Privacy News ArticlesExcerpts of Key Privacy News Articles in Media
The New York Times's explanation of its decision to report, after what it said was a one-year delay, that the National Security Agency is eavesdropping domestically without court-approved warrants was woefully inadequate. And I have had unusual difficulty getting a better explanation for readers, despite the paper's repeated pledges of greater transparency. For the first time since I became public editor, the executive editor and the publisher have declined to respond to my requests for information about news-related decision-making. My queries concerned the timing of the exclusive Dec. 16 article about President Bush's secret decision in the months after 9/11 to authorize the warrantless eavesdropping on Americans in the United States. I e-mailed a list of 28 questions to Bill Keller, the executive editor [of the New York Times], on Dec. 19, three days after the article appeared. He promptly declined to respond to them. I then sent the same questions to Arthur Sulzberger Jr., the publisher, who also declined to respond. They held out no hope for a fuller explanation in the future. The top Times people involved in the final decisions [are] refusing to talk and urging everyone else to remain silent.
Imagine a global spying network that can eavesdrop on every single phone call, fax or e-mail, anywhere on the planet. It sounds like science fiction, but it's true. Two of the chief protagonists - Britain and America - officially deny its existence. But the BBC has confirmation from the Australian Government that such a network really does exist. The base is linked directly to the headquarters of the US National Security Agency (NSA) at Fort Mead in Maryland, and it is also linked to a series of other listening posts scattered across the world, like Britain's own GCHQ. The power of the network, codenamed Echelon, is astounding. Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. The network is so secret that the British and American Governments refuse to admit that Echelon even exists. But another ally, Australia, has decided not to be so coy. The man who oversees Australia's security services, Inspector General of Intelligence and Security Bill Blick, has confirmed to the BBC that their Defence Signals Directorate (DSD) does form part of the network. Asked if they are then passed on to countries like Britain and America, he said: "They might be in certain circumstances." They are looking for evidence of international crime, like terrorism. But the system is so widespread all sorts of private communications, often of a sensitive commercial nature, are hoovered up and analysed.
Note that this is a 1999 article. The capability to monitor all communications has existed for a long time. For a powerful, well documented 20-page paper in the Federal Communications Law Journal providing strong evidence that this program is unconstitutional, click here.
Facebook wants to get up close and personal with its users after a patent was revealed detailing a desire to secretly watch users through their webcam or smartphone camera, spying on your mood in order to sell you tailored content or advertisements. The purpose behind the invasive idea is to analyse people through the camera in real time while they browse online and if it recognises you looking happy, bored or sad, it would deliver an advert fitting your emotion. If you were forlorn, for example, it would be able to serve an ad to perk you up, or know what products you had previously looked at online and put them under your nose at just the right time. The social network has filed several patents over the years on emotion-based technology but this, based on 'passive imaging data' is perhaps the most unnerving, considering it would take control of cameras that weren't even switched on by the user. As described by CB Insights: "This patent proposes capturing images of the user through smartphone or laptop cameras, even when the user is not actively using the camera. By visually tracking a user's facial expression, Facebook aims to monitor the user's emotional reactions to different types of content." Other patents listed by Facebook include a text messaging platform to detect a user's mood by measuring how hard and fast they were typing, then augment the message format, such as adding emojis or changing the font size, to match their emotion.
A safe that tallies the cash that is placed in it. A sniper rifle equipped with advanced computer technology for improved accuracy. A car that lets you stream music from the Internet. All of these innovations sound great, until you learn the risks that this type of connectivity carries. Recently, two security researchers, sitting on a couch and armed only with laptops, remotely took over a Chrysler Jeep Cherokee speeding along the highway ... while a Wired reporter was driving. A hacked car is a high-profile example of what can go wrong with the coming Internet of Things — objects equipped with software and connected to digital networks. The selling point ... is added convenience and better safety. In reality, it is a ... train wreck in privacy and security. That smart safe? Hackers can empty it with a single USB stick while erasing all [evidence] of their crime. That high-tech rifle? Researchers managed to remotely manipulate its target selection without the shooter’s knowing. The Internet of Things is also a privacy nightmare. Databases that already have too much information about us will now be bursting with data on the places we’ve driven, the food we’ve purchased and more. Last week, at Def Con, the annual information security conference, researchers set up an Internet of Things Village to show how they could hack everyday objects like baby monitors, thermostats and security cameras. Connecting everyday objects introduces new risks if done at mass scale. Once a hacker is in - she's in everywhere.
Note: Read how a hacked vehicle may have resulted in journalist Michael Hastings' death in 2013. The networked computerization of everyday objects means that these objects can spy on you, accelerating the disappearance of privacy in the name of convenience. What will happen when the "internet of things" expands to include microchip implants in people?
In March I received a call from the White House counsel’s office regarding a speech I had prepared for my boss at the State Department. The speech was about the impact ... of National Security Agency surveillance practices. The draft stated that “if U.S. citizens disagree with congressional and executive branch determinations about the proper scope of signals intelligence activities, they have the opportunity to change the policy through our democratic process.” But the White House counsel’s office told me that no, that wasn’t true. I was instructed to amend the line. Some intelligence practices remain so secret, even from members of Congress, that there is no opportunity for our democracy to change them. Public debate about the bulk collection of U.S. citizens’ data by the NSA has focused largely on Section 215 of the Patriot Act. Based in part on classified facts that I am prohibited by law from publishing, I believe that Americans should be even more concerned about the collection and storage of their communications under Executive Order 12333 than under Section 215. Unlike Section 215, the executive order authorizes collection of the content of communications, not just metadata, even for U.S. persons. It does not require that the affected U.S. persons be suspected of wrongdoing and places no limits on the volume of communications by U.S. persons that may be collected and retained. None of the reforms that Obama announced earlier this year will affect such collection.
Note: The above was written by John Napier Tye, former section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights and Labor. A 2014 Washington Post investigation sheds more light on the NSA's legally dubious domestic mass surveillance program. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Whistle-blower AT&T technician Mark Klein says his effort to reveal alleged government surveillance of domestic Internet traffic was blocked not only by U.S. intelligence officials but also by the top editors of the Los Angeles Times. Klein describes how he stumbled across "secret NSA rooms" being installed at an AT&T switching center in San Francisco and later heard of similar rooms in at least six other cities. Eventually, Klein says he decided to take his documents to the Los Angeles Times, to blow the whistle on what he calls "an illegal and Orwellian project." But after working for two months with LA Times reporter Joe Menn, Klein says he was told the story had been killed at the request of then-Director of National Intelligence John Negroponte and then-director of the NSA Gen. Michael Hayden. Klein says he then took his AT&T documents to The New York Times, which published its exclusive account last April. In the court case against AT&T, Negroponte formally invoked the "state secrets privilege," claiming the lawsuit and the information from Klein and others could "cause exceptionally grave damage to the national security of the United States." The Los Angeles Times' decision was made by the paper's editor at the time, Dean Baquet, now the Washington bureau chief of The New York Times. As the new Washington bureau chief of The New York Times, Baquet now oversees the reporters who have broken most of the major stories involving the government surveillance program, often over objections from the government.
Note: So after the NY Times has the guts to report this important story, the man who was responsible for the censorship at the LA Times is transferred to the very position in the NY Times where he can now block future stories there. For why this case of blatant media censorship isn't making headlines, click here.
The Newborn Genetic Screening test is required in all 50 states. Nearly every baby born in the United States gets a heel prick shortly after birth. Their newborn blood fills six spots on a special filter paper card. It is used to test baby for dozens of congenital disorders. Some states destroy the blood spots after a year, 12 states store them for at least 21 years. California, however, is one of a handful of states that stores the remaining blood spots for research indefinitely in a state-run biobank. The child's leftover blood spots become property of the state and may be sold to outside researchers without the parent's knowledge or consent. "I just didn't realize there was a repository of every baby born in the state. It's like fingerprints," new mom Soniya Sapre responded. In California ... you do have the right to ask the biobank to destroy the leftovers after the fact, though the agency's website states it "may not be able to comply with your request." You also have the right to find out if your child's blood spots have been used for research, but you would have to know they were being used in the first place and we've discovered that most parents don't. But researchers with the California Genetic Disease Screening Program aren't the only ones with access to samples stored in the biobank. Blood spots are given to outside researchers for $20 to $40 per spot. According to biobank records, the program sold about 16,000 blood spots over the past five years, totaling a little more than $700,000.
Over the last two years, researchers in China and the United States have begun demonstrating that they can send hidden commands that are undetectable to the human ear to Apple’s Siri, Amazon’s Alexa and Google’s Assistant. Researchers have been able to secretly activate the artificial intelligence systems on smartphones and smart speakers, making them dial phone numbers or open websites. In the wrong hands, the technology could be used to unlock doors, wire money or buy stuff online - simply with music playing over the radio. A group of students from University of California, Berkeley, and Georgetown University showed in 2016 that they could hide commands in white noise played over loudspeakers and through YouTube videos to get smart devices to turn on airplane mode or open a website. This month, some of those Berkeley researchers published a research paper that went further, saying they could embed commands directly into recordings of music or spoken text. So while a human listener hears someone talking or an orchestra playing, Amazon’s Echo speaker might hear an instruction to add something to your shopping list. There is no American law against broadcasting subliminal messages to humans, let alone machines. The Federal Communications Commission discourages the practice as “counter to the public interest,” and the Television Code of the National Association of Broadcasters bans “transmitting messages below the threshold of normal awareness.”
Note: Read how a hacked vehicle may have resulted in journalist Michael Hastings' death in 2013. A 2015 New York Times article titled "Why ‘Smart’ Objects May Be a Dumb Idea" describes other major risks in creating an "Internet of Things". Vulnerabilities like those described in the article above make it possible for anyone to spy on you with these objects, accelerating the disappearance of privacy.
The National Security Agency maintains a page on its website that outlines its mission statement. Since at least May 2016, the surveillance agency had featured honesty as the first of four “core values” listed on NSA.gov, alongside “respect for the law,” “integrity,” and “transparency.” On January 12, however, the NSA removed the mission statement page – which can still be viewed through the Internet Archive – and replaced it with a new version. Now, the parts about honesty and the pledge to be truthful have been deleted. The agency’s new top value is “commitment to service,” which it says means “excellence in the pursuit of our critical mission.” Those are not the only striking alterations. All references to “trust,” “honor,” and “openness” have disappeared. The agency previously stated on its website that it embraced transparency and claimed that all of its activities were aimed at “ensuring the safety, security, and liberty of our fellow citizens.” That has also been discarded. The new list of values includes the additions “respect for people” and “accountability.” But the section on respecting people is a reference to diversity within the NSA workforce, not a general commitment to members of the public. Accountability is defined as taking “responsibility for our decisions.” The one core value that remains essentially unchanged is “respect for the law,” which the agency says means it is “grounded in our adherence to the U.S. Constitution and compliance with the U.S. laws, regulations and policies that govern our activities.”
I Googled “mainstream media is…” And there it was. Google’s autocomplete suggestions: “mainstream media is… dead, dying, fake news, fake, finished”. Google’s first suggested link ... leads to a website called CNSnews.com and an article: “The Mainstream media are dead.” How had it, an obscure site I’d never heard of, dominated Google’s search algorithm on the topic? In the “About us” tab, I learn CNSnews is owned by the Media Research Center. It receives a large bulk of its funding – more than $10m in the past decade – from a single source, the hedge fund billionaire Robert Mercer. Robert Mercer is the money behind an awful lot of things. He was Trump’s single biggest donor. Since 2010, Mercer has donated $45m to different political campaigns – all Republican – and another $50m to non-profits – all rightwing, ultra-conservative. This is a billionaire who is ... trying to reshape the world according to his personal beliefs. He is reported to have a $10m stake in the [Cambridge Analytica], which was spun out of a bigger British company called SCL Group. It specialises in “election management strategies” and “messaging and information operations”, refined over 25 years. In military circles this is known as “psyops” – psychological operations. Cambridge Analytica makes the astonishing boast that it has psychological profiles based on 5,000 separate pieces of data on 220 million American voters. With this, a computer ... can predict and potentially control human behaviour. It’s incredibly dangerous.
"There's really only two types of companies or two types of people which are those who have been hacked and realize it and those who have been hacked and haven't." That's what mobile security expert John Hering tells 60 Minutes correspondent Sharyn Alfonsi about the danger of cellphone hacking. To prove his point, Hering assembled a group of ace hackers. Jon Oberheide showed 60 Minutes an app he created that looks legitimate but allows him to take control of a phone and suck out ... information [such as] contacts, recent purchases and text messages. Another hacker, Adam Laurie, uses radio frequency identification to hack phones. "He didn't need my phone number," Alfonsi explains. "All he had to do was physically touch my phone." He demonstrated by brushing by her in the lobby of her hotel. When he did ... her phone [automatically] dialed Laurie, allowing him to listen in on anything discussed in the room with Alfonsi's phone. A so-called "CryptoPhone" ... alerts the user when someone is trying to attack or hack into his or her phone. "Certain government facilities will try to get into your phone if you get too close to them," Alfonsi explains. To demonstrate, Les Goldsmith, CEO of ESD America, a company that specializes in countersurveillance technologies, took Alfonsi for a ride ... near a secure government facility. As they were driving past, a red line appeared on the CryptoPhone, indicating that ... if she were using a regular phone, the government agency could hear her call and read her text messages.
The “sneak-and-peek” provision of the Patriot Act that was alleged to be used only in national security and terrorism investigations has overwhelmingly been used in narcotics cases. Now the New York Times reports that National Security Agency data will be shared with other intelligence agencies like the FBI without first applying any screens for privacy. The ACLU of Massachusetts blog Privacy SOS explains [that] domestic law enforcement officials now have access to huge troves of American communications, obtained without warrants, that they can use to put people in cages. This basically formalizes what was already happening. We’ve known for a couple of years now that the Drug Enforcement Administration and the IRS were getting information from the NSA. Because that information was obtained without a warrant, the agencies were instructed to engage in “parallel construction” when explaining to courts and defense attorneys how the information had been obtained. It certainly isn’t the only time that that national security apparatus has let law enforcement agencies benefit from policies that are supposed to be reserved for terrorism investigations in order to get around the Fourth Amendment, then instructed those law enforcement agencies to misdirect, fudge and outright lie about how they obtained incriminating information. This isn’t just a few rogue agents. The lying has been a matter of policy.
Scores of low-flying planes circling American cities are part of a civilian air force operated by the FBI and obscured behind fictitious companies. The aircraft are equipped with high-tech cameras, and ... technology capable of tracking thousands of cellphones. The surveillance equipment is used for ongoing investigations, the FBI says, generally without a judge's approval. The Drug Enforcement Administration has its own planes, also registered to fake companies, according to a 2011 Justice Department ... report. At the time, the DEA had 92 aircraft in its fleet. And since 2007, the U.S. Marshals Service has operated an aerial surveillance program with its own fleet equipped with technology that can capture data from thousands of cellphones. "These are not your grandparents' surveillance aircraft," said Jay Stanley, a senior policy analyst with the American Civil Liberties Union. Evolving technology can record higher-quality video from long distances, even at night, and can capture certain identifying information from cellphones using a device known as a "cell-site simulator" [to] trick pinpointed cellphones into revealing identification numbers of subscribers, including those not suspected of a crime. The Obama administration [has] been directing local authorities through secret agreements not to reveal their own use of the devices. During the past few weeks, the AP tracked planes from the FBI's fleet on more than 100 flights over at least 11 states plus the District of Columbia.
Note: For more along these lines, see concise summaries of deeply revealing news articles about the corrupt intelligence agencies that facilitate the erosion of privacy rights in the U.S. and elsewhere.
At least 50 U.S. law enforcement agencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside. Those agencies, including the FBI and the U.S. Marshals Service, began deploying the radar systems more than two years ago with little notice to the courts and no public disclosure of when or how they would be used. The technology raises legal and privacy issues because the U.S. Supreme Court has said officers generally cannot use high-tech sensors to tell them about the inside of a person's house without first obtaining a search warrant. The radars work like finely tuned motion detectors, using radio waves to zero in on movements as slight as human breathing from a distance of more than 50 feet. They can detect whether anyone is inside of a house, where they are and whether they are moving. The device the Marshals Service and others are using [was] first designed for use in Iraq and Afghanistan. They represent the latest example of battlefield technology finding its way home to civilian policing and bringing complex legal questions with it. Those concerns are especially thorny when it comes to technology that lets the police determine what's happening inside someone's home.
Note: This technology is not new. Working as interpreter in Washington, DC, WantToKnow.info founder Fred Burks witnessed this technology being used by the police there in the late 1980s. For more along these lines, see this deeply revealing summarized NPR report about The Pentagon's massive Program 1033 to widely distribute military hardware to domestic police forces.
The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed [on September 11] that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program. The documents ... outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms. The ruling by the Foreign Intelligence Surveillance Court of Review became a key moment in the development of PRISM, helping government officials to convince other Silicon Valley companies that unprecedented data demands had been tested in the courts and found constitutionally sound. Eventually, most major U.S. tech companies, including Google, Facebook, Apple and AOL, complied. Microsoft had joined earlier, before the ruling, NSA documents have shown. PRISM was first revealed by former NSA contractor Edward Snowden last year. Documents made it clear that the program allowed the NSA to order U.S.-based tech companies to turn over e-mails and other communications to or from foreign targets without search warrants for each of those targets. Other NSA programs gave even more wide-ranging access to personal information of people worldwide, by collecting data directly from fiber-optic connections.
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
The US government’s web of surveillance is vast and interconnected. You can be pulled into the National Security Agency’s database quietly and quickly. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors. The watchlist [is] based on [low] standards and secret evidence, which ensnares innocent people. Indeed, the standards are so low that the US government’s guidelines specifically allow for a single, uncorroborated source of information – including a Facebook or Twitter post – to serve as the basis for placing you on its master watchlist. Of the 680,000 individuals on that FBI master list, roughly 40% have “no recognized terrorist group affiliation”, according to the Intercept. These individuals don’t even have a connection – as the government loosely defines it – to a designated terrorist group, but they are still branded as suspected terrorists. The US [government uses] a loose standard – so-called “reasonable suspicion” – in determining who, exactly, can be watchlisted. ["Reasonable suspicion"] requires neither “concrete evidence” nor “irrefutable evidence”. Instead, an official is permitted to consider “reasonable inferences” and “to draw from the facts in light of his/her experience”.
Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
The former National Security Agency contractor Edward J. Snowden said in a wide-ranging interview ... that the oversight of surveillance programs was so weak that members of the United States military working at the spy agency sometimes shared sexually explicit photos they intercepted. He also said the British government often pioneered the most invasive surveillance programs because its intelligence services operate with fewer restrictions intended to protect individual privacy than its counterparts in the United States and other allies. “In the course of their daily work they stumble across something that is completely unrelated to their work, for example an intimate nude photo of someone in a sexually compromising situation but they’re extremely attractive,” he said. “So what do they do? They turn around in their chair and they show a co-worker. And their co-worker says: ‘Oh, hey, that’s great. Send that to Bill down the way.’ ” Mr. Snowden said that type of sharing ... was “seen as the fringe benefits of surveillance positions.” He said that this was never reported and that the system for auditing surveillance programs was “incredibly weak.” Mr. Snowden had particularly stark criticism for the British government’s surveillance programs, because in Britain the respect for individual privacy, he said, “is not strongly encoded in law or policy.” Because it has fewer restrictions, British intelligence platforms “are used as a testing ground” for programs of all five intelligence partners, a group referred to as “Five Eyes,” which includes Britain, Canada, Australia, New Zealand and the United States.”
Note: For more on this, see concise summaries of deeply revealing privacy news articles from reliable major media sources.
British spies have developed "dirty tricks" ... that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into "honey traps." Documents taken from the National Security Agency by Edward Snowden ... describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG). According to the documents ... the agency's goal was to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications. The propaganda campaigns use deception, mass messaging and "pushing stories" via Twitter, Flickr, Facebook and YouTube. JTRIG also uses "false flag" operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain's adversaries. Other documents ... show that JTRIG ... used a DDOS attack to shut down Internet chat rooms used by members of the hacktivist group known as Anonymous. A computer virus called Ambassadors Reception was "used in a variety of different areas" and was "very effective." When sent to adversaries ... the virus will "encrypt itself, delete all emails ... and block the computer user from logging on. Spies have long used sexual "honey traps" to snare, blackmail and influence targets. Most often, a male target is led to believe he has an opportunity for a romantic relationship or a sexual liaison with a woman, only to find that the woman is actually an intelligence operative.
Note: You can read the documents released by Snowden at this link and this one. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The British government can tap into the cables carrying the world’s web traffic at will and spy on what people are doing on some of the world’s most popular social media sites ... without the knowledge or consent of the companies. Documents taken from the National Security Agency by Edward Snowden and obtained by NBC News detail how British cyber spies demonstrated a pilot program to their U.S. partners in 2012 in which they were able to monitor YouTube in real time and collect addresses from the billions of videos watched daily, as well as some user information, for analysis. At the time the documents were printed, they were also able to spy on Facebook and Twitter. Called “Psychology A New Kind of SIGDEV" (Signals Development), the presentation includes a section that spells out “Broad real-time monitoring of online activity” of YouTube videos, URLs “liked” on Facebook, and Blogspot/Blogger visits. The monitoring program is called “Squeaky Dolphin.” Experts told NBC News the documents show the British had to have been either physically able to tap the cables carrying the world’s web traffic or able to use a third party to gain physical access to the massive stream of data. Representatives of Facebook and Google, which owns YouTube, said they ... were unaware the collection had occurred. The NSA does analysis of social media similar to that in the GCHQ demonstration. In 2010 ... GCHQ exploited unencrypted data from Twitter to identify specific users around the world and target them with propaganda.
Note: Read an article diving deeper and showing how online reputations are ruthlessly destroyed by powerful groups. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.
The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show. Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor. Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth. The agency ... deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products [called "backdoors"].
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.