Federal Bureau of Investigation (FBI)
- Homepage: http://www.fbi.gov/
December 2001: "The Mission of the FBI is to uphold the law through the investigation of violations of federal criminal law; to protect the United States from foreign intelligence and terrorist activities; to provide leadership and law enforcement assistance to federal, state, local, and international agencies; and to perform these responsibilities in a manner that is responsive to the needs of the public and is faithful to the Constitution of the United States." http://www.fbi.gov/fbinbrief/todaysfbi/mission.htm
March 2013: "Maintaining privacy on the Internet is nearly impossible. If you forget even once to enable your protections, or click on the wrong link, or type the wrong thing, and you've permanently attached your name to whatever anonymous service you're using. Monsegur slipped up once, and the FBI got him. If the director of the CIA can't maintain his privacy on the Internet, we've got no hope."http://www.cnn.com/2013/03/16/opinion/schneier-internet-surveillance/index.html
December 2012: "The NCTC currently maintains the Terrorist Identities Datamart Environment database, or TIDE, which holds data on more than 500,000 identities suspected of terror activity or terrorism links, including friends and families of suspects, and is the basis for the FBI’s terrorist watchlist."http://www.wired.com/threatlevel/2012/12/gov-dossiers-on-us-citizens/
November 2012: '"Government treats those drafts, things that you just leave on Google servers without ever sending, as a remote computing service," says Calabrese. "The law treats those draft emails the exact same way it treats your Google docs, [or] all your photos that you keep 'private' on Facebook." Which is to say, it doesn't treat them as particularly private at all: If you had a bunch of old letters in a worn shoebox under your bed, the FBI would need a warrant to get them. But if those same letters are online, in your password-protected email account, and they're more than six months old, the FBI doesn't need a warrant to take a peek. Reports suggest that the FBI did eventually obtain a warrant  to monitor Broadwell's email, but they could have uncovered an incredible amount of information without one. And that's just with FBI powers pertaining to a criminal investigation. When suspected foreign agents are involved, the FBI gets a bonus set of surveillance powers to draw from.'http://www.motherjones.com/politics/2012/11/cia-petraeus-fbi-broadwell-emails-privacy
November 2012: "WASHINGTON — High-level officials at the Federal Bureau of Investigation and the Justice Department were notified in the late summer that F.B.I. agents had uncovered what appeared to be an extramarital affair involving the director of the Central Intelligence Agency, David H. Petraeus, government officials said Sunday."http://www.nytimes.com/2012/11/12/us/us-officials-say-petraeuss-affair-known-in-summer.html
April 2012: "Frederic Whitehurst, a chemist and lawyer who worked in the FBI’s crime lab, testified that he was told by his superiors to ignore findings that did not support the prosecution’s theory of the bombing."http://www.washingtonpost.com/local/crime/doj-review-of-flawed-fbi-forensics-processes-lacked-transparency/2012/04/17/gIQAFegIPT_story.html
March 2012: "Representatives from governments, Interpol and the U.S. Federal Bureau of Investigationsaid they felt that ICANN's failure to enforce its own contractual agreements was damaging to Domain Name System users as well as end users."http://news.idg.no/cw/art.cfm?id=B2318066-9100-36AE-6DA668DCC8BE64C8
January 2012: 'On Thursday, the FBI dropped the hammer on MegaUpload founder Kim Dotcom and seven of his cohorts , alleging they pocketed tens of millions by "incentivizing" illegal file sharing across its cloud storage service.'http://www.infoworld.com/t/cringely/megaupload-the-content-cartel-strikes-back-184785
October 2011: "For years, the government implausibly claimed that if I were able to identify myself as the plaintiff in the case, irreparable damage to national security would result. But I did not believe then, nor do I believe now, that the FBI’s gag order was motivated by legitimate national security concerns. It was motivated by a desire to insulate the FBI from public criticism and oversight."http://www.washingtonpost.com/opinions/how-the-patriot-act-stripped-me-of-my-free-speech-rights/2011/10/20/gIQAXB53GM_story.html
September 2011: 'The Federal Bureau of Investigation listens in on foreign embassies and officials in the United States chiefly to track foreign spies, though any intelligence it obtains on other matters is passed on to the C.I.A. and other agencies. The intercepts are carried out by the F.B.I.’s Operational Technology Division, based in Quantico, Va., according to Matthew M. Aid, an intelligence writer who describes the bureau’s monitoring in a book, “Intel Wars,” scheduled for publication in January. Translators like Mr. Leibowitz work at an F.B.I. office in Calverton, Md.'http://www.nytimes.com/2011/09/06/us/06leak.html
June 2011: "American history is replete with assaults on liberties that first target foreigners, minorities and those on the political margins, then spread toward the mainstream. The 1917 Espionage Act, for example, was used to prosecute American labor leaders and other critics of the government, and the 1798 Alien Enemies Act was revived after Pearl Harbor to intern American citizens of Japanese ancestry. A similar process is taking place now, as the F.B.I. has begun using counterterrorism tools to search, infiltrate and investigate groups of American peace activists and labor leaders in the Midwest."http://www.nytimes.com/2011/06/23/opinion/23shipler.html
June 2011: "WASHINGTON — The Federal Bureau of Investigation is giving significant new powers to its roughly 14,000 agents, allowing them more leeway to search databases, go through household trash or use surveillance teams to scrutinize the lives of people who have attracted their attention."http://www.nytimes.com/2011/06/13/us/13fbi.html
May 2011: "Prosecutors have readily employed hardball investigatory methods. Late last year, agents at the Federal Bureau of Investigation conducted simultaneous raids of three large hedge funds, sending shock waves across Wall Street. Two of those funds have since closed."http://dealbook.nytimes.com/2011/05/11/prosecutors-hardball-tactics-produce-big-results-in-galleon-case/
February 2011: 'The fears were stoked by charges that the Federal Bureau of Investigation paid an informant to infiltrate their mosque and others in Southern California, according to a federal lawsuit filed Tuesday. The American Civil Liberties Union of Southern California and the Los Angeles chapter of the Council on American-Islamic Relations say in the suit that the informant, Craig Monteilh, violated members’ civil rights and subjected them to “indiscriminate surveillance” because of their religion.'http://www.nytimes.com/2011/02/25/us/25mosque.html
January 2011: "That's the issue facing the maintainers of OpenBSD, in light of allegations made in December  by a former government contractor named Gregory Perry, who claims knowledge of an FBI plan to insert back doors into the open source operating system. If they exist, the back doors would provide the FBI a means to monitor encrypted communications sent from OpenBSD systems."http://www.infoworld.com/d/developer-world/software-security-honesty-the-best-policy-285
December 2010: "* The FBI is building a database with the names and certain personal information, such as employment history, of thousands of U.S. citizens and residents whom a local police officer or a fellow citizen believed to be acting suspiciously. It is accessible to an increasing number of local law enforcement and military criminal investigators, increasing concerns that it could somehow end up in the public domain."http://projects.washingtonpost.com/top-secret-america/articles/monitoring-america/
December 2010: "Those arrested by the Justice Department and FBI included several figures suspected of channeling secrets from technology companies to hedge funds that then traded on that information but did not include any big names from Wall Street or corporate America."http://www.washingtonpost.com/wp-dyn/content/article/2010/12/17/AR2010121700287.html
October 2009: "A lawsuit (.pdf), filed by the American Civil Liberties Union on behalf of two Californians who were arrested and released, seeks to overturn a voter-approved law that became effective this year. Proposition 69 requires detainees to provide a saliva or sometimes a blood sample upon felony arrest. The sample is stored in state and FBI databases, even if the arrested person is never charged or convicted of a crime."http://www.wired.com/threatlevel/2009/10/dna-sampling-challenge
February 2010: "Three years after the FBI pledged to investigate more than 100 unsolved civil rights killings, the agency is ready to close all but a handful. Investigators say they have solved most of the mysteries behind the cases, but few will result in indictments, given the passage of decades, the deaths of prime suspects and the challenge of gathering evidence."http://www.washingtonpost.com/wp-dyn/content/article/2010/02/27/AR2010022703758.html
December 2008: "The F.B.I., which frequently investigates stock fraud cases either on its own or in partnership with the S.E.C., has also had a sharp decline in the number of white-collar cases it has brought in the last several years — partly a reflection of a huge shift in staffing and resources to counterterrorism operations since the Sept. 11 attacks, officials said."http://www.nytimes.com/2008/12/25/business/25fraud.html
December 2008: 'In transcripts of intercepted conversations released by the FBI on Tuesday, Mr Blagojevich is quoted as saying that a man referred to by officials as Senate Candidate Five would "raise me 500 grand. An emissary came. Then the other guy would raise a million, if I made him a senator".'http://news.bbc.co.uk/2/hi/americas/7777905.stm
November 2008: "This summer, however, the American Civil Liberties Union and Electronic Frontier Foundation sued the Justice Department, seeking documents related to the FBI's cell-phone tracking practices. Since August, they've received a stream of documents—the most recent batch on November 6—that were posted on the Internet last week. In a post on the progressive blog Daily Kos, ACLU spokesperson Rachel Myers drew attention to language in several of those documents implying that triggerfish have broader application than previously believed."http://arstechnica.com/news.ars/post/20081116-foia-docs-show-feds-can-lojack-mobiles-without-telco-help.html
August 2008: "WASHINGTON — A Justice Department plan would loosen restrictions on the Federal Bureau of Investigation to allow agents to open a national security or criminal investigation against someone without any clear basis for suspicion, Democratic lawmakers briefed on the details said Wednesday."http://www.nytimes.com/2008/08/21/washington/21fbi.html
June 2008: "The lawsuit adds to the considerable legal risks facing Bank of America as it prepares to absorb Countrywide in a takeover announced in January. Countrywide and its executives have been named as defendants in shareholder lawsuits, and the company’s practices are the subject of investigations by the Securities and Exchange Commission, the F.B.I. and the Federal Trade Commission, which oversees loan servicing companies."http://www.nytimes.com/2008/06/25/business/25mortgage.html
June 2008: "Instead, the report cites political and intelligence failures to understand the scope of the terrorist threat after the 1993 attack, as well as a failure to fully analyze the implications of the available information. It also blames the FBI and the CIA for failing to effectively communicate with each other, problems that were later addressed in the USA Patriot Act and the reorganization of the intelligence community."http://www.washingtonpost.com/wp-dyn/content/article/2008/06/17/AR2008061702819.html
June 2008: "At the Senate Judiciary Committee, senior F.B.I. officials described the bureau’s halting efforts in 2002 to protest harsh interrogations being carried out by the military at Guantánamo Bay, Cuba, and to make the case that traditional rapport-building methods worked far better."http://www.nytimes.com/2008/06/11/washington/11detain.html
May 2008: "Complaints by FBI agents about abusive interrogation tactics at Guantanamo Bay, Cuba, and other U.S. military sites reached the National Security Council but prompted no effort to curb questioning that the agents considered ineffective and possibly illegal, according to an internal audit released yesterday."http://www.washingtonpost.com/wp-dyn/content/article/2008/05/20/AR2008052001123.html
May 2008: "WASHINGTON — F.B.I. agents complained repeatedly, beginning in 2002, about the harsh interrogation tactics that military and C.I.A. interrogators were using in questioning terrorism suspects, like making them do dog tricks and parade in the nude in front of female soldiers, but their complaints appear to have had little effect, according to an exhaustive report released Tuesday by the Justice Department’s inspector general."http://www.nytimes.com/2008/05/21/washington/20cnd-detain.html
May 2008: "In considering the issue over the last 12 years, the two leading scientific bodies in the field -- the National Research Council and the FBI's DNA Advisory Board -- have reached the same conclusion: In cold hit cases, jurors should be given an adjusted calculation, called the database statistic, that adjusts for the number of comparisons made within a database."http://www.latimes.com/news/science/la-me-webdna9-2008may09,0,2968662.story
May 2008: "The F.B.I. seized hundreds of digital audio files from Mr. Pellicano’s computers in 2002. Scores have never been decrypted by the agency. So Serpent proved as impregnable as advertised — and some evidence, as Mr. Freeh predicted, might never be recovered."http://www.nytimes.com/2008/05/05/business/media/05trial.html
May 2008: 'The FBI was "dealing with a bureaucracy and a culture they didn't understand," she said. "Yemen operates on a different timeline than we do. We had one group working on a New York minute, and another on a 4,000-year-old history."'http://www.washingtonpost.com/wp-dyn/content/article/2008/05/03/AR2008050302047_pf.html
April 2008: "The Federal Bureau of Investigation has 17 open inquiries into accusations of corporate fraud in connection with the subprime scandal, and Neil Power, who leads the bureau’s economics crime unit, said in an interview that the number was certain to grow. The F.B.I. has publicly identified only one target — the Doral Financial Corporation, a mortgage company based in Puerto Rico whose former treasurer has already been indicted — but major companies like Countrywide Financial, once the nation’s biggest mortgage lender, have also been reported to be under criminal investigation."http://www.nytimes.com/2008/04/09/washington/09justice.html
March 2008: 'A year ago, lawmakers of both parties called for limits on the FBI's use of the security letters, which demand consumer information from banks, credit card companies and other institutions without a warrant as part of investigations into suspected terrorism and espionage. Congress has not followed through with legislation, however, and Mueller sought to assure lawmakers that internal changes will solve the problems. He said new FBI procedures will "minimize the chance of future lapses," including the creation of a compliance office tasked with monitoring the use of security letters.'http://www.washingtonpost.com/wp-dyn/content/article/2008/03/05/AR2008030500463.html
January 2008: "The Federal Bureau of Investigation, according to its budget request for 2008, maintains more than 15,000 secret informants; the Drug Enforcement Administration, according to an internal audit from 2005, has about 4,000 at a time on its payroll."http://www.nytimes.com/2008/01/27/nyregion/27informants.html
January 2008: 'Judy Orihuela, spokeswoman for the FBI's Miami office, insists the agency will investigate any group that intends to violate U.S. law and poses a violent threat. At the Department of Justice in Washington, Dean Boyd, a spokesman for the national security division, rejects the notion that federal law enforcement shows leniency toward exile militants. Boyd maintains the DOJ would never attempt to influence a local case for political reasons and is blind to community or political pressure. "We pursue charges based on the evidence, not on other considerations," he says.'http://www.salon.com/news/feature/2008/01/14/cuba/
November 2007: "The FBI's search of Jefferson's office in 2005 produced a bipartisan outcry on Capitol Hill from members who said the Justice Department was upsetting the balance of power between the executive and legislative branches. As a result of the controversy, the FBI has not reviewed or used any of the papers it seized. For that reason, the appellate ruling does not have any effect on Jefferson's case. He was indicted this year on other evidence of racketeering and bribery."http://www.washingtonpost.com/wp-dyn/content/article/2007/11/20/AR2007112002009.html
October 2007: As the end of his tour approached, Diaz’s frustration was growing. The prisoner-abuse files that he and others had compiled now filled two large binders. One statement, from a senior F.B.I. official, suggested that the military authorities had ignored complaints from bureau agents about harsh interrogation techniques. Another recounted a detainee’s claim that a guard had thrown him to the ground and rubbed his face violently in the dirt after the prisoner spat at him. Diaz found the report credible — the file included a photograph of the prisoner’s mangled face — and was surprised that it was not included among the allegations that the military made public.http://www.nytimes.com/2007/10/21/magazine/21Diaz-t.html
September 2007: The intelligence officials, including the directors of the C.I.A., the F.B.I. and the National Security Agency, said in court filings that the vast disclosure would reveal counterterrorism activities and could disrupt intelligence gathering. They also said assembling the information was so time-consuming that the effort had distracted the agencies from terrorism investigations.http://www.nytimes.com/2007/09/12/washington/12gitmo.html
August 2007: The FBI has quietly built a sophisticated, point-and-click surveillance system that performs instant wiretaps on almost any communications device, according to nearly a thousand pages of restricted documents newly released under the Freedom of Information Act.http://www.wired.com/politics/security/news/2007/08/wiretap
August 2007: When Federal Bureau of Investigation agents first took Padilla into custody, administration officials thought they had nabbed an intelligence prize. Five years later, legal and intelligence analysts say, these claims look increasingly hollow as the administration maneuvers to keep Padilla from having a meaningful day in court. Its tactics are also keeping the public from knowing the truth about Padilla and the dirty-bomb plot, they say.http://www.csmonitor.com/2007/0815/p01s08-usju.html
July 2007: BEIJING, July 24 — The F.B.I. said Tuesday that a joint effort with the Chinese authorities had led to the arrest of 25 people and the seizing of more than $500 million worth of counterfeit Microsoft and Symantec software that was being made in China and distributed worldwide.http://www.nytimes.com/2007/07/25/business/worldbusiness/25soft.html
July 2007: FBI officials yesterday reinforced their commitment to crack down on medical companies that send phony bills or provide excessive treatments, pointing to 2,400 investigations in 2006 and warning that a fresh spate of cases is on the way.http://www.washingtonpost.com/wp-dyn/content/article/2007/07/18/AR2007071802461.html
April 2007: In the latest and most serious post-9/11 civil-liberties abuse to emerge from Washington, the Bush administration’s “Trust me anyhow” defense has finally collapsed. The scandal involves “national-security letters,” which the F.B.I. has secretly used to scrutinize the financial data, travel records and telephone logs of thousands of U.S. citizens and residents. In March, a report by the inspector general of the Justice Department described “widespread and serious misuse” of national-security letters after the U.S.A. Patriot Act of 2001 significantly expanded the F.B.I.’s authority to issue them: between 2003 and 2005, he concluded, the F.B.I. issued more than 140,000 national-security letters, many involving people with no obvious connections to terrorism. The Bush administration was fortunate that, shortly after the F.B.I. scandal broke, the tempest over the Justice Department’s firing of prosecutors bumped it off the front page.http://www.nytimes.com/2007/04/15/magazine/15wwlnlede.t.html
June 2007: An internal FBI audit has found that the bureau potentially violated the law or agency rules more than 1,000 times while collecting data about domestic phone calls, e-mails and financial transactions in recent years, far more than was documented in a Justice Department report in March that ignited bipartisan congressional criticism.http://www.washingtonpost.com/wp-dyn/content/article/2007/06/13/AR2007061302453.html
April 2007: The F.B.I., a division of the Justice Department, has strenuously resisted the practice unless special permission is granted by supervisors, under the theory that it may discourage suspects from talking and expose juries to interrogation methods that the department would rather not highlight.http://www.nytimes.com/2007/04/02/washington/02taping.html
April 2007: After 9/11, the Patriot Act broadly expanded the use of NSLs, this time allowing the FBI to use them to obtain information on anyone – American or not, suspect or not – if the information could be relevant to an investigation on terrorism or espionage. Individuals served with NSLs are also forbidden to tell others they received a letter, although they can appeal.http://www.csmonitor.com/2007/0403/p02s01-ussc.html
March 2007: FBI agents repeatedly provided inaccurate information to win secret court approval of surveillance warrants in terrorism and espionage cases, prompting officials to tighten controls on the way the bureau uses that powerful anti-terrorism tool, according to Justice Department and FBI officials.http://www.washingtonpost.com/wp-dyn/content/article/2007/03/26/AR2007032602073.html
March 2007: The FBI, which has been criticized for improperly gathering telephone records in terrorism cases, has told its agents they may still ask phone companies to voluntarily hand over toll records in emergencies by using a new set of procedures, officials said yesterday. In the most dire emergencies, requests can be submitted to the companies verbally, officials said.http://www.washingtonpost.com/wp-dyn/content/article/2007/03/19/AR2007031901775.html
December 2006: "'The Social Security Administration . . . projects that over 46,000 immigrants will be cut off from SSI in the years 2006-2012 as a result of delays in granting citizenship and the operation of the seven year rule,' the lawsuit says."http://www.washingtonpost.com/wp-dyn/content/article/2006/12/20/AR2006122001910_pf.html
January 2006: FBI fingerprint examiners were reluctant to admit that they had mistakenly linked an Oregon lawyer to the 2004 Madrid train bombings in part because he was a Muslim convert and had represented a terrorism defendant in court, according to a report released yesterday by the Justice Department's inspector general.http://www.washingtonpost.com/wp-dyn/content/article/2006/01/06/AR2006010601077.html
December 2005: WASHINGTON, Dec. 19 - Counterterrorism agents at the Federal Bureau of Investigation have conducted numerous surveillance and intelligence-gathering operations that involved, at least indirectly, groups active in causes as diverse as the environment, animal cruelty and poverty relief, newly disclosed agency records show.http://www.nytimes.com/2005/12/20/politics/20fbi.html
December 2005: Since October, news accounts have disclosed a burgeoning Pentagon campaign for 'detecting, identifying and engaging' internal enemies that included a database with information on peace protesters. A debate has roiled over the FBI's use of national security letters to obtain secret access to the personal records of tens of thousands of Americans. And now come revelations of the National Security Agency's interception of telephone calls and e-mails from the United States -- without notice to the federal court that has held jurisdiction over domestic spying since 1978.http://www.washingtonpost.com/wp-dyn/content/article/2005/12/17/AR2005121701233.html
June 2005: The House handed President Bush the first defeat in his effort to preserve the broad powers of the USA Patriot Act, voting yesterday to curtail the FBI's ability to seize library and bookstore records for terrorism investigations.http://www.washingtonpost.com/wp-dyn/content/article/2005/06/15/AR2005061501953.html
May 2005: As it turned out, the FBI eventually figured out that Jewell had done nothing wrong. But in the meantime, its act of naming him as a suspect in this notorious crime left his life and reputation in tatters.http://writ.news.findlaw.com/lazarus/20050526.html
January 2005: Ermini said federal legislation was passed 15 years ago directing police to take reports immediately on any missing children under age 18, including runaways. Under the law, that information must be entered into the National Crime Information Center, a computerized database of victims and criminals maintained by the FBI.http://www.washingtonpost.com/wp-dyn/articles/A16540-2005Jan17.html
Role Name Type Last Updated Owner of (partial or full, past or present) Internet Crime Complaint Center (IC3) Organization Jul 29, 2006 Owned by (partial or full, past or present) Justice Department/Department of Justice (DOJ) Organization Mar 5, 2004 Opponent (past or present) Kashmiri American Council Organization Jul 24, 2011 Owner of (partial or full, past or present) National Critical Infrastructure Protection Center (NIPC) Organization May 7, 2004 Opponent (past or present) Primary Global Research (PGR) Organization Dec 17, 2010 Advised by (past or present) Prof. Matt Blaze Person Aug 31, 2007 Research/Analysis Subject Prof. David Burnham Person Aug 7, 2006 Organization Executive (past or present) Valerie E. Caproni Esq. Person Jan 10, 2011 Opponent (past or present) Paul K. Charlton Esq. Person Apr 5, 2007 Opponent (past or present) Prof. Angela Yvonne Davis Ph.D. Person Jun 24, 2007 Organization Executive (past or present) Michael DeFeo Person Oct 18, 2006 Employee/Freelancer/Contractor (past or present) Senator Thomas J. Dodd Esq. Person Oct 21, 2007 Opponent (past or present) Mayor Dennis Elwell Person Jul 24, 2009 Organization Executive (past or present) W. Mark Felt Person Jun 19, 2005 Organization Executive (past or present) Louis Freeh Person Employee/Freelancer/Contractor (past or present) Michael German Esq. Person Apr 3, 2010 Organization Head/Leader (past or present) J. Edgar Hoover Person Organization Executive (past or present) James K. Kallstrom Person Mar 18, 2008 Organization Executive (past or present) Dr. Thomas A. Kubic MS, JD Person Oct 10, 2009 Opponent (past or present) Cooperation (past or present) Nicholas Merrill Person Jan 10, 2011 Organization Head/Leader (past or present) Mr. Robert S. Mueller III Person Mar 5, 2004 Organization Executive (past or present) John S. Pistole Esq. Person Nov 29, 2010 Organization Executive (past or present) Chris Ronay M.A. Person Jun 19, 2006 Organization Head/Leader (past or present) William S. Sessions Person Aug 2, 2005 Cooperation (past or present) Alvin Sykes Person Feb 28, 2010 Organization Head/Leader (past or present) William H. Webster Esq. Person Employee/Freelancer/Contractor (past or present) Frederic Whitehurst Person Apr 19, 2012 Opponent (past or present) Sen. Harrison A. Williams Jr. Person Oct 28, 2008 Organization Executive (past or present) Michael J. Woods Esq. Person Dec 18, 2005
Articles and Resources
Date Fairness.com Resource Read it at: Mar 16, 2013 The Internet is a surveillance state
QUOTE: ...we're being tracked all the time. Google tracks us, both on its pages and on other pages it has access to. Facebook does the same; it even tracks non-Facebook users. Apple tracks us on our iPhones and iPads....Increasingly, what we do on the Internet is being combined with other data about us. Unmasking Broadwell's identity involved correlating her Internet activity with her hotel stays.
CNN (Cable News Network) Dec 13, 2012 Attorney General Secretly Granted Gov. Ability to Develop and Store Dossiers on Innocent Americans
QUOTE: In a secret government agreement granted without approval or debate from lawmakers, the U.S. attorney general recently gave the National Counterterrorism Center sweeping new powers to store dossiers on U.S. citizens...Earlier this year, Attorney General Eric Holder granted the center the ability to copy entire government databases...
Wired Nov 15, 2012 The Real Reason You Should Care About the Petraeus Affair: Privacy
QUOTE: Once you've opened an email or your Facebook account, you've provided your personal information to a third party. The government can then ask that third party—Google, Yahoo, Facebook, Friendster, or whatever—for your information, and they don't necessarily need a warrant. The Constitution protects you from unreasonable search and seizure by the government. It doesn't stop third parties from sharing personal information you willingly give them.
Mother Jones Nov 11, 2012 Officials Say F.B.I. Knew of Petraeus Affair in the Summer
QUOTE: The new accounts of the events that led to Mr. Petraeus’s sudden resignation on Friday shed light on the competing pressures facing F.B.I. agents who recognized the high stakes of any investigation involving the C.I.A. director but who were wary of exposing a private affair with no criminal or security implications.
New York Times Apr 17, 2012 DOJ review of flawed FBI forensics processes lacked transparency
QUOTE: Attorney General Janet Reno and FBI Director Louis J. Freeh decided to launch a task force to dig through thousands of cases involving discredited agents, to ensure that “no defendant’s right to a fair trial was jeopardized,”...The task force took nine years to complete its work and never publicly released its findings. Not the results of its case reviews of suspect lab work. Not the names of the defendants who were convicted as a result. And not the nature or scope of the forensic problems it found. Those decisions more than a decade ago remain relevant today for hundreds of people still in the U.S. court system, because officials never notified many defendants of the forensic flaws in their cases and never expanded their review to catch similar mistakes.
Washington Post Mar 14, 2012 Domain seizures for copyright infringement likely to go global
QUOTE: Efforts to take down websites for copyright infringement are likely to move beyond U.S.-based registries, with ICANN (the Internet Corporation for Assigned Names and Numbers) promising to more closely cooperate with global law enforcement agencies and governments.
Computerworld Jan 23, 2012 MegaUpload: The content cartel strikes back
QUOTE: Like SOPA and PIPA, the bust comes with its own collateral damage. Along with those pirated movies and music, the feds took down noninfringing data from thousands of legit MegaUpload users, who are howling in protest and demanding -- futilely, so far -- the return of their stuff.
InfoWorld Oct 25, 2011 How the Patriot Act stripped me of my free-speech rights
QUOTE: the government implausibly claimed that if I were able to identify myself as the plaintiff in the case, irreparable damage to national security would result. But I did not believe then, nor do I believe now, that the FBI’s gag order was motivated by legitimate national security concerns. It was motivated by a desire to insulate the FBI from public criticism and oversight.
Washington Post Sep 05, 2011 Leak Offers Look at Efforts by U.S. to Spy on Israel
QUOTE: While the American government routinely eavesdrops on some embassies inside the United States, intelligence collection against allies is always politically delicate, especially one as close as Israel.
New York Times Jun 22, 2011 Free to Search and Seize
QUOTE: legally, if a black man in a poor neighborhood can be stopped and frisked with minimal reason, so can a white woman in a rich neighborhood — even if the police tactics differ. American history is replete with assaults on liberties that first target foreigners, minorities and those on the political margins, then spread toward the mainstream.
New York Times Jun 12, 2011 F.B.I. Agents Get Leeway to Push Privacy Bounds
QUOTE: The Federal Bureau of Investigation is giving significant new powers to its roughly 14,000 agents, allowing them more leeway to search databases, go through household trash or use surveillance teams to scrutinize the lives of people who have attracted their attention.
New York Times May 11, 2011 Prosecutors’ Hardball Tactics Produce Big Results in Galleon Case
QUOTE: Will the conviction of Raj Rajaratnam, the founder of the hedge fund firm Galleon Group, change anything on Wall Street?....Government crackdowns on insider trading tend to run in cycles. The last one that received as much attention was the Wall Street sweep in the 1980s that resulted in the convictions of Ivan Boesky and Michael R. Milken...
New York Times Apr 26, 2011 Sony Says PlayStation Hacker Got Personal Data
QUOTE: An “unauthorized person” had obtained personal information about account holders, including their names, addresses, e-mail addresses, and PlayStation user names and passwords. Sony warned that other confidential information, including credit card numbers, could have been compromised.
New York Times Feb 24, 2011 Suit Accuses F.B.I. of Spying at Mosques in California
QUOTE: The American Civil Liberties Union of Southern California and the Los Angeles chapter of the Council on American-Islamic Relations say in the suit that the informant, Craig Monteilh, violated members’ civil rights and subjected them to “indiscriminate surveillance” because of their religion.
New York Times Jan 06, 2011 Software security: Honesty is the best policy
QUOTE: Admitting to flaws in your code can be embarrassing, but OpenBSD's hunt for a backdoor proves the alternative could be much worse
InfoWorld Dec 20, 2010 Monitoring America (Top Secret America)
QUOTE: Nine years after the terrorist attacks of 2001, the United States is assembling a vast domestic intelligence apparatus to collect information about Americans, using the FBI, local police, state homeland security offices and military criminal investigators. The system, by far the largest and most technologically sophisticated in the nation's history, collects, stores and analyzes information about thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing.
Washington Post Dec 17, 2010 U.S. arrests 4 in insider trading probe centered on hedge fund industry
QUOTE: A national investigation into insider trading escalated Thursday with the arrest of four executives accused of trafficking in confidential corporate information...Those arrested by the Justice Department and FBI included several figures suspected of channeling secrets from technology companies to hedge funds that then traded on that information
Washington Post Nov 29, 2010 In U.S. Sting Operations, Questions of Entrapment
QUOTE: The arrest on Friday of a Somali-born teenager who is accused of trying to detonate a car bomb at a crowded Christmas tree-lighting ceremony in Portland, Ore., has again thrown a spotlight on the government’s use of sting operations to capture terrorism suspects. Some defense lawyers and civil rights advocates said the government’s tactics, particularly since the Sept. 11 attacks, have raised questions about the possible entrapment of people who pose no real danger but are enticed into pretend plots at the government’s urging.
New York Times Nov 26, 2010 A Bully Finds a Pulpit on the Web
QUOTE: as Ms. Rodriguez’s all-too-cursory Google search demonstrated, the company can show up in the most coveted place on the Internet’s most powerful site. Which means the owner of DecorMyEyes might be more than just a combustible bully with a mean streak and a potty mouth. He might also be a pioneer of a new brand of anti-salesmanship — utterly noxious retail — that is facilitated by the quirks and shortcomings of Internet commerce and that tramples long-cherished traditions of customer service, like deference and charm.
New York Times May 12, 2010 Prosecutors Ask if 8 Banks Duped Rating Agencies
QUOTE: The New York attorney general has started an investigation of eight banks to determine whether they provided misleading information to rating agencies in order to inflate the grades of certain mortgage securities, according to two people with knowledge of the investigation.
New York Times
- Arts & Humanities
- Businesses & Organizations
- Computers & Information Technology
- Family & Friends & Interpersonal
- Government & Politics / History
- Health & Medicine
- Law & Justice
- Media & Journalism
- Personal Finance & Career
- Philosophy & Religion
- Recreation & Entertainment
- Science & Technology
- Social Sciences & Groups
- Arctic / Antarctic / Greenland
- Central America / Caribbean
- Eurasia / Central Asia
- Middle East
- North America
- Oceania / AustralAsia
- South America
- About Fairness.com
- Contact Us
- Conditions of Service
- Fair Use Notice
- Advisory Board
Not a current user? Sign up!