuba. Yet only ABC News out of all the major media outlets was willing to report this most shocking news. Don't miss the entire, highly revealing article by Bamford at the link above.
Any doubts about whether Endless War ... is official American doctrine should be permanently erased by this weeks comments from two leading Democrats, both former top national security officials in the Obama administration. Leon Panetta, the long-time Democratic Party operative who served as Obamas Defense Secretary and CIA Director, said this week of Obamas new bombing campaign: I think were looking at kind of a 30-year war. He criticized Obama ... for being insufficiently militaristic. Then we have Hillary Clinton [who] at an event in Ottawa yesterday ... proclaimed that the fight against these militants will be a long-term struggle that should entail an information war as well as an air war. The new war, she said, is essential and the U.S. shies away from fighting it at our peril. Like Panetta (and most establishment Republicans), Clinton made clear ... that virtually all of her disagreements with Obamas foreign policy were the by-product of her view of Obama as insufficiently hawkish, militaristic and confrontational. Endless War is not dramatic rhetorical license but a precise description of Americas foreign policy. Its not hard to see why. A state of endless war justifies ever-increasing state power and secrecy and a further erosion of rights. It also entails a massive transfer of public wealth to the homeland security and weapons industry (which the US media deceptively calls the defense sector). The War on Terror ... was designed from the start to be endless. This war ... thus enables an endless supply of power and profit to flow to those political and economic factions that control the government regardless of election outcomes.
Note: Read the prophetic writings of one of the most highly decorated US generals ever describing how he discovered after retirement that war is created by bankers and mega-corporations to funnel ever more tax-payer money into their coffers. For more along these lines, see the excellent, reliable resources provided in our War Information Center.
For decades in art circles it was either a rumour or a joke, but now it is confirmed as a fact. The Central Intelligence Agency used American modern art - including the works of such artists as Jackson Pollock, Robert Motherwell, Willem de Kooning and Mark Rothko - as a weapon in the Cold War. The CIA fostered and promoted American Abstract Expressionist painting around the world for more than 20 years. This was a period, in the 1950s and 1960s, when the great majority of Americans disliked or even despised modern art. Why did the CIA support them? Because in the propaganda war with the Soviet Union, this new artistic movement could be held up as proof of the creativity, the intellectual freedom, and the cultural power of the US. Russian art, strapped into the communist ideological straitjacket, could not compete. The existence of this policy, rumoured and disputed for many years, has now been confirmed for the first time by former CIA officials. The decision to include culture and art in the US Cold War arsenal was taken as soon as the CIA was founded in 1947. Dismayed at the appeal communism still had for many intellectuals and artists in the West, the new agency set up a division, the Propaganda Assets Inventory, which at its peak could influence more than 800 newspapers, magazines and public information organisations. They joked that it was like a Wurlitzer jukebox: when the CIA pushed a button it could hear whatever tune it wanted playing across the world. Unknown to the artists, the new American art was secretly promoted under a policy known as the "long leash." [This] centrepiece of the CIA campaign ... a vast jamboree of intellectuals, writers, historians, poets, and artists ... was set up with CIA funds in 1950 and run by a CIA agent. At its height, it had offices in 35 countries and published more than two dozen magazines.
Note: Read the entire article at the link above to learn how the CIA secretly funnels money through cooperative millionaires. To this day, the CIA has agents in key press positions to stop stories they don't want or to promote their own pieces widely in the media. For more along these lines, see concise summaries of deeply revealing media corruption news articles and intelligence agency news articles, all from reliable major media sources.
Australia has changed radically since last week though it might not look like it on the surface. Late Thursday night the Senate passed the National Security Amendment Bill (No.1) 2014 giving unlimited power to spies and secret police. Now officials can break the law with immunity from prosecution - and without having to answer to a court. They can act in total secrecy. They will decide what they do and to whom and when. They do not have to ask permission. They will choose when to interfere in your life and when they won't. They can dip into your most private communications and they don't need a warrant to do so. Sometimes they will do it because it is necessary to fight crime. Sometimes because they enjoy it. If they mess up your life and you tell anybody, you will get 10 years' jail even if it doesn't harm security. When a Special Intelligence Operation (SIO) is declared then any participant can break the law on you with no consequences, according to Schedule 3 section 35k. There are broad limits. They cannot kill or torture you, or cause significant physical injury. Minor injury or mental torment is fine. Anyone involved in an SIO will have these powers but who are they? ASIO, with 1778 staff. The Australian Federal Police, with more than 6900 staff. NSW Police with about 16,370 officers and a spy database called COPS which has more than 30 million entries on the people of NSW. But not just them. Anyone involved in an SIO enjoys legal immunity, including affiliates and subcontractors whoever they are. Many Senators clearly hadn't read the 128 pages of major legal changes in the NSA Bill. The citizen needs protection from the state built into the laws and that is what they smashed on Thursday.
Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications a request the company believed was unconstitutional according to court documents unsealed [on September 11] that illuminate how federal officials forced American tech companies to participate in the National Security Agencys controversial PRISM program. The documents ... outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the governments demands. The companys loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms. The ruling by the Foreign Intelligence Surveillance Court of Review became a key moment in the development of PRISM, helping government officials to convince other Silicon Valley companies that unprecedented data demands had been tested in the courts and found constitutionally sound. Eventually, most major U.S. tech companies, including Google, Facebook, Apple and AOL, complied. Microsoft had joined earlier, before the ruling, NSA documents have shown. PRISM was first revealed by former NSA contractor Edward Snowden last year. Documents made it clear that the program allowed the NSA to order U.S.-based tech companies to turn over e-mails and other communications to or from foreign targets without search warrants for each of those targets. Other NSA programs gave even more wide-ranging access to personal information of people worldwide, by collecting data directly from fiber-optic connections.
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.