As a 501(c)(3) nonprofit, we depend almost entirely on donations from people like you.
We really need your help to continue this work! Please consider making a donation.
Subscribe here and join over 13,000 subscribers to our free weekly newsletter

Privacy News Stories

Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

Explore our comprehensive news index on a wide variety of fascinating topics.
Explore the top 20 most revealing news media articles we've summarized.
Check out 10 useful approaches for making sense of the media landscape.

Sort articles by: Article Date | Date Posted on WantToKnow.info | Importance

US Pushing Local Cops to Stay Mum on Surveillance
2014-06-12, ABC News/Associated Press
Posted: 2014-06-16 16:42:57
http://abcnews.go.com/Politics/wireStory/us-pushing-local-cops-stay-mum-surve...

The Obama administration has been quietly advising local police not to disclose details about surveillance technology they are using to sweep up basic cellphone data from entire neighborhoods. Citing security reasons, the U.S. has intervened in routine state public records cases and criminal trials regarding use of the technology. This has resulted in police departments withholding materials or heavily censoring documents in rare instances when they disclose any [information] about the purchase and use of such powerful surveillance equipment. One well-known type of this surveillance equipment is known as a Stingray. The equipment tricks cellphones into identifying some of their owners' account information, like a unique subscriber number, and transmitting data to police as if it were a phone company's tower. That allows police to obtain cellphone information without having to ask for help from service providers ... and can locate a phone without the user even making a call or sending a text message. The Obama administration is asking agencies to withhold common information about the equipment, such as how the technology is used and how to turn it on. "These extreme secrecy efforts are in relation to very controversial, local government surveillance practices using highly invasive technology," said Nathan Freed Wessler, a staff attorney with the American Civil Liberties Union, which has fought for the release of these types of records. "People should have the facts about what the government is doing to them."

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Internet Giants Erect Barriers to Spy Agencies
2014-06-07, New York Times
Posted: 2014-06-16 16:39:51
http://www.nytimes.com/2014/06/07/technology/internet-giants-erect-barriers-t...

[Google engineers] are making it far more difficult and far more expensive for the National Security Agency and the intelligence arms of other governments around the world to pierce their systems. As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps. After years of cooperating with the government, the immediate goal now is to thwart Washington as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. A year after Mr. Snowdens revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in gray areas where there is no explicit requirement for a legal warrant. But governments are fighting back, harder than ever. The cellphone giant Vodafone reported ... that a small number of governments around the world have demanded the ability to tap directly into its communication networks [and] noted that some countries did not issue warrants to obtain phone, email or web-searching traffic, because the relevant agencies and authorities already have permanent access to customer communications via their own direct link.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Encouraging Words of Regret From Dean Baquet
2014-06-06, The Intercept
Posted: 2014-06-16 16:38:23
https://firstlook.org/theintercept/2014/06/06/encouraging-words-dean-baquet-w...

NPRs David Folkenflik has a revealing new look at ... one of the most important journalistic stories of the last decade: The New York Times 2004 decision ... to suppress for 15 months (through Bushs re-election) its reporters discovery that the NSA was illegally eavesdropping on Americans without warrants. This episode was one significant reason Edward Snowden purposely excluded the Times from his massive trove of documents. In an interview with Folkenflik, the papers new executive editor, Dean Baquet, describes the papers exclusion from the Snowden story as really painful. But ... Baquet has his own checkered history in suppressing plainly newsworthy stories at the governments request, including a particularly inexcusable 2007 decision, when he was the managing editor of The Los Angeles Times, to kill a story based on AT&T whistleblower Mark Kleins revelations that the NSA had built secret rooms at AT&T to siphon massive amounts of domestic telephone traffic. In his NPR interview, Baquet insists that he has had a serious change of heart on such questions as a result of the last year of NSA revelations: "[Baquet] says the experience has proved that news executives are often unduly deferential to seemingly authoritative warnings unaccompanied by hard evidence." Dean Baquets epiphany about the U.S. government and the American media ... is long overdue, but better late than never. Let us hope that it signals an actual change in behavior.

Note: For more on this, see concise summaries of deeply revealing media corruption news articles from reliable major media sources.


N.S.A. Collecting Millions of Faces From Web Images
2014-06-01, New York Times
Posted: 2014-06-09 08:19:10
http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-we...

The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents. The spy agencys reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world. The agencys ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed. The agency intercepts millions of images per day including about 55,000 facial recognition quality images which translate into tremendous untapped potential, according to 2011 documents obtained from the former agency contractor Edward J. Snowden. It is not clear how many people around the world, and how many Americans, might have been caught up in the effort. Neither federal privacy laws nor the nations surveillance laws provide specific protections for facial images. Civil-liberties advocates and other critics are concerned that the power of the improving technology, used by government and industry, could erode privacy. Facial recognition can be very invasive, said Alessandro Acquisti, a researcher on facial recognition technology at Carnegie Mellon University.

Note: For another New York Times article showing how the NSA is using mobile phone apps to "snatch data revealing the players location, age, sex and other personal information," see this article.


Vodafone: governments use secret cables to tap phones
2014-06-06, The Telegraph (One of the UK's leading newspapers)
Posted: 2014-06-09 08:17:46
http://www.telegraph.co.uk/technology/internet-security/10880208/Vodafone-gov...

Government agencies are able to listen to phone conversations live and even track the location of citizens without warrants using secret cables connected directly to network equipment, admits Vodafone today. The company said that secret wires have been connected to its network and those belonging to competitors, giving government agencies the ability to tap in to phone and broadband traffic. In many countries this is mandatory for all telecoms companies, it said. Vodafone is today publishing its first Law Enforcement Disclosure Report which will describe exactly how the governments it deals with are eavesdropping on citizens. It is calling for an end to the use of direct access eavesdropping and transparency on the number of warrants issued giving access to private data. Gus Hosein, executive director of Privacy International, said: "Vodafone is taking a commendable step by taking this issue on at an international scale. And they are trying to identify the legal basis for governments' claimed powers. Governments around the world are unashamedly abusing privacy by demanding access to communications and data, and alarmingly, sometimes granting themselves direct access to the networks. Now that Vodafone has been more open, the entire industry has cover to take the necessary next step of pushing back. Pushing back against bad requests is a start, pushing back against bad laws is the next step. The usefulness of transparency reports hinges on governments abiding by the rule of law. We now know that these reports only provide a limited picture of what is going on.

Note: For more on government surveillance of the world's population, see the deeply revealing reports from reliable major media sources available here.


Everyone should know just how much the government lied to defend the NSA
2014-05-17, The Guardian (One of the UK's leading newspapers)
Posted: 2014-05-26 10:24:23
http://www.theguardian.com/commentisfree/2014/may/17/government-lies-nsa-just...

Just before Edward Snowden became a household name, the ACLU argued before the supreme court that the FISA Amendments Act one of the two main laws used by the NSA to conduct mass surveillance was unconstitutional. In a sharply divided opinion, the Supreme Court ruled, 5-4, that the case should be dismissed because the plaintiffs didn't have "standing". The court relied on two claims by the Justice Department to support their ruling: 1) that the NSA would only get the content of Americans' communications without a warrant when they are targeting a foreigner abroad for surveillance, and 2) that the Justice Department would notify criminal defendants who have been spied on under the Fisa Amendments Act, so there exists some way to challenge the law in court. It turns out that neither of those statements were true. One of the most explosive Snowden revelations exposed a then-secret technique known as "about" surveillance. As the New York Times first reported, the NSA "is searching the contents of vast amounts of Americans' e-mail and text communications into and out of the country, hunting for people who mention information about foreigners under surveillance." In other words, the NSA doesn't just target a contact overseas it sweeps up everyone's international communications into a dragnet and searches them for keywords. The Snowden leaks also pushed the Justice Department to admit ... that the government hadn't been notifying any defendants they were being charged based on NSA surveillance.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas
2014-05-19, The Intercept
Posted: 2014-05-26 10:22:44
https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-...

The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system code-named SOMALGET that was implemented without the knowledge or consent of the Bahamian government. SOMALGET is part of a broader NSA program called MYSTIC, which ... is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called metadata information that reveals the time, source, and destination of calls SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate international narcotics traffickers and special-interest alien smugglers traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Fine Line Seen in U.S. Spying on Companies
2014-05-21, New York Times
Posted: 2014-05-26 10:21:19
http://www.nytimes.com/2014/05/21/business/us-snooping-on-companies-cited-by-...

The National Security Agency has never said what it was seeking when it invaded the computers of Petrobras, Brazils huge national oil company, but angry Brazilians have guesses: the companys troves of data on Brazils offshore oil reserves, or perhaps its plans for allocating licenses for exploration to foreign companies. Nor has the N.S.A. said what it intended when it got deep into the computer systems of China Telecom, one of the largest providers of mobile phone and Internet services in Chinese cities. But documents released by Edward J. Snowden, the former agency contractor now in exile in Russia, leave little doubt that the main goal was to learn about Chinese military units, whose members cannot resist texting on commercial networks. The agencys interest in Huawei, the giant Chinese maker of Internet switching equipment, and Pacnet, the Hong Kong-based operator of undersea fiber optic cables, is more obvious: Once inside those companies proprietary technology, the N.S.A. would have access to millions of daily conversations and emails that never touch American shores. The [US] government does not deny it routinely spies to advance American economic advantage, which is part of its broad definition of how it protects American national security. While the N.S.A. cannot spy on Airbus and give the results to Boeing, it is free to spy on European or Asian trade negotiators and use the results to help American trade officials and, by extension, ... American industries.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


United States Of Secrets
2014-05-12, KPBS.org
Posted: 2014-05-19 07:37:03
http://www.kpbs.org/news/2014/may/12/frontline-united-states-secrets/

When NSA contractor Edward Snowden downloaded tens of thousands of top-secret documents from a highly secure government network, it led to the largest leak of classified information in history and sparked a fierce debate over privacy, technology and democracy in the post-9/11 world. Now, in "United States Of Secrets," FRONTLINE goes behind the headlines to reveal the dramatic inside story of how the U.S. government came to monitor and collect the communications of millions of people around the worldincluding ordinary Americansand the lengths they went to trying to hide the massive surveillance program from the public. This is as close to the complete picture as anyone has yet put together and its bigger and more pervasive than we thought, says veteran FRONTLINE filmmaker Michael Kirk. In part one ... Kirk [pieces] together the secret history of the unprecedented surveillance program that began in the wake of September 11 and continues today even after the revelations of its existence by Edward Snowden. Then, in part two, premiering Tuesday, May 20 ..., veteran FRONTLINE filmmaker Martin Smith continues the story, exploring the secret relationship between Silicon Valley and the National Security Agency, and investigating how the government and tech companies have worked together to gather and warehouse your data. Through in-depth interviews with more than 60 whistleblowers, elected officials, journalists, intelligence insiders and cabinet officials, we have woven together the secret narrative that reveals the scale and scope of the governments spying program, says Kirk.

Note: Don't miss this engaging program, available at this link. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Glenn Greenwald: the explosive day we revealed Edward Snowden's identity to the world
2014-05-11, The Guardian (One of the UK's leading newspapers)
Posted: 2014-05-19 07:35:35
http://www.theguardian.com/world/2014/may/11/glenn-greenwald-nsa-whistleblowe...

On Sunday 9 June 2013, the Guardian published the story that revealed [Edward] Snowden to the world. The article told Snowden's story, conveyed his motives, and proclaimed that "Snowden will go down in history as one of America's most consequential whistleblowers, alongside Daniel Ellsberg and Bradley [now Chelsea] Manning." We quoted [a note from Snowden that said:] "I understand that I will be made to suffer for my actions but I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant." The reaction to the article and the video was more intense than anything I had experienced as a writer. Ellsberg himself, writing the following day in the Guardian, proclaimed that "there has not been in American history a more important leak than Edward Snowden's release of NSA material and that definitely includes the Pentagon Papers 40 years ago". Several hundred thousand people posted the link to their Facebook accounts in the first several days alone. Almost three million people watched the interview on YouTube. Many more saw it on the Guardian's website. The overwhelming response was shock and inspiration at Snowden's courage.

Note: Don't miss the full, exciting story of how Snowden originally came to leak his stunning information at the link above. This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Glenn Greenwald: from Martin Luther King to Anonymous, the state targets dissenters not just "bad guys"
2014-05-13, The Guardian (One of the UK's leading newspapers)
Posted: 2014-05-19 07:33:34
http://www.theguardian.com/world/2014/may/13/glenn-greenwald-anonymous-mass-s...

The opportunity those in power have to characterise political opponents as "national security threats" or even "terrorists" has repeatedly proven irresistible. In the past decade, the government ... has formally so designated environmental activists, broad swaths of anti-government rightwing groups, anti-war activists, and associations organised around Palestinian rights. One document from the Snowden files, dated 3 October 2012, chillingly underscores the point. It revealed that the agency has been monitoring the online activities of individuals it believes express "radical" ideas and who have a "radicalising" influence on others. Among the information collected about the individuals, at least one of whom is a "US person", are details of their online sex activities and "online promiscuity." The agency discusses ways to exploit this information to destroy their reputations and credibility. The record is suffused with examples of groups and individuals being placed under government surveillance by virtue of their dissenting views and activism Martin Luther King, the civil rights movement, anti-war activists, environmentalists. The NSA's treatment of Anonymous ... is especially troubling and extreme. Gabriella Coleman, a specialist on Anonymous at McGill University, said that [Anonymous] "is not a defined" entity but rather "an idea that mobilises activists to take collective action and voice political discontent. It is a broad-based global social movement with no centralised or official organised leadership structure. Some have rallied around the name to engage in digital civil disobedience, but nothing remotely resembling terrorism."

Note: This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Keith Alexander Unplugged: on Bush/Obama, 1.7 million stolen documents
2014-05-08, The Intercept
Posted: 2014-05-12 07:17:19
https://firstlook.org/theintercept/2014/05/08/keith-alexander-unplugged-busho...

Back in December, 60 Minutes broadcast a now-notorious segment of pure access journalism in which they gullibly disseminated one false NSA claim after the next. The program claimed that Snowden is believed to still have access to 1.5 million classified documents he has not leaked. Ever since then, that Snowden stole 1.7 or 1.8 million documents from the NSA has been repeated over and over again by US media outlets as verified fact. The Washington Posts Walter Pincus, citing an anonymous official source, purported to tell readers that among the roughly 1.7 million documents he walked away with the vast majority of which have not been made public are highly sensitive, specific intelligence reports. Reuters frequently includes in its reports the unchallenged assertion that Snowden was believed to have taken 1.7 million computerized documents. In fact, that number is and always has been a pure fabrication, as even Keith Alexander admits. The claimed number has changed more times than one can count: always magically morphing into randomly chosen higher and scarier numbers. The reality, in the words of the General, is that the US Government really [doesn't know] what he actually took with him and they dont have an accurate way of counting. All they know is how many documents he accessed in his entire career at NSA, which is a radically different question from how many documents he took. But that hasnt stopped American media outlets from repeatedly affirming the inflammatory evidence-free claim that Snowden took 1.7 million documents.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Snowden: Why hasnt the Director of National Intelligence been punished for lying to Congress
2014-05-01, Washington Post blog
Posted: 2014-05-05 11:28:37
http://www.washingtonpost.com/blogs/the-switch/wp/2014/05/01/snowden-why-hasn...

Former National Security Agency contractor Edward Snowden, and one of the reporters who first broke the news of Snowden's documents, Laura Poitras, received a Ridenhour Truth-Teller prize [on April 30] to a standing ovation at the National Press Club. Snowden leaked classified documents that exposed the NSA's massive global surveillance programs. Snowden ... compared his actions with that of Director of National Intelligence James R. Clapper, who denied that the NSA was "wittingly" collecting data on millions of Americans in a Senate Intelligence Committee hearing last spring -- a claim at odds with revelations about domestic phone records collection as a result of documents provided by Snowden. "The oath that I remember is James Clapper raising his hand, swearing to tell the truth and then lying to the American public," Snowden said. "I also swore an oath, but that oath was not to secrecy, but to defend the American Constitution." While Clapper has accused Snowden of perpetrating the most "massive and damaging theft of intelligence" in U.S. history, Snowden argues his actions were serving a larger public interest that superseded the national intelligence need for secrecy. Later in the speech, he described Clapper as having "committed a crime by lying under oath to the American people," and questioned why charges were never brought against the director. By contrast, Snowden said, charges were brought against him soon after he revealed himself as the source of the leaks.

Note: For more on the construction of a total surveillance state, see the deeply revealing reports from reliable major media sources available here.


British Spy Chiefs Secretly Begged to Play in NSAs Data Pools
2014-04-30, The Intercept
Posted: 2014-05-05 11:27:04
https://firstlook.org/theintercept/article/2014/04/30/gchq-prism-nsa-fisa-uns...

Britains electronic surveillance agency, Government Communications Headquarters [GCHQ], has long presented its collaboration with the National Security Agencys massive electronic spying efforts as proportionate, carefully monitored, and well within the bounds of privacy laws. But according to a top-secret document in the archive of material provided to The Intercept by NSA whistleblower Edward Snowden, GCHQ secretly coveted the NSAs vast troves of private communications and sought unsupervised access to its data as recently as last year. The document, dated April 2013, reveals that GCHQ requested broad new authority to tap into data collected under a law that authorizes a variety of controversial NSA surveillance initiatives, including the PRISM program. PRISM is a system used by the NSA and the FBI to obtain the content of personal emails, chats, photos, videos, and other data processed by nine of the worlds largest internet companies, including Google, Yahoo!, Microsoft, Apple, Facebook, and Skype. The arrangement GCHQ proposed would also have provided the British agency with greater access to millions of international phone calls and emails that the NSA siphons directly from phone networks and the internet. The Snowden files do not indicate whether NSA granted GCHQs request, but they do show that the NSA was supportive of the idea, and that GCHQ was permitted extensive access to PRISM during the London Olympics in 2012. The request for the broad access was communicated at leadership level.

Note: For more on the construction of a total surveillance state, see the deeply revealing reports from reliable major media sources available here.


Stories about NSA surveillance, Snowden leaks win Pulitzers for two news groups
2014-04-14, CNN
Posted: 2014-04-21 08:17:39
http://www.cnn.com/2014/04/14/us/pulitzer-prizes-journalism

Two news organizations' stories about National Security Agency surveillance, based upon documents leaked by Edward Snowden, have been awarded the Pulitzer Prize for public service, often described as the highest prize in American journalism. The Washington Post and ... The Guardian each received the prize on [April 14]. The recognition of the NSA reporting was most significant because of the questions raised by Snowden's leaks and the reaction to them. Snowden, who has been living in Russia while seeking asylum from U.S. prosecution, said in a statement that the Pulitzer board's recognition of the coverage was "vindication for everyone who believes that the public has a role in government." "We owe it to the efforts of the brave reporters and their colleagues who kept working in the face of extraordinary intimidation, including the forced destruction of journalistic materials, the inappropriate use of terrorism laws, and so many other means of pressure to get them to stop what the world now recognizes was work of vital public importance." While Snowden provided a trove of documents, reporters including Glenn Greenwald, working for the Guardian; Barton Gellman, working for The Post; and Laura Poitras, who worked with both, pored over the raw information, decided with their editors what parts were ethical to publish, and turned the information into stories that stunned readers around the world.

Note: For more on the historic Snowden revelations, see the deeply revealing reports from reliable major media sources available here.


The Cuban Twitter Scam Is a Drop in the Internet Propaganda Bucket
2014-04-04, The Intercept
Posted: 2014-04-14 07:44:13
https://firstlook.org/theintercept/2014/04/04/cuban-twitter-scam-social-media...

This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create a Twitter-like Cuban communications network run through secret shell companies in order to create the false appearance of being a privately owned operation. Unbeknownst to the services Cuban users was the fact that American contractors were gathering their private data in the hope that it might be used for political purposesspecifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. This sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for propaganda, deception, mass messaging, and pushing stories. One previously undisclosed top-secret documentprepared by GCHQ for the 2010 annual SIGDEV gathering of the Five Eyes surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda. Those programs, carried out in secrecy and with little accountability ... threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


NSA performed warrantless searches on Americans' calls and emails Clapper
2014-04-01, The Guardian (One of the UK's leading newspapers)
Posted: 2014-04-07 14:47:16
http://www.theguardian.com/world/2014/apr/01/nsa-surveillance-loophole-americ...

US intelligence chiefs have confirmed that the National Security Agency has [performed] warrantless searches on Americans communications. The NSA's collection programs are ostensibly targeted at foreigners, but in August the Guardian revealed a secret rule change allowing NSA analysts to search for Americans' details within the databases. Now, in a letter to Senator Ron Wyden, an Oregon Democrat on the intelligence committee, the director of national intelligence, James Clapper, has confirmed the use of this legal authority to search for data related to US persons. The legal authority to perform the searches, revealed in top-secret NSA documents provided ... by Edward Snowden, was denounced by Wyden as a backdoor search loophole. Many of the NSA's most controversial programs collect information under the law affected by the so-called loophole. These include Prism, which allows the agency to collect data from Google, Apple, Facebook, Yahoo and other tech companies, and the agency's Upstream program a huge network of internet cable taps. Confirmation that the NSA has searched for Americans communications in its phone call and email databases complicates President Barack Obamas initial defenses of the broad surveillance in June. Wyden and Udall [said] Todays admission by the Director of National Intelligence is further proof that meaningful surveillance reform must include closing the back-door searches loophole and requiring the intelligence community to show probable cause before deliberately searching through ... the communications of individual Americans."

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


NSA surveillance program reaches into the past to retrieve, replay phone calls
2014-03-18, Washington Post
Posted: 2014-03-25 10:35:54
http://www.washingtonpost.com/world/national-security/nsa-surveillance-progra...

The National Security Agency has built a surveillance system capable of recording 100 percent of a foreign countrys telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. A senior manager for the program compares it to a time machine one that can replay the voices from any call without requiring that a person be identified in advance for surveillance. The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for retrospective retrieval, and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere. In the initial deployment, collection systems are recording every single conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary. Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or cuts, for processing and long-term storage. At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.

Note: Though technically it is illegal for the NSA to snoop on Americans without good cause, all they have to do is to share this technology with another country like the UK, and then ask the UK to do the snooping and send the results back to them, thereby circumventing the law. For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.


NSA posed as Facebook to infect computers with malware, report says
2014-03-12, Los Angeles Times
Posted: 2014-03-25 10:34:06
http://www.latimes.com/business/technology/la-fi-tn-nsa-posing-facebook-malwa...

The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010. At times the agency pretended to be Facebook to install its malware. The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware "implants" capable of spying on users, according to the Intercept, which cited documents provided by whistleblower Edward Snowden. Between 85,000 and 100,000 of these implants have been deployed worldwide thus far. To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook. The federal agency performed what is known as a "man-on-the-side" attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user's computer and extracted data from their hard drive. Facebook said it had no knowledge of the NSA"s TURBINE program. However, [Facebook] said it is no longer possible for the NSA or hackers to attack users that way, but Facebook warned that other websites and social networks may still be vulnerable to those types of attacks. "This method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year," Facebook told the National Journal.

Note: For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.


Indiana Woman Sues US Customs Over Detention
2014-02-20, CBS Cleveland
Posted: 2014-03-17 08:13:27
http://cleveland.cbslocal.com/2014/02/20/indiana-woman-sues-us-customs-over-d...

An Indiana University faculty member has sued two U.S. customs agents for detaining her after the government eavesdropped on emails she exchanged with a Greek friend. The American Civil Liberties Union of Indiana filed a federal lawsuit [on February 19] alleging the customs agents violated Christine Von Der Haars constitutional protection against unreasonable searches and seizures. This case raises troubling issues about the power of the government to detain and question citizens, said Ken Falk, the ACLU of Indiana legal director who represents Von Der Haar. The lawsuit alleges Von Der Haar, a senior lecturer in the sociology department at Indiana University in Bloomington, was confined in a guarded room at Indianapolis International Airport for more than 20 minutes on June 8, 2012, while she was questioned about her relationship with her friend. The lawsuit alleges the questioning was based on surreptitious monitoring of communications between Von Der Haar and her friend, Dimitris Papatheodoropoulus. The two communicated frequently through emails. Some of these emails were flirtatious and romantic in nature, the lawsuit said. Von Der Haar felt she had no choice but to answer questions from the agents, whom she believed to be armed, and did not believe she could leave until they released her, the lawsuit said. The detention of Dr. Von Der Haar was without cause or justification, the complaint said, and caused her anxiety, concern, distress and other damages. The lawsuit names the two customs agents as defendants and seeks damages.

Note: For more on government abuses of civil liberties, see the deeply revealing reports from reliable major media sources available here.


Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.