Privacy News ArticlesExcerpts of Key Privacy News Articles in Media
Behind the county hospital's tall cinderblock walls, a 27-year-old tuberculosis patient ... sits in a jail cell equipped with a ventilation system that keeps germs from escaping. Robert Daniels has been locked up indefinitely, perhaps for the rest of his life, since last July. But he has not been charged with a crime. Instead, he suffers from an extensively drug-resistant strain of tuberculosis. It is considered virtually untreatable. County health authorities obtained a court order to lock him up as a danger to the public because ... he did not heed doctors' instructions to wear a mask in public. "I'm being treated worse than an inmate," Daniels said. "I'm all alone. Four walls. Even the door to my room has been locked. I haven't seen my reflection in months." He said sheriff's deputies will not let him take a shower -- he cleans himself with wet wipes -- and have taken away his television, radio, personal phone and computer. His only visitors are masked medical staff members who come in to give him his medication. Though Daniels' confinement is extremely rare, health experts say it is a situation that U.S. public health officials may have to confront more and more because of the spread of drug-resistant TB and the emergence of diseases such as SARS and avian flu.
Note: If the above link fails, click here. What possible reason is there for taking away this man's TV, radio, cell phone, and computer? Are we being prepared for mass quarantines and imprisonment due to disease? For more, click here.
Let's say your teenager is a habitual truant and there is nothing you can do about it. A Washington area politician thinks he might have the solution: Fit the child with a Global Positioning System chip, then have police track him down. "It allows them to get caught easier," said Maryland Delegate Doyle Niemann (D-Prince George's), who recently co-sponsored legislation in the House that would use electronic surveillance as part of a broader truancy reduction plan. "It's going to be done unobtrusively. The chips are tiny and can be put into a hospital ID band or a necklace." Niemann's legislation mirrors a bill sponsored by state Sen. Gwendolyn Britt (D-Prince George's). Both would provide truants and their parents with better access to social services, such as mental health evaluations and help with schoolwork. Electronic monitoring would be a last resort. Still, the prospect of tagging children and using them in some "catch and release" hunt by police casts a pall over everything that's good about the plan. Odd how billions and billions of dollars keep going to a war that almost nobody wants, but there's never enough to fund the educational programs that nearly everybody says are needed. Aimed solely at students in Prince George's — the only predominantly black county in the Washington area — the truancy effort is called a "pilot program," a first-of-its-kind experiment. It would cost $400,000 to keep track of about 660 students a year.
Note: For more reliable information on the push to microchip the entire population, click here.
When Kevin Warwick enters his office building on the campus of Reading University, strange things happen. As Warwick heads down the main hall, lights turn on. When he turns to the right, an office door unbolts and opens. Each step is clocked and recorded. The building knows who he is, where he is, and what he expects to happen. The building [even] says, “Hello Professor Warwick.” The structure knows Warwick because of the electrical fuse-sized “smart card” implanted in his left arm. In Britain, he’s been dubbed “The Cyborg Man,” the first person known to have a microchip implanted in his body for communication with outside machines. Warwick predicts chip implants will one day replace time cards, criminal tracking devices, even credit cards. Capable of carrying huge amounts of data, they may, he says, one day be used to identify individuals by Social Security numbers, blood type, even their banking information. No one knows yet how the body will respond to this type of invasion. Warwick is not blind to the ethical questions of this technology. Implants ostensibly designed to clock workers in and out might be misused to monitor where people are at all times and who they are meeting. Governments could move to use implants instead of I.D. cards and passports, but what would stop them from using this new science to invade privacy? “I feel mentally different. When I am in the building I feel much more closely connected with the computer.
A review of hundreds of Facebook’s patent applications reveals that the company has considered tracking almost every aspect of its users’ lives: where you are, who you spend time with, whether you’re in a romantic relationship, which brands and politicians you’re talking about. The company has even attempted to patent a method for predicting when your friends will die. Taken together, Facebook’s patents show a commitment to collecting personal information, despite widespread public criticism of the company’s privacy policies and a promise from its chief executive to “do better.” “A patent portfolio is a map of how a company thinks about where its technology is going,” said Jason M. Schultz, a law professor at New York University. One patent application discusses predicting whether you’re in a romantic relationship using information such as how many times you visit another user’s page [and] the number of people in your profile picture. Another proposes using your posts and messages to infer personality traits ... then using those characteristics to select which news stories or ads to display. Another patent application discusses tracking your weekly routine and sending notifications to other users of deviations from the routine. In addition, it describes using your phone’s location in the middle of the night to establish where you live. As long as Facebook keeps collecting personal information, we should be wary.
Last year an American company microchipped dozens of its workers. Of the 90 people who work at [Three Square Market] headquarters, 72 are now chipped. Two months ago, the company ... started chipping people with dementia. If someone wanders off and gets lost, police can scan the chip “and they will know all their medical information, what drugs they can and can’t have, they’ll know their identity.” So far, Three Square Market has chipped 100 people, but plans to do 10,000. The company has just launched a mobile phone app that pairs the chip with the phone’s GPS, enabling the implantee’s location to be tracked. Last week, it started using it with people released from prison on probation. Some Chinese companies are using sensors in helmets and hats to scan workers’ brainwaves. There are tech companies selling products that can ... monitor keystrokes and web usage, and even photograph [employees] using their computers’ webcams. All this can be done remotely. Monitoring is built into many of the jobs that form the so-called “gig economy”. It’s not easy to object to the constant surveillance when you’re desperate for work. What has surprised [Cass Business School professor André Spicer] is how willingly people in better-paid jobs have taken to it. Spicer has watched the shift away from “monitoring something like emails to monitoring people’s bodies – the rise of bio-tracking basically. The monitoring of your vital signs, emotions, moods.”
Note: Author James Bloodworth describes the high tech monitoring of workers at Amazon warehouses in his new book, "Hired: Six Months Undercover in Low-Wage Britain". For more along these lines, see concise summaries of deeply revealing news articles on microchip implants and the disappearance of privacy.
Chinese companies are picking their employees’ brains - literally - with mind-reading devices designed to improve efficiency and performance. Workers are being outfitted with safety helmet-like caps that monitor brain waves and send the information to computers that use artificial intelligence algorithms to detect emotional spikes, like depression, anxiety and rage. The Orwellian technology has been used on factory employees, train conductors and workers at State Grid Zhejian Electric Power. State Grid, which has 40,000 employees ... said the company’s profits have increased by about $315 million since it implemented the surveillance caps in 2014. The government-funded brain-monitoring project, called Neuro Cap, has been implemented in more than a dozen factories and businesses. Jin Jia, an associate professor of brain science and cognitive psychology at Ningbo University, which is hosting the project, said the brain caps allow workers to be better managed. Qiao Zhian, professor of management psychology at Beijing Normal University, said the devices could give companies a competitive boost - but warned they could also violate privacy in the worst way. “There is no law or regulation to limit the use of this kind of equipment in China. The employer may have a strong incentive to use the technology for higher profit, and the employees are usually in too weak a position to say no,” he said. “The selling of Facebook data is bad enough. Brain surveillance can take privacy abuse to a whole new level.”
At 24, [Christopher Wylie] came up with an idea that led to the foundation of a company called Cambridge Analytica, a data analytics firm that went on to claim a major role in the Leave campaign for Britain’s EU membership referendum, and later became a key figure in digital operations during Donald Trump’s election campaign. In 2014, Steve Bannon ... was Wylie’s boss. And Robert Mercer, the secretive US hedge-fund billionaire and Republican donor, was Cambridge Analytica’s investor. The idea they bought into was to bring big data and social media to an established military methodology – “information operations” – then turn it on the US electorate. By , Steve Bannon had become Trump’s chief strategist. Cambridge Analytica’s parent company, SCL, had won contracts with the US State Department and was pitching to the Pentagon, and Wylie was genuinely freaked out. “It’s insane,” he told me one night. “The company has created psychological profiles of 230 million Americans. And now they want to work with the Pentagon? It’s like Nixon on steroids.” He ended up showing me a tranche of documents that laid out the secret workings behind Cambridge Analytica. Wylie ... came up with a plan to harvest the Facebook profiles of millions of people in the US, and to use their private and personal information to create sophisticated psychological and political profiles. And then target them with political ads designed to work on their particular psychological makeup.
Note: Billionaire Robert Mercer used this new new technology to build a corporate empire capable of swinging elections by using military propaganda strategies on civilian populations. The above article further details how mass media is being combined with Big Data to produce powerful new forms of mind control. Watch an astounding video revealing how Cambridge Analytica has successfully manipulated national elections around the world.
New smart energy meters that the Government wants to be installed in millions of homes will leave householders vulnerable to cyber attacks. The intelligence agency GCHQ ... raised concerns over the security of the meters, which could enable hackers to steal personal details and defraud consumers by tampering with their bills. The Government wants every home in the country to have a smart meter, but only 8 million out of 27 million households have so far signed up to the Ł11 billion scheme. Cyber security experts say that making the meters universal will make them more attractive to hackers because the potential returns are so much greater if they can hack every meter using the same software. In some foreign countries hackers have already attacked smart meter networks to defraud customers. Criminals are able to artificially inflate meter readings, making bills higher. They then try to intercept payments, and if they simply skim off the difference between the real reading and the false reading, energy companies will think the bill has been paid normally. Another potential problem is the meters being used as a “Trojan horse” to access other computers and gadgets around the home if the meters are able to “talk” to the other devices. That would potentially give hackers the ability to steal personal information that could be sold on to other criminals.
Note: This 2015 New York Times article calls 'smart' devices like these meters, "a train wreck in privacy and security." The networked computerization of everyday objects often means that these objects can spy on you, accelerating the disappearance of privacy in the name of convenience. Watch an excellent documentary uncovering the serious dangers of smart meters.
The National Security Agency has apparently been way ahead of Apple or Amazon. The agency has at its disposal voice recognition technology that it employs to identify terrorists, government spies, or anyone they choose — with just a phone call, according to a report by The Intercept. By using recorded audio, the NSA is able to create a "voiceprint," or a map of qualities that mark a voice as singular, and identify the person speaking. According to a classified memo ... the agency has employed this technology since at least 2006, with the document referencing technology "that identifies people by the sound of their voices." In fact, the NSA used such technology during Operation Iraqi Freedom, when analysts were able to verify audio thought to be of Saddam Hussein speaking. It suggests that national security operatives had access to high-level voice technology long before Amazon, Apple and Google's solutions became cultural touchstones. A "voiceprint" is "a dynamic computer model of the individual's vocal characteristics," the publication explained, created by an algorithm analyzing features like pitch and mouth shape. Then, using the NSA's formidable bank of recorded audio files, the agency is able to match the speaker to an identity. Identifying people through their voiceprints is a skill at which the "NSA reigns supreme," according to a leaked document from 2008. And, they're only getting better.
Note: As this BBC article from 1999 shows, mass surveillance systems with voice recognition capability have been in use for many years. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Two New York Times reporters learned in 2004 that the George W. Bush administration was secretly wiretapping Americans, and collecting their phone and email records. The reporters’ attempt to publish their findings were thwarted by the administration’s intense and successful lobbying of their editors. That effort ... had an unlikely ally: Rep. Jane Harman of Los Angeles, the senior Democrat on the House Intelligence Committee. Details of the far-reaching, legally unauthorized surveillance program remained secret until the Times published the article in late 2005. The newspaper’s interactions with administration officials, and Harman’s role, were described by former Times reporter James Risen this month in the Intercept, the investigative publication where he now works. The story on the program known as Stellar Wind was ready for publication before the November 2004 election, when Bush was on the ballot, but NSA Director Michael Hayden and other administration officials told Times editors, in phone calls and face-to-face meetings, that publication would damage national security and endanger lives, Risen said. He said the officials were joined in that effort by Harman, one of a handful of congressional leaders who had been briefed on the program and were enlisted by the White House to contact the Times. Members of Congress learned later that the NSA had not been seeking warrants from a secret court, as required by law, before wiretapping calls.
Note: James Risen is a courageous hero who shared two Pulitzer Prizes for his reporting around 9/11 and massive government surveillance. His recent article in The Intercept describes how a "marketplace of secrets in Washington" supports the US national security apparatus, and is used by corrupt government officials to manipulate the news.
Forget swiping a credit card or badge to buy food at work. One Wisconsin-based tech firm is offering to install rice-size microchips in its employees' hands. Three Square Market will be the first firm in the U.S. to use the device, which was approved by the FDA in 2004, CEO Todd Westby told CNBC on Monday. "We think it's the right thing to do for advancing innovation just like the driverless car basically did in recent months," he said. The company, which provides technology for break-room markets or mini-market kiosks, is anticipating over 50 employees to be voluntarily chipped. Westby said he and his family will be chipped, too. The chip, which costs $300 per implant, is inserted with a needle between the thumb and forefinger. Once an employee has the chip installed, he or she can purchase food in the break room, open doors and log into computers. And for those who may be concerned about Big Brother watching, Westby said there is no way for employees to be tracked. "Unlike your cell phone that is trackable and traceable pretty much no matter where you are, this device is only readable if you're within six inches of a proximity reader," he said. Three Square Market's partner, BioHax International in Sweden, has already started using the microchips in about 150 of its employees.
Note: A Swedish company's chief executive was recently "chipped" live on stage to promote this dubious technology. And do you really think they are not trackable? Read about the agenda to chip all people in this powerful essay and these news articles.
Forty-five states and the District of Columbia are mounting a bipartisan rebellion against President Donald Trump’s commission on vote fraud by either declining to release any of the requested data or by providing only limited information to the panel. The Presidential Advisory Commission on Voter Integrity's request for extensive personal information about voters has ignited a firestorm in many states, including from both Republican and Democrat officials who oversee elections. The panel is seeking "dates of birth, political party (if recorded in your state), last four digits of social security number if available, voter history (elections voted in) from 2006 onward, active/inactive status, cancelled status, information regarding any felony convictions, information regarding voter registration in another state, information regarding military status, and overseas citizen information." Nineteen states - both red and blue - and D.C. are flat-out refusing to comply with the request, citing privacy concerns and some claiming the 15-member vote fraud panel is politically-motivated. Many officials have expressed disbelief and outrage at the commission's call to hand over a staggering amount of voter data, some of which they say is confidential or sensitive. It is unclear how the commission plans to move forward after the backlash. The panel is slated to meet later this month.
Note: After several lawsuits, the voting panel is now telling states to hold off on sending data. For more along these lines, see concise summaries of deeply revealing elections corruption news articles from reliable major media sources. And don't miss the critically important information provided in our Elections Information Center.
Sensitive personal details relating to almost 200 million US citizens have been accidentally exposed by a marketing firm contracted by the Republican National Committee. The 1.1 terabytes of data includes birthdates, home addresses, telephone numbers and political views of nearly 62% of the entire US population. The data was available on a publicly accessible Amazon cloud server. Anyone could access the data. The information seems to have been collected from a wide range of sources - from posts on controversial banned threads on the social network Reddit, to committees that raised funds for the Republican Party. The information was stored in spreadsheets uploaded to a server owned by Deep Root Analytics. It had last been updated in January. Although it is known that political parties routinely gather data on voters, this is the largest breach of electoral data in the US to date and privacy experts are concerned about the sheer scale of the data gathered. "This is not just sensitive, it's intimate information, predictions about people's behaviour, opinions and beliefs that people have never decided to disclose to anyone," [said] Privacy International's policy officer Frederike Kaltheuner. However, the issue of data collection and using computer models to predict voter behaviour is not just limited to marketing firms - Privacy International says that the entire online advertising ecosystem operates in the same way.
Note: Elites like hedge fund billionaire Robert Mercer have been backing a major effort to produce powerful new forms of mind control by combining mass media with Big Data. As the data collected for this purpose becomes increasingly accessible, privacy disappears.
The C.I.A. developed tools to spy on Mac computers by injecting software into the chips that control the computers’ fundamental operations, according to the latest cache of classified government documents published on Thursday by WikiLeaks. All of the surveillance tools that have been disclosed were designed to be installed on individual phones or computers. But the effects could be much wider. Cisco Systems, for example, warned customers this week that many of its popular routers, the backbone of computer networks, could be hacked using the C.I.A.’s techniques. Julian Assange, the founder of WikiLeaks, has offered to share the precise software code used by the C.I.A.’s cyberweapons with the affected companies. But major tech companies have been reluctant to directly engage with him for fear of violating American laws. The spy software described in the latest documents was designed to be injected into a Mac’s firmware, a type of software preloaded in the computer’s chips. It would then act as a “listening post,” broadcasting the user’s activities to the C.I.A. whenever the machine was connected to the internet. Tools that operate at the chip level can hide their existence and avoid being wiped out by routine software updates. Under an agreement struck during the Obama administration, intelligence agencies were supposed to share their knowledge of most security vulnerabilities with tech companies. The C.I.A. documents suggest that some key vulnerabilities were kept secret.
In a heavily protected military base some 15 miles south of Washington, D.C., sits the massive headquarters of a spy agency few know exists. The [National Geospatial-Intelligence Agency, or] NGA remains by far the most shadowy member of the Big Five spy agencies, which include the CIA and the National Security Agency. Despite its lack of name recognition, the NGA’s headquarters is the third-largest building in the Washington metropolitan area. The NGA is to pictures what the NSA is to voices. Its principal function is to analyze the billions of images and miles of video captured by drones ... and spy satellites. The agency has never been involved in domestic spy scandals. However, there’s reason to believe that this will change. In March 2016, the Pentagon released the results of an investigation initiated by the Department of Defense’s Office of Inspector General to examine military spy drones in the United States. The report ... revealed that the Pentagon used unarmed surveillance drones over American soil. The investigation also quoted from an Air Force law review article pointing out the growing concern that technology designed to spy on enemies abroad may soon be turned around to spy on citizens at home. In 2016, unbeknownst to many city officials, police in Baltimore began conducting persistent aerial surveillance using a system developed for military use in Iraq. Few civilians have any idea how advanced these military eye-in-the-sky drones have become.
Note: This article was written by former ABC News producer James Bamford, whose 2001 article on Operation Northwoods revealed that the top Pentagon generals signed off on top-secret plans which stated, "We could blow up a U.S. ship in Guantanamo Bay and blame Cuba," and, "casualty lists in U.S. newspapers would cause a helpful wave of national indignation." And showing the level of major media complicity, only ABC News reported on this. For more, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
British journalist Julia Breen's scoop about racism at her local police force didn't just get her on the front page, it got her put under surveillance. Investigators logged her calls, those of her colleague Graeme Hetherington and even their modest-sized newspaper's busy switchboard in an effort to unmask their sources. The [Northern Echo newspaper] has often provided painful reading for Cleveland Police, a department responsible for a Chicago-sized patch of England's industrial northeast. The small force has weathered a series of scandals. A minority officer, Sultan Alam, was awarded 800,000 pounds ... after allegedly being framed by colleagues in retaliation for a discrimination lawsuit. The judgment made national headlines. Cleveland Police issued a statement insisting the force wasn't racist. The next day, an anonymous caller told Breen an internal police report suggested otherwise. The following morning her byline was across the front page beneath the words: "Institutional racism uncovered within Cleveland Police." Breen ... eventually forgot the episode. Cleveland Police didn't. The force secretly began logging calls to and from Breen, Hetherington and a third journalist from another newspaper. It was later calculated that the surveillance covered over 1 million minutes of calling time. The Echo isn't unique. Britain's wiretapping watchdog ... revealed in 2015 that 82 journalists' communications records had been seized as part of leak investigations across the country over a three-year period.
Over his two terms, Obama has created the most powerful surveillance state the world has ever seen. From 22,300 miles in space, where seven Advanced Orion [spy satellites] now orbit; to a 1-million-square-foot building in the Utah desert that stores data intercepted from personal phones, emails, and social media accounts; to taps along the millions of miles of undersea cables that encircle the Earth like yarn, U.S. surveillance has expanded exponentially since Obama’s inauguration on Jan. 20, 2009. The effort to wire the world ... has cost American taxpayers more than $100 billion. Yet has the president’s blueprint for spying succeeded on its own terms? An examination of the unprecedented architecture reveals that the Obama administration may only have drowned itself in data. Privacy hasn’t been traded for security, but for the government hoarding more data than it knows how to handle. A panel set up by Obama [in 2013] to review the NSA’s operations concluded that the agency had stopped no terrorist attacks. Beyond failures to create security, there is the matter of misuse or abuse of U.S. spying, the effects of which extend well beyond violations of Americans’ constitutional liberties. Obama, meanwhile, has taken virtually no steps to fix what ails his spying apparatus, [but] has gone after people blowing the whistle on intelligence abuses. The Justice Department has charged eight leakers — more than double the number under all previous presidents combined.
Note: The above was written by James Bamford, whistleblower and author of "The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America." Former US Senator Frank Church warned of the dangers of creating a surveillance state in 1975. By 2013, it had become evident that the US did not heed his warning. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
A photo circulating online of Facebook CEO Mark Zuckerberg's personal laptop has ignited a conversation about data security. The photo shows a smiling Zuckerberg sitting next to his laptop. His computer's camera and microphone are covered with tape. Tape? Yes, tape. Covering a computer's camera doesn't protect the device from being hacked, but it does prevent a hacker from being able to see whatever the camera sees. Covering a laptop's microphone can muffle the audio enough to prevent a hacker from listening in, uninvited. Security experts say it's not paranoid - it's good sense. A hacker can get access to your entire computer, without your knowledge, relatively easily. [Security professional Dave] Lewis said he's been able to breach a system and take control of a person's laptop camera without their knowledge. "And it doesn't even always trip the light that shows the camera is live," he added. Unsurprisingly to many, women tend to be targets for this kind of hacking. It's more common than we think, said John Scott-Railton, a senior researcher at the ... University of Toronto. Scott-Railton said this practice is called "ratting," adding sometimes hackers will trade access to hacked computers. He said the same kind of software used to hack women's webcams is used to hack political dissidents, members of activist groups, and journalists. "These are people that are regularly targeted by different hacking groups because of their work. We have evidence that they're spied on through their webcams," he said.
Note: For more along these lines, see concise summaries of deeply revealing news articles on the disappearance of privacy.
From 2013 to 2015, the NSA and CIA doubled the number of warrantless searches they conducted for Americans’ data in a massive NSA database ostensibly collected for foreign intelligence purposes, according to a new intelligence community transparency report. The estimated number of search terms “concerning a known U.S. person” to get contents of communications within what is known as the 702 database was 4,672 - more than double the 2013 figure. And that doesn’t even include the number of FBI searches on that database. A recently released ... court ruling confirmed that the FBI is allowed to run any number of searches it wants on that database, not only for national security probes but also to hunt for evidence of traditional crimes. No estimates have ever been released of how often that happens. The missing data from the FBI is of great concern to privacy advocates. The USA Freedom Act, passed in June 2015, “conspicuously exempts the FBI” from disclosing how often it searches the 702 database, the Project on Government Oversight (POGO) wrote in a letter to the Director of National Intelligence, James Clapper, in October 2015. “There is every reason to believe the number of FBI queries far exceeds those of the CIA and NSA,” POGO wrote. “It is essential that you work with the attorney general to release statistics on the FBI’s use of U.S. person queries.” The new report also leaves unanswered how many Americans’ communications are collected in the first place.
The Obama administration on Thursday announced new rules that will let the NSA share vast amounts of private data gathered without warrant, court orders or congressional authorization with 16 other agencies, including the FBI, the Drug Enforcement Agency, and the Department of Homeland Security. The new rules allow ... those agencies to sift through raw data collected under a broad, Reagan-era executive order that gives the NSA virtually unlimited authority to intercept communications abroad. Previously, NSA analysts would filter out information they deemed irrelevant and mask the names of innocent Americans before passing it along. The last-minute adoption of the procedures is one of many examples of the Obama administration making new executive powers established by the Bush administration permanent, on the assumption that the executive branch could be trusted to police itself. Executive Order 12333 ... serves as authorization for the NSA’s most massive surveillance programs. In 2014, a former state department official described NSA surveillance under 12333 as a “universe of collection and storage” beyond what Congress has authorized. This massive database inevitably includes vast amount of American’s communications — swept up when they speak to people abroad, when they go abroad themselves, or even if their domestic communications are simply routed abroad. That’s why access was previously limited to data that had already been screened to remove unrelated information and information identifying U.S. persons.
Note: For an important viewpoint on the real complexities going on with recent reporting on Trump links to Russia, CIA involvement in Syria, and media manipulations, don't miss this provocative article by Glenn Greenwald and this interview he gave to Fox News. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.