As of Oct 14, we're $11,900 in the red for the year. Please donate here to support this vital work.
Subscribe here to our free email list

Privacy News Stories
Excerpts of Key Privacy News Stories in Major Media


Below are highly revealing excerpts of important privacy news stories reported in the media that suggest a major cover-up. Links are provided to the full stories on their major media websites. If any link fails to function, read this webpage. These privacy news stories are listed by date posted to this webpage. You can explore the same articles listed by order of importance or by article date. By choosing to educate ourselves on these important issues and to spread the word, we can and will build a brighter future.

Note: This comprehensive list of privacy news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


Snowden Docs Show UK Spies Attacked Anonymous, Hackers
2014-02-04, NBC News
Posted: 2019-10-06 17:31:52
https://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attac...

A secret British spy unit created to mount cyber attacks on Britain’s enemies has waged war on the hacktivists of Anonymous and LulzSec, according to documents taken from the National Security Agency by Edward Snowden and obtained by NBC News. The blunt instrument the spy unit used to target hackers, however, also interrupted the web communications of political dissidents who did not engage in any illegal hacking. It may also have shut down websites with no connection to Anonymous. A division of Government Communications Headquarters (GCHQ), the British counterpart of the NSA, shut down communications among Anonymous hacktivists by launching a “denial of service” (DDOS) attack – the same technique hackers use to take down bank, retail and government websites – making the British government the first Western government known to have conducted such an attack. The documents ... show that the unit known as the Joint Threat Research Intelligence Group, or JTRIG, boasted of using the DDOS attack – which it dubbed Rolling Thunder - and other techniques to scare away 80 percent of the users of Anonymous internet chat rooms. Among the methods listed in the document were jamming phones, computers and email accounts and masquerading as an enemy in a "false flag" operation. A British hacktivist known as T-Flow, who was prosecuted for hacking, [said] no evidence of how his identity was discovered ever appeared in court documents.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.


Is 'The Five Eyes Alliance' Conspiring to Spy on You?
2013-06-25, The Atlantic
Posted: 2019-09-23 15:41:04
https://www.theatlantic.com/politics/archive/2013/06/is-the-five-eyes-allianc...

Did you know that the United States, Canada, Britain, Australia, and New Zealand participate together in an electronic eavesdropping cooperative called "The Five Eyes Alliance"? Or that Britain "has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency"? One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects. This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites - all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets. Say you're the NSA. By law, there are certain sorts of spying you're not lawfully allowed to do on Americans. (And agency rules constraining you too.) But wait. Allied countries have different laws and surveillance rules. Put bluntly, intelligence agencies have an incentive to make themselves complicit in foreign governments spying on their own citizens.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


San Diego Police Department ramps up use of streetlamp video cameras, ACLU raises surveillance concerns
2019-08-04, San Diego Tribune
Posted: 2019-08-26 15:55:26
https://www.sandiegouniontribune.com/news/public-safety/story/2019-08-04/san-...

San Diego has installed thousands of microphones and cameras in so-called smart streetlamps in recent years as part of a program to assess traffic and parking patterns throughout the city. However, the technology over the last year caught the attention of law enforcement. Today, such video has been viewed in connection with more than 140 police investigations. Officers have increasingly turned to the footage to help crack cases, as frequently as 20 times a month. Police department officials have said that the video footage has been crucial in roughly 40 percent of these cases. Privacy groups have voiced concerns about a lack of oversight, as law enforcement has embraced the new technology. Groups, such as the American Civil Liberties Union, have pushed city councils across the country to adopt surveillance oversight ordinances that create strict rules around using everything from license plate readers to gunshot-detection systems to streetlamp cameras. San Diego’s smart streetlamp program started around 2016. Three years later, it’s still unclear what the data will ultimately be used for. Right now, only the police department has the authority to view the actual video footage. This arrangement has disturbed Matt Cagle, technology and civil liberties attorney with the ACLU. “This sounds like the quote, ‘just trust us’ approach to surveillance technology, which is a recipe for invasive uses and abuse of these systems,” he said.

Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.


The Trump Administration Is Using the Full Power of the U.S. Surveillance State Against Whistleblowers
2019-08-04, The Intercept
Posted: 2019-08-26 15:52:35
https://theintercept.com/2019/08/04/whistleblowers-surveillance-fbi-trump/

While we all live under extensive surveillance, for government employees and contractors - especially those with a security clearance - privacy is virtually nonexistent. Everything they do on their work computers is monitored. Even when they try to outsmart their work computer by taking photos directly of their screen, video cameras in their workplace might be recording their every move. Government workers with security clearance promise “never [to] divulge classified information to anyone” who is not authorized to receive it. But for many whistleblowers, the decision to go public results from troubling insights into government activity, coupled with the belief that as long as that activity remains secret, the system will not change. The growing use of the Espionage Act, a 1917 law that criminalizes the release of “national defense” information by anyone “with intent or reason to believe that it is to be used to the injury of the United States or to the advantage of a foreign nation,” shows how the system is rigged against whistleblowers. Government insiders charged under the law are not allowed to defend themselves by arguing that their decision to share what they know was prompted by an impulse to help Americans confront and end government abuses. “The act is blind to the possibility that the public’s interest ... might outweigh the government’s interest,” Jameel Jaffer, head of the Knight First Amendment Institute, wrote recently. “It is blind to the difference between whistle-blowers and spies.”

Note: The above article includes the stories of four whistleblowers charged under the Espionage act. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


Apple contractors 'regularly hear confidential details' on Siri recordings
2019-07-26, The Guardian (One of the UK's leading newspapers)
Posted: 2019-08-12 22:24:54
https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularl...

Apple contractors regularly hear confidential medical information, drug deals, and recordings of couples having sex, as part of their job providing quality control, or “grading”, the company’s Siri voice assistant. Although Apple does not explicitly disclose it in its consumer-facing privacy documentation, a small proportion of Siri recordings are passed on to contractors working for the company around the world. Apple says the data “is used to help Siri and dictation ... understand you better and recognise what you say”. But the company does not explicitly state that that work is undertaken by humans who listen to the pseudonymised recordings. A whistleblower working for the firm, who asked to remain anonymous due to fears over their job, expressed concerns about this lack of disclosure, particularly given the frequency with which accidental activations pick up extremely sensitive personal information. The whistleblower said: “There have been countless instances of recordings featuring private discussions. These recordings are accompanied by user data showing location, contact details, and app data.” Although Siri is included on most Apple devices, the contractor highlighted the Apple Watch and the company’s HomePod smart speaker as the most frequent sources of mistaken recordings. As well as the discomfort they felt listening to such private information, the contractor said they were motivated to go public about their job because of their fears that such information could be misused.

Note: For more along these lines, see concise summaries of deeply revealing news articles on the disappearance of privacy from reliable major media sources.


Amazon reportedly employs thousands of people to listen to your Alexa conversations
2019-04-11, CNN News
Posted: 2019-04-22 02:30:19
https://www.cnn.com/2019/04/11/tech/amazon-alexa-listening/index.html

Not only is Alexa listening when you speak to an Echo smart speaker, an Amazon employee is potentially listening, too. Amazon (AMZN) employs a global team that transcribes the voice commands captured after the wake word is detected and feeds them back into the software ... Bloomberg reports. Amazon reportedly employs thousands of full-time workers and contractors in several countries, including the United States, Costa Rica and Romania, to listen to as many as 1,000 audio clips in shifts that last up to nine hours. The audio clips they listen to were described as "mundane" and even sometimes "possibly criminal," including listening to a potential sexual assault. In a response to the story, Amazon confirmed to CNN Business that it hires people to listen to what customers say to Alexa. Amazon doesn't "explicitly" tell Alexa users that it employs people to listen to the recordings. Amazon said in its frequently asked question section that it uses "requests to Alexa to train our speech recognition and natural language understanding systems." People can opt out of Amazon using their voice recordings to improve the software in the privacy settings section of the Alexa app. Alexa auditors don't have access to the customers' full name or address, but do have the device's serial number and the Amazon account number associated with the device. Amazon previously has been embroiled in controversy for privacy concerns regarding Alexa.

Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy.


The great Equifax mystery: 17 months later, the stolen data has never been found, and experts are starting to suspect a spy scheme
2019-02-13, CNBC News
Posted: 2019-04-06 23:15:46
https://www.cnbc.com/2019/02/13/equifax-mystery-where-is-the-data.html

On Sept. 7, 2017, the world heard an alarming announcement from credit ratings giant Equifax: In a brazen cyberattack, somebody had stolen sensitive personal information from more than 140 million people, nearly half the population of the U.S. The information included Social Security numbers, driver's license numbers, information from credit disputes and other personal details. Then, something unusual happened. The data disappeared. Completely. CNBC talked to eight experts. All of them agreed that a breach happened, and personal information from 143 million people was stolen. But none of them knows where the data is now. Security experts haven't seen the data used in any of the ways they'd expect in a theft like this — not for impersonating victims, not for accessing other websites, nothing. Most experts familiar with the case now believe that the thieves were working for a foreign government and are using the information not for financial gain, but to try to identify and recruit spies. One former senior intelligence official ... summarized the prevailing expert opinion on how the foreign intelligence agency is using the data. First, he said, the foreign government is probably combining this information with other stolen data, then analyzing it using artificial intelligence or machine learning to figure out who's likely to be — or to become — a spy for the U.S. government. Second, credit reporting data provides compromising information that can be used to turn valuable people into agents of a foreign government.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


Leaked Documents Show the Government Tracking Journalists
2019-03-16, NBC (Los Angeles affiliate)
Posted: 2019-03-25 04:05:32
https://www.nbclosangeles.com/news/national-international/Source-Leaked-Docum...

The U.S. government created a secret database of activists, journalists, and social media influencers tied to the migrant caravan and in some cases, placed alerts on their passports. At the end of 2018, roughly 5,000 immigrants from Central America made their way north through Mexico to the United States southern border. As the migrant caravan reached the San Ysidro Port of Entry in south San Diego County, so did journalists, attorneys, and advocates who were there to work and witness the events unfolding. But in the months that followed, journalists who covered the caravan, as well as those who offered assistance to caravan members, said they felt they had become targets of intense inspections and scrutiny by border officials. Documents leaked to NBC 7 Investigates show [that the] government had listed their names in a secret database of targets, where agents collected information on them. Some had alerts placed on their passports, keeping at least two photojournalists and an attorney from entering Mexico to work. The documents were provided to NBC 7 by a Homeland Security source on the condition of anonymity. The individuals listed include ten journalists, seven of whom are U.S. citizens, a U.S. attorney, and 48 people from the U.S. and other countries, labeled as organizers, instigators or their roles “unknown.” In addition to flagging the individuals for secondary screenings, the Homeland Security source told NBC 7 that the agents also created dossiers on each person listed.

Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.


The cashless society is a con – and big finance is behind it
2018-07-19, The Guardian (One of the UK's leading newspapers)
Posted: 2019-03-25 04:01:08
https://www.theguardian.com/commentisfree/2018/jul/19/cashless-society-con-bi...

All over the western world banks are shutting down cash machines and branches. They are trying to push you into using their digital payments and digital banking infrastructure. Financial institutions ... are trying to nudge us towards a cashless society and digital banking. The true motive is corporate profit. Payments companies such as Visa and Mastercard want to increase the volume of digital payments services they sell, while banks want to cut costs. The nudge requires two parts. First, they must increase the inconvenience of cash. Second, they must vigorously promote the alternative. But a cashless society is not in your interest. It is in the interest of banks and payments companies. Their job is to make you believe that it is in your interest too, and they are succeeding in doing that. The recent Visa chaos, during which millions of people who have become dependent on digital payment suddenly found themselves stranded when the monopolistic payment network crashed, was a temporary setback. Digital systems may be “convenient”, but they often come with central points of failure. Cash, on the other hand, does not crash. It does not rely on external data centres, and is not subject to remote control or remote monitoring. The cash system allows for an unmonitored “off the grid” space. This is also the reason why financial institutions and financial technology companies want to get rid of it. Cash transactions are outside the net that such institutions cast to harvest fees and data.

Note: For more on this questionable trend, see this article and this one in the UK's Guardian. For more along these lines, see concise summaries of deeply revealing news articles on financial industry corruption and the disappearance of privacy.


Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret
2018-12-10, New York Times
Posted: 2019-01-06 02:04:39
https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy...

At least 75 companies receive anonymous, precise location data from apps whose users enable location services. Several of those businesses claim to track up to 200 million mobile devices in the United States — about half those in use last year. The database reviewed by The Times ... reveals people’s travels in startling detail, accurate to within a few yards and in some cases updated more than 14,000 times a day. These companies sell, use or analyze the data to cater to advertisers, retail outlets and even hedge funds. It’s a hot market, with sales of location-targeted advertising reaching an estimated $21 billion this year. Businesses say their interest is in the patterns, not the identities, that the data reveals. They note that the information apps collect is tied not to someone’s name or phone number but to a unique ID. But those with access to the raw data — including employees or clients — could still identify a person without consent. They could follow someone they knew, by pinpointing a phone that regularly spent time at that person’s home address. More than 1,000 popular apps contain location-sharing code from such companies. Google’s Android system was found to have about 1,200 apps with such code, compared with about 200 on Apple’s iOS.

Note: For more along these lines, see concise summaries of deeply revealing privacy news articles from reliable major media sources.


How to Stop Apps From Tracking Your Location
2018-12-10, New York Times
Posted: 2019-01-06 02:03:12
https://www.nytimes.com/2018/12/10/technology/prevent-location-data-sharing.html

Hundreds of apps can follow your movements and share the details with advertisers, retailers and even hedge funds. It’s difficult to know for sure whether location data companies are tracking your phone. Any app that collects location data may share your information with other companies, as long as it mentions that somewhere in its privacy policy. You can head off much of the tracking on your own device by spending a few minutes changing settings. Here’s how to limit the snooping. How do I stop location tracking on iOS? Some apps have internal settings where you can indicate that you don’t want your location used for targeted advertising or other purposes. But the easiest method is to go through your device’s main privacy menu. First, open Settings and select Privacy, which has a blue icon with a white hand. Then select Location Services, which is at the top and has a little arrow. You’ll see a list of apps, along with the location setting for each. Tap on apps you want to adjust. Selecting “Never” blocks tracking by that app. The option “While Using the App” ensures that the app gets location only while in use. Choosing “Always,” allows the app to get location data even when not in use. How do I stop it on Android? First, open the Settings on your phone. On the main settings page, tap “Security & location.” On the next screen, tap Location, which can be found in the Privacy section. On the Location screen, tap “App-level permissions.” You’ll see a list of apps. To turn off location for an app, slide the toggle to the left.

Note: For more details, read the entire article at the link above. For more along these lines, see concise summaries of deeply revealing privacy news articles from reliable major media sources.


United States of Secrets: William Binney
2013-12-13, PBS
Posted: 2018-12-23 19:50:26
https://www.pbs.org/wgbh/pages/frontline/government-elections-politics/united...

A 36-year NSA veteran, William Binney resigned from the agency and became a whistleblower after discovering that elements of a data-monitoring program he had helped develop - nicknamed ThinThread - were being used to spy on Americans. So 2005, December, The New York Times article comes out. ... How important was it? "It touched on that real issues," [said Binney]. "The warrantless wiretapping was not really a major component of it, but it touched on the data mining, which is really, really the big issue, data mining of the metadata and content. That was really the big issue, because that's how you can monitor the entire population simultaneously, whereas the warrantless wiretaps were isolated cases. You could pick an isolated number of them and do them, whereas in the mining process, you would do the entire population." The administration [used] this article to start an aggressive whistleblowing hunt. "[On July 22, 2005] the FBI was in my house ... pointing a gun at me when I was coming out of the shower. The raid took about seven hours. At the time we didn't know that Tom Drake had gone to The Baltimore Sun," [said Binney]. "Material [Tom Drake was indicted for] was clearly marked unclassified, and all they did was draw a line through it and classified that material, and then they charged him with having classified material. It's like framing him. The judge in the court ... knew they were framing him," [said Biney].

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


You Snooze, You Lose: How Insurers Dodge The Costs Of Popular Sleep Apnea Devices
2018-11-21, NPR
Posted: 2018-12-10 21:28:35
https://www.npr.org/sections/health-shots/2018/11/21/669751038/you-snooze-you...

Last March, Tony Schmidt discovered something unsettling about the machine that helps him breathe at night. Without his knowledge, it was spying on him. From his bedside, the device was tracking when he was using it and sending the information not just to his doctor, but to the maker of the machine, to the medical supply company that provided it and to his health insurer. Schmidt, an information technology specialist ... was shocked. "I had no idea they were sending my information across the wire." Like millions of people, he relies on a continuous positive airway pressure, or CPAP, machine that streams warm air into his nose while he sleeps. Without it, Schmidt would wake up hundreds of times a night. As many CPAP users discover, the life-altering device comes with caveats: Health insurance companies are often tracking whether patients use them. If they aren't, the insurers might not cover the machines or the supplies that go with them. And, faced with the popularity of CPAPs ... and their need for replacement filters, face masks and hoses, health insurers have deployed a host of tactics that can make the therapy more expensive or even price it out of reach. A host of devices now gather data about patients, including insertable heart monitors and blood glucose meters. Privacy laws have lagged behind this new technology, and patients may be surprised to learn how little control they have over how the data is used or with whom it is shared.

Note: For more along these lines, see concise summaries of deeply revealing news articles on health and the disappearance of privacy.


Internet Hacking Is About to Get Much Worse
2018-10-11, New York Times
Posted: 2018-12-03 04:54:30
https://www.nytimes.com/2018/10/11/opinion/internet-hacking-cybersecurity-iot...

It's no secret that computers are insecure. The risks are about to get worse, because computers are being embedded into physical devices and will affect lives, not just our data. Many of today’s new computers are not just screens that we stare at, but objects in our world with which we interact. A refrigerator is now a computer that keeps things cold; a car is now a computer with four wheels and an engine. These computers sense us and our environment, and they affect us and our environment. They talk to each other over networks ... and they have physical agency. They drive our cars, pilot our planes, and run our power plants. They control traffic, administer drugs ... and dispatch emergency services. These connected computers and the network that connects them - collectively known as “the internet of things” - affect the world in a direct physical manner. Computers fail differently than most other machines: It's not just that they can be attacked remotely - they can be attacked all at once. It’s impossible to take an old refrigerator and infect it with a virus or recruit it into a denial-of-service botnet, and a car without an internet connection simply can’t be hacked remotely. But that computer with four wheels and an engine? It - along with all other cars of the same make and model - can be made to run off the road, all at the same time. Do we want to allow vulnerable automobiles on the streets and highways during the weeks before a new security patch is written, tested, and distributed?

Note: A 2015 New York Times article called the Internet of Things a "train wreck in privacy and security". Read how a hacked vehicle may have resulted in journalist Michael Hastings' death in 2013. For more along these lines, see concise summaries of deeply revealing news articles on the disappearance of privacy and the risks of wireless technologies.


Feds have paid undercover informants in migrant caravan
2018-11-20, NBC News
Posted: 2018-11-26 07:27:14
https://www.nbcnews.com/politics/immigration/feds-have-paid-undercover-inform...

The Department of Homeland Security is gathering intelligence from paid undercover informants inside the migrant caravan that is now reaching the California-Mexico border as well as monitoring the text messages of migrants, according to two DHS officials. The 4,000 migrants, mainly from Honduras, have used WhatsApp text message groups as a way to organize and communicate along their journey to the California border, and DHS personnel have joined those groups to gather that information. The intelligence gathering techniques are combined with reports from DHS personnel working in Mexico. Paying informants, placing officers in the region or monitoring the communications of non-U.S. citizens is not illegal, said John Cohen, former acting undersecretary of intelligence for DHS, but it does raise some concerns about the allocation of resources. "Those resources have to come from some place. They are not being devoted to thwarting terrorist threats, mass shootings, mailed fentanyl coming into the country or cyberattacks," said Cohen. Cohen said the caravan presents a logistical and humanitarian issue, but because the vast majority of its members want to present themselves legally to claim asylum, it is not wise to devote a significant amount of intelligence resources to it. "I find it hard to believe that the highest risk facing this nation comes from this caravan," Cohen said.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


A rare peek into a Justice Department leak probe
2013-05-19, Washington Post
Posted: 2018-11-26 07:03:41
https://www.washingtonpost.com/local/a-rare-peek-into-a-justice-department-le...

The case of Stephen Jin-Woo Kim, the government adviser, and James Rosen, the chief Washington correspondent for Fox News, bears striking similarities to a sweeping leaks investigation disclosed last week in which federal investigators obtained records over two months of more than 20 telephone lines assigned to the Associated Press. At a time when President Obama’s administration is under renewed scrutiny for an unprecedented number of leak investigations, the Kim case provides a rare glimpse into the inner workings of one such probe. Court documents in the Kim case reveal how deeply investigators explored the private communications of a working journalist - and raise the question of how often journalists have been investigated as closely as Rosen was in 2010. The case also raises new concerns among critics of government secrecy about the possible stifling effect of these investigations on a critical element of press freedom: the exchange of information between reporters and their sources. “The latest events show an expansion of this law enforcement technique,” said attorney Abbe Lowell, who is defending Kim on federal charges filed in 2010 that he disclosed national defense information. “Individual reporters or small time periods have turned into 20 [telephone] lines and months of records with no obvious attempt to be targeted or narrow.” The Obama administration has pursued more such cases than all previous administrations combined.

Note: Read more about the Kim case in this article. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation.


CIA's ‘surveillance state’ is operating against us all
2018-11-05, The Hill (Top newspaper of Washington's political elite)
Posted: 2018-11-13 05:19:45
https://thehill.com/opinion/national-security/414804-surveillance-state-is-al...

Over time, the CIA upper echelon has secretly developed all kinds of policy statements and legal rationales to justify routine, widespread surveillance on U.S. soil of citizens who aren’t suspected of terrorism or being a spy. Newly declassified documents from 2014 ... reveal the CIA not only intercepted emails of U.S. citizens but they were emails of the most sensitive kind — written to Congress and involving whistleblowers reporting alleged wrongdoing within the Intelligence Community. The disclosures, kept secret until now, are two letters of “congressional notification” from the Intelligence Community inspector general at the time, Charles McCullough. He stated that during “routine counterintelligence monitoring of government computer systems,” the CIA collected emails between congressional staff and the CIA’s head of whistleblowing and source protection. McCullough added that he was concerned about the CIA’s “potential compromise to whistleblower confidentiality and the consequent ‘chilling effect’.” The March 2014 intercepts ... happened amid what’s widely referred to as the Obama administration’s war on whistleblowers and mass surveillance scandals. The evidence points to bad actors targeting candidate Donald Trump and his associates in part to keep them - and us - from learning about and digging into an even bigger scandal: our Intelligence Community increasingly spying on its own citizens, journalists, members of Congress and political enemies for the better part of two decades.

Note: The above article was written by Emmy award winning investigative journalist and former news anchor for CBS and CNN Sharyl Attkisson. She has been attacked numerous times for questioning the safety of vaccines and investigating too deeply into the lives of certain politicians. Her top-selling book Stonewalled describes her fight for truth against powerful political forces. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


How the Pentagon punished NSA whistleblowers
2016-05-22, The Guardian (One of the UK's leading newspapers)
Posted: 2018-11-13 04:52:37
https://www.theguardian.com/us-news/2016/may/22/how-pentagon-punished-nsa-whi...

By now, almost everyone knows what Edward Snowden did. He leaked top-secret documents revealing that the National Security Agency was spying on hundreds of millions of people. The key to Snowden’s effectiveness, according to Thomas Devine, the legal director of the Government Accountability Project (GAP), was that he practised “civil disobedience” rather than “lawful” whistleblowing. “None of the lawful whistleblowers who tried to expose the government’s warrantless surveillance ... had any success,” Devine told me. “They came forward ... but the government just said, ‘They’re lying. We’re not doing those things.’ And the whistleblowers couldn’t prove their case because the government had classified all the evidence.” The NSA whistleblowers were not leftwing peace nuts. They had spent their professional lives inside the US intelligence apparatus – devoted, they thought, to the protection of the homeland and defense of the constitution. They were political conservatives, highly educated, respectful of evidence, careful with words. And they were saying, on the basis of personal experience, that the US government was being run by people who were willing to break the law and bend the state’s awesome powers to their own ends. They were saying that laws and technologies had secretly been put in place that threatened to overturn the democratic governance Americans took for granted and shrink their liberties to a vanishing point.

Note: The article above was is adapted from Mark Hertsgaard’s book, Bravehearts: Whistle Blowing in the Age of Snowden. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


Inside China’s Dystopian Dreams: A.I., Shame and Lots of Cameras
2018-07-08, New York Times
Posted: 2018-11-05 02:24:54
https://www.nytimes.com/2018/07/08/business/china-surveillance-technology.html

China is reversing the commonly held vision of technology as a great democratizer, bringing people more freedom and connecting them to the world. In China, it has brought control. Cameras scan train stations for China’s most wanted. Billboard-size displays ... list the names of people who don’t pay their debts. Facial recognition scanners guard the entrances to housing complexes. Already, China has an estimated 200 million surveillance cameras. Such efforts supplement other systems that track internet use and communications, hotel stays, train and plane trips and even car travel. Invasive mass-surveillance software has been set up in the west to track members of the Uighur Muslim minority and map their relations with friends and family. [At] the intersection south of Changhong Bridge in the city of Xiangyang ... police put up cameras linked to facial recognition technology and a big, outdoor screen. Photos of lawbreakers were displayed alongside their names and government I.D. numbers. China’s surveillance companies are also looking to test the appetite for high-tech surveillance abroad. At home, China is preparing its people for next-level surveillance technology. A recent state-media propaganda film called “Amazing China” showed off a ... virtual map that provided police with records of utility use. “If there are anomalies, the system sends an alert,” a narrator says, as Chinese police officers pay a visit to an apartment with a record of erratic utility use.

Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy.


Apple Just Killed The 'GrayKey' iPhone Passcode Hack
2018-10-24, Forbes
Posted: 2018-10-28 21:32:13
https://www.forbes.com/sites/thomasbrewster/2018/10/24/apple-just-killed-the-...

Apple has managed to prevent the hottest iPhone hacking company in the world from doing its thing. In March, Atlanta-based Grayshift promised governments its GrayKey tech could crack the passcodes of the latest iOS models, right up to the iPhone X. From then on, Apple continued to invest in security in earnest, continually putting up barriers for Grayshift to jump over. Grayshift continued to grow, however, securing contracts with Immigration and Customs Enforcement, and the Secret Service. Now, though, Apple has put up what may be an insurmountable wall. Multiple sources familiar with the GrayKey tech tell Forbes the device can no longer break the passcodes of any iPhone running iOS 12 or above. On those devices, GrayKey can only do what’s called a “partial extraction,” sources from the forensic community said. That means police using the tool can only draw out unencrypted files and some metadata, such as file sizes and folder structures. Previously, GrayKey used “brute forcing” techniques to guess passcodes and had found a way to get around Apple’s protections preventing such repeat guesses. But no more. Though it’s clear Apple has locked GrayShift out, no one actually knows just how the iPhone maker has done it. Vladimir Katalov, chief of forensic tech provider Elcomsoft, has repeatedly uncovered weaknesses in Apple technology. But he was stumped too.

Note: For more along these lines, see concise summaries of deeply revealing privacy news articles from reliable major media sources.


Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.