You are here: Fairness.com > Resources > Federal Bureau of Investigation (FBI)

Federal Bureau of Investigation (FBI)


Self Description

December 2001: "The Mission of the FBI is to uphold the law through the investigation of violations of federal criminal law; to protect the United States from foreign intelligence and terrorist activities; to provide leadership and law enforcement assistance to federal, state, local, and international agencies; and to perform these responsibilities in a manner that is responsive to the needs of the public and is faithful to the Constitution of the United States." http://www.fbi.gov/fbinbrief/todaysfbi/mission.htm

Third-Party Descriptions

August 2014: "The feds are too pinched to tackle many complex cases. A three-year federal hiring freeze that was just lifted earlier this year has hampered elite financial prosecution units. But the problem extends farther back, and starts with the investigators and regulators for such cases. After 9/11, the F.B.I. diverted substantial resources away from white-collar investigations and toward the war on terror. At the time, the agency shifted 1,800 agents, nearly one-third of the agents in criminal investigative programs, to terrorism and national security duties. Though the Justice Department pursued high-profile prosecutions at companies like WorldCom, Adelphia and Enron after Enron collapsed, fewer and fewer white-collar prosecutions were brought in the years following, and numbers of corporations prosecuted also decreased."

http://www.nytimes.com/roomfordebate/2014/08/27/holding-bankers-accountable/put-more-resources-toward-regulation

November 2013: 'Invoking a legal strategy that had its heyday during the Bush administration, the FBI claims that Shapiro's multitudinous requests, taken together, constitute a "mosaic" of information whose release could "significantly and irreparably damage national security" and would have "significant deleterious effects" on the bureau's "ongoing efforts to investigate and combat domestic terrorism."'

http://www.motherjones.com/politics/2013/11/foia-ryan-shapiro-fbi-files-lawsuit

September 2013: "Federal agencies, including the FBI and IRS, as well as Interpol, can feed TECS with information and flag travelers' files."

http://news.yahoo.com/details-feds-laptops-border-010114959.html

June 2013: 'George W Bush briefly "discontinued" that bulk internet metadata collection, involving Americans, after a dramatic rebellion in March 2004 by senior figures at the Justice Department and FBI, as the Washington Post first reported. One of the leaders of that rebellion was deputy attorney general James Comey, whom Barack Obama nominated last week to run the FBI.'

http://www.guardian.co.uk/world/2013/jun/27/nsa-data-mining-authorised-obama

March 2013: "Maintaining privacy on the Internet is nearly impossible. If you forget even once to enable your protections, or click on the wrong link, or type the wrong thing, and you've permanently attached your name to whatever anonymous service you're using. Monsegur slipped up once, and the FBI got him. If the director of the CIA can't maintain his privacy on the Internet, we've got no hope."

http://www.cnn.com/2013/03/16/opinion/schneier-internet-surveillance/index.html

December 2012: "The NCTC currently maintains the Terrorist Identities Datamart Environment database, or TIDE, which holds data on more than 500,000 identities suspected of terror activity or terrorism links, including friends and families of suspects, and is the basis for the FBI’s terrorist watchlist."

http://www.wired.com/threatlevel/2012/12/gov-dossiers-on-us-citizens/

November 2012: '"Government treats those drafts, things that you just leave on Google servers without ever sending, as a remote computing service," says Calabrese. "The law treats those draft emails the exact same way it treats your Google docs, [or] all your photos that you keep 'private' on Facebook." Which is to say, it doesn't treat them as particularly private at all: If you had a bunch of old letters in a worn shoebox under your bed, the FBI would need a warrant to get them. But if those same letters are online, in your password-protected email account, and they're more than six months old, the FBI doesn't need a warrant to take a peek. Reports suggest that the FBI did eventually obtain a warrant [2] to monitor Broadwell's email, but they could have uncovered an incredible amount of information without one. And that's just with FBI powers pertaining to a criminal investigation. When suspected foreign agents are involved, the FBI gets a bonus set of surveillance powers to draw from.'

http://www.motherjones.com/politics/2012/11/cia-petraeus-fbi-broadwell-emails-privacy

November 2012: "WASHINGTON — High-level officials at the Federal Bureau of Investigation and the Justice Department were notified in the late summer that F.B.I. agents had uncovered what appeared to be an extramarital affair involving the director of the Central Intelligence Agency, David H. Petraeus, government officials said Sunday."

http://www.nytimes.com/2012/11/12/us/us-officials-say-petraeuss-affair-known-in-summer.html

April 2012: "Frederic Whitehurst, a chemist and lawyer who worked in the FBI’s crime lab, testified that he was told by his superiors to ignore findings that did not support the prosecution’s theory of the bombing."

http://www.washingtonpost.com/local/crime/doj-review-of-flawed-fbi-forensics-processes-lacked-transparency/2012/04/17/gIQAFegIPT_story.html

March 2012: "Representatives from governments, Interpol and the U.S. Federal Bureau of Investigationsaid they felt that ICANN's failure to enforce its own contractual agreements was damaging to Domain Name System users as well as end users."

http://news.idg.no/cw/art.cfm?id=B2318066-9100-36AE-6DA668DCC8BE64C8

January 2012: 'On Thursday, the FBI dropped the hammer on MegaUpload founder Kim Dotcom and seven of his cohorts [1], alleging they pocketed tens of millions by "incentivizing" illegal file sharing across its cloud storage service.'

http://www.infoworld.com/t/cringely/megaupload-the-content-cartel-strikes-back-184785

October 2011: "For years, the government implausibly claimed that if I were able to identify myself as the plaintiff in the case, irreparable damage to national security would result. But I did not believe then, nor do I believe now, that the FBI’s gag order was motivated by legitimate national security concerns. It was motivated by a desire to insulate the FBI from public criticism and oversight."

http://www.washingtonpost.com/opinions/how-the-patriot-act-stripped-me-of-my-free-speech-rights/2011/10/20/gIQAXB53GM_story.html

September 2011: 'The Federal Bureau of Investigation listens in on foreign embassies and officials in the United States chiefly to track foreign spies, though any intelligence it obtains on other matters is passed on to the C.I.A. and other agencies. The intercepts are carried out by the F.B.I.’s Operational Technology Division, based in Quantico, Va., according to Matthew M. Aid, an intelligence writer who describes the bureau’s monitoring in a book, “Intel Wars,” scheduled for publication in January. Translators like Mr. Leibowitz work at an F.B.I. office in Calverton, Md.'

http://www.nytimes.com/2011/09/06/us/06leak.html

June 2011: "American history is replete with assaults on liberties that first target foreigners, minorities and those on the political margins, then spread toward the mainstream. The 1917 Espionage Act, for example, was used to prosecute American labor leaders and other critics of the government, and the 1798 Alien Enemies Act was revived after Pearl Harbor to intern American citizens of Japanese ancestry. A similar process is taking place now, as the F.B.I. has begun using counterterrorism tools to search, infiltrate and investigate groups of American peace activists and labor leaders in the Midwest."

http://www.nytimes.com/2011/06/23/opinion/23shipler.html

June 2011: "WASHINGTON — The Federal Bureau of Investigation is giving significant new powers to its roughly 14,000 agents, allowing them more leeway to search databases, go through household trash or use surveillance teams to scrutinize the lives of people who have attracted their attention."

http://www.nytimes.com/2011/06/13/us/13fbi.html

May 2011: "Prosecutors have readily employed hardball investigatory methods. Late last year, agents at the Federal Bureau of Investigation conducted simultaneous raids of three large hedge funds, sending shock waves across Wall Street. Two of those funds have since closed."

http://dealbook.nytimes.com/2011/05/11/prosecutors-hardball-tactics-produce-big-results-in-galleon-case/

February 2011: 'The fears were stoked by charges that the Federal Bureau of Investigation paid an informant to infiltrate their mosque and others in Southern California, according to a federal lawsuit filed Tuesday. The American Civil Liberties Union of Southern California and the Los Angeles chapter of the Council on American-Islamic Relations say in the suit that the informant, Craig Monteilh, violated members’ civil rights and subjected them to “indiscriminate surveillance” because of their religion.'

http://www.nytimes.com/2011/02/25/us/25mosque.html

January 2011: "That's the issue facing the maintainers of OpenBSD, in light of allegations made in December [1] by a former government contractor named Gregory Perry, who claims knowledge of an FBI plan to insert back doors into the open source operating system. If they exist, the back doors would provide the FBI a means to monitor encrypted communications sent from OpenBSD systems."

http://www.infoworld.com/d/developer-world/software-security-honesty-the-best-policy-285

December 2010: "* The FBI is building a database with the names and certain personal information, such as employment history, of thousands of U.S. citizens and residents whom a local police officer or a fellow citizen believed to be acting suspiciously. It is accessible to an increasing number of local law enforcement and military criminal investigators, increasing concerns that it could somehow end up in the public domain."

http://projects.washingtonpost.com/top-secret-america/articles/monitoring-america/

December 2010: "Those arrested by the Justice Department and FBI included several figures suspected of channeling secrets from technology companies to hedge funds that then traded on that information but did not include any big names from Wall Street or corporate America."

http://www.washingtonpost.com/wp-dyn/content/article/2010/12/17/AR2010121700287.html

October 2009: "A lawsuit (.pdf), filed by the American Civil Liberties Union on behalf of two Californians who were arrested and released, seeks to overturn a voter-approved law that became effective this year. Proposition 69 requires detainees to provide a saliva or sometimes a blood sample upon felony arrest. The sample is stored in state and FBI databases, even if the arrested person is never charged or convicted of a crime."

http://www.wired.com/threatlevel/2009/10/dna-sampling-challenge

February 2010: "Three years after the FBI pledged to investigate more than 100 unsolved civil rights killings, the agency is ready to close all but a handful. Investigators say they have solved most of the mysteries behind the cases, but few will result in indictments, given the passage of decades, the deaths of prime suspects and the challenge of gathering evidence."

http://www.washingtonpost.com/wp-dyn/content/article/2010/02/27/AR2010022703758.html

December 2008: "The F.B.I., which frequently investigates stock fraud cases either on its own or in partnership with the S.E.C., has also had a sharp decline in the number of white-collar cases it has brought in the last several years — partly a reflection of a huge shift in staffing and resources to counterterrorism operations since the Sept. 11 attacks, officials said."

http://www.nytimes.com/2008/12/25/business/25fraud.html

December 2008: 'In transcripts of intercepted conversations released by the FBI on Tuesday, Mr Blagojevich is quoted as saying that a man referred to by officials as Senate Candidate Five would "raise me 500 grand. An emissary came. Then the other guy would raise a million, if I made him a senator".'

http://news.bbc.co.uk/2/hi/americas/7777905.stm

November 2008: "This summer, however, the American Civil Liberties Union and Electronic Frontier Foundation sued the Justice Department, seeking documents related to the FBI's cell-phone tracking practices. Since August, they've received a stream of documents—the most recent batch on November 6—that were posted on the Internet last week. In a post on the progressive blog Daily Kos, ACLU spokesperson Rachel Myers drew attention to language in several of those documents implying that triggerfish have broader application than previously believed."

http://arstechnica.com/news.ars/post/20081116-foia-docs-show-feds-can-lojack-mobiles-without-telco-help.html

August 2008: "WASHINGTON — A Justice Department plan would loosen restrictions on the Federal Bureau of Investigation to allow agents to open a national security or criminal investigation against someone without any clear basis for suspicion, Democratic lawmakers briefed on the details said Wednesday."

http://www.nytimes.com/2008/08/21/washington/21fbi.html

June 2008: "The lawsuit adds to the considerable legal risks facing Bank of America as it prepares to absorb Countrywide in a takeover announced in January. Countrywide and its executives have been named as defendants in shareholder lawsuits, and the company’s practices are the subject of investigations by the Securities and Exchange Commission, the F.B.I. and the Federal Trade Commission, which oversees loan servicing companies."

http://www.nytimes.com/2008/06/25/business/25mortgage.html

June 2008: "Instead, the report cites political and intelligence failures to understand the scope of the terrorist threat after the 1993 attack, as well as a failure to fully analyze the implications of the available information. It also blames the FBI and the CIA for failing to effectively communicate with each other, problems that were later addressed in the USA Patriot Act and the reorganization of the intelligence community."

http://www.washingtonpost.com/wp-dyn/content/article/2008/06/17/AR2008061702819.html

June 2008: "At the Senate Judiciary Committee, senior F.B.I. officials described the bureau’s halting efforts in 2002 to protest harsh interrogations being carried out by the military at Guantánamo Bay, Cuba, and to make the case that traditional rapport-building methods worked far better."

http://www.nytimes.com/2008/06/11/washington/11detain.html

May 2008: "Complaints by FBI agents about abusive interrogation tactics at Guantanamo Bay, Cuba, and other U.S. military sites reached the National Security Council but prompted no effort to curb questioning that the agents considered ineffective and possibly illegal, according to an internal audit released yesterday."

http://www.washingtonpost.com/wp-dyn/content/article/2008/05/20/AR2008052001123.html

May 2008: "WASHINGTON — F.B.I. agents complained repeatedly, beginning in 2002, about the harsh interrogation tactics that military and C.I.A. interrogators were using in questioning terrorism suspects, like making them do dog tricks and parade in the nude in front of female soldiers, but their complaints appear to have had little effect, according to an exhaustive report released Tuesday by the Justice Department’s inspector general."

http://www.nytimes.com/2008/05/21/washington/20cnd-detain.html

May 2008: "In considering the issue over the last 12 years, the two leading scientific bodies in the field -- the National Research Council and the FBI's DNA Advisory Board -- have reached the same conclusion: In cold hit cases, jurors should be given an adjusted calculation, called the database statistic, that adjusts for the number of comparisons made within a database."

http://www.latimes.com/news/science/la-me-webdna9-2008may09,0,2968662.story

May 2008: "The F.B.I. seized hundreds of digital audio files from Mr. Pellicano’s computers in 2002. Scores have never been decrypted by the agency. So Serpent proved as impregnable as advertised — and some evidence, as Mr. Freeh predicted, might never be recovered."

http://www.nytimes.com/2008/05/05/business/media/05trial.html

May 2008: 'The FBI was "dealing with a bureaucracy and a culture they didn't understand," she said. "Yemen operates on a different timeline than we do. We had one group working on a New York minute, and another on a 4,000-year-old history."'

http://www.washingtonpost.com/wp-dyn/content/article/2008/05/03/AR2008050302047_pf.html

April 2008: "The Federal Bureau of Investigation has 17 open inquiries into accusations of corporate fraud in connection with the subprime scandal, and Neil Power, who leads the bureau’s economics crime unit, said in an interview that the number was certain to grow. The F.B.I. has publicly identified only one target — the Doral Financial Corporation, a mortgage company based in Puerto Rico whose former treasurer has already been indicted — but major companies like Countrywide Financial, once the nation’s biggest mortgage lender, have also been reported to be under criminal investigation."

http://www.nytimes.com/2008/04/09/washington/09justice.html

March 2008: 'A year ago, lawmakers of both parties called for limits on the FBI's use of the security letters, which demand consumer information from banks, credit card companies and other institutions without a warrant as part of investigations into suspected terrorism and espionage. Congress has not followed through with legislation, however, and Mueller sought to assure lawmakers that internal changes will solve the problems. He said new FBI procedures will "minimize the chance of future lapses," including the creation of a compliance office tasked with monitoring the use of security letters.'

http://www.washingtonpost.com/wp-dyn/content/article/2008/03/05/AR2008030500463.html

January 2008: "The Federal Bureau of Investigation, according to its budget request for 2008, maintains more than 15,000 secret informants; the Drug Enforcement Administration, according to an internal audit from 2005, has about 4,000 at a time on its payroll."

http://www.nytimes.com/2008/01/27/nyregion/27informants.html

January 2008: 'Judy Orihuela, spokeswoman for the FBI's Miami office, insists the agency will investigate any group that intends to violate U.S. law and poses a violent threat. At the Department of Justice in Washington, Dean Boyd, a spokesman for the national security division, rejects the notion that federal law enforcement shows leniency toward exile militants. Boyd maintains the DOJ would never attempt to influence a local case for political reasons and is blind to community or political pressure. "We pursue charges based on the evidence, not on other considerations," he says.'

http://www.salon.com/news/feature/2008/01/14/cuba/

November 2007: "The FBI's search of Jefferson's office in 2005 produced a bipartisan outcry on Capitol Hill from members who said the Justice Department was upsetting the balance of power between the executive and legislative branches. As a result of the controversy, the FBI has not reviewed or used any of the papers it seized. For that reason, the appellate ruling does not have any effect on Jefferson's case. He was indicted this year on other evidence of racketeering and bribery."

http://www.washingtonpost.com/wp-dyn/content/article/2007/11/20/AR2007112002009.html

October 2007: As the end of his tour approached, Diaz’s frustration was growing. The prisoner-abuse files that he and others had compiled now filled two large binders. One statement, from a senior F.B.I. official, suggested that the military authorities had ignored complaints from bureau agents about harsh interrogation techniques. Another recounted a detainee’s claim that a guard had thrown him to the ground and rubbed his face violently in the dirt after the prisoner spat at him. Diaz found the report credible — the file included a photograph of the prisoner’s mangled face — and was surprised that it was not included among the allegations that the military made public.

http://www.nytimes.com/2007/10/21/magazine/21Diaz-t.html

September 2007: The intelligence officials, including the directors of the C.I.A., the F.B.I. and the National Security Agency, said in court filings that the vast disclosure would reveal counterterrorism activities and could disrupt intelligence gathering. They also said assembling the information was so time-consuming that the effort had distracted the agencies from terrorism investigations.

http://www.nytimes.com/2007/09/12/washington/12gitmo.html

August 2007: The FBI has quietly built a sophisticated, point-and-click surveillance system that performs instant wiretaps on almost any communications device, according to nearly a thousand pages of restricted documents newly released under the Freedom of Information Act.

http://www.wired.com/politics/security/news/2007/08/wiretap

August 2007: When Federal Bureau of Investigation agents first took Padilla into custody, administration officials thought they had nabbed an intelligence prize. Five years later, legal and intelligence analysts say, these claims look increasingly hollow as the administration maneuvers to keep Padilla from having a meaningful day in court. Its tactics are also keeping the public from knowing the truth about Padilla and the dirty-bomb plot, they say.

http://www.csmonitor.com/2007/0815/p01s08-usju.html

July 2007: BEIJING, July 24 — The F.B.I. said Tuesday that a joint effort with the Chinese authorities had led to the arrest of 25 people and the seizing of more than $500 million worth of counterfeit Microsoft and Symantec software that was being made in China and distributed worldwide.

http://www.nytimes.com/2007/07/25/business/worldbusiness/25soft.html

July 2007: FBI officials yesterday reinforced their commitment to crack down on medical companies that send phony bills or provide excessive treatments, pointing to 2,400 investigations in 2006 and warning that a fresh spate of cases is on the way.

http://www.washingtonpost.com/wp-dyn/content/article/2007/07/18/AR2007071802461.html

April 2007: In the latest and most serious post-9/11 civil-liberties abuse to emerge from Washington, the Bush administration’s “Trust me anyhow” defense has finally collapsed. The scandal involves “national-security letters,” which the F.B.I. has secretly used to scrutinize the financial data, travel records and telephone logs of thousands of U.S. citizens and residents. In March, a report by the inspector general of the Justice Department described “widespread and serious misuse” of national-security letters after the U.S.A. Patriot Act of 2001 significantly expanded the F.B.I.’s authority to issue them: between 2003 and 2005, he concluded, the F.B.I. issued more than 140,000 national-security letters, many involving people with no obvious connections to terrorism. The Bush administration was fortunate that, shortly after the F.B.I. scandal broke, the tempest over the Justice Department’s firing of prosecutors bumped it off the front page.

http://www.nytimes.com/2007/04/15/magazine/15wwlnlede.t.html

June 2007: An internal FBI audit has found that the bureau potentially violated the law or agency rules more than 1,000 times while collecting data about domestic phone calls, e-mails and financial transactions in recent years, far more than was documented in a Justice Department report in March that ignited bipartisan congressional criticism.

http://www.washingtonpost.com/wp-dyn/content/article/2007/06/13/AR2007061302453.html

April 2007: The F.B.I., a division of the Justice Department, has strenuously resisted the practice unless special permission is granted by supervisors, under the theory that it may discourage suspects from talking and expose juries to interrogation methods that the department would rather not highlight.

http://www.nytimes.com/2007/04/02/washington/02taping.html

April 2007: After 9/11, the Patriot Act broadly expanded the use of NSLs, this time allowing the FBI to use them to obtain information on anyone – American or not, suspect or not – if the information could be relevant to an investigation on terrorism or espionage. Individuals served with NSLs are also forbidden to tell others they received a letter, although they can appeal.

http://www.csmonitor.com/2007/0403/p02s01-ussc.html

March 2007: FBI agents repeatedly provided inaccurate information to win secret court approval of surveillance warrants in terrorism and espionage cases, prompting officials to tighten controls on the way the bureau uses that powerful anti-terrorism tool, according to Justice Department and FBI officials.

http://www.washingtonpost.com/wp-dyn/content/article/2007/03/26/AR2007032602073.html

March 2007: The FBI, which has been criticized for improperly gathering telephone records in terrorism cases, has told its agents they may still ask phone companies to voluntarily hand over toll records in emergencies by using a new set of procedures, officials said yesterday. In the most dire emergencies, requests can be submitted to the companies verbally, officials said.

http://www.washingtonpost.com/wp-dyn/content/article/2007/03/19/AR2007031901775.html

December 2006: "'The Social Security Administration . . . projects that over 46,000 immigrants will be cut off from SSI in the years 2006-2012 as a result of delays in granting citizenship and the operation of the seven year rule,' the lawsuit says."

http://www.washingtonpost.com/wp-dyn/content/article/2006/12/20/AR2006122001910_pf.html

January 2006: FBI fingerprint examiners were reluctant to admit that they had mistakenly linked an Oregon lawyer to the 2004 Madrid train bombings in part because he was a Muslim convert and had represented a terrorism defendant in court, according to a report released yesterday by the Justice Department's inspector general.

http://www.washingtonpost.com/wp-dyn/content/article/2006/01/06/AR2006010601077.html

December 2005: WASHINGTON, Dec. 19 - Counterterrorism agents at the Federal Bureau of Investigation have conducted numerous surveillance and intelligence-gathering operations that involved, at least indirectly, groups active in causes as diverse as the environment, animal cruelty and poverty relief, newly disclosed agency records show.

http://www.nytimes.com/2005/12/20/politics/20fbi.html

December 2005: Since October, news accounts have disclosed a burgeoning Pentagon campaign for 'detecting, identifying and engaging' internal enemies that included a database with information on peace protesters. A debate has roiled over the FBI's use of national security letters to obtain secret access to the personal records of tens of thousands of Americans. And now come revelations of the National Security Agency's interception of telephone calls and e-mails from the United States -- without notice to the federal court that has held jurisdiction over domestic spying since 1978.

http://www.washingtonpost.com/wp-dyn/content/article/2005/12/17/AR2005121701233.html

June 2005: The House handed President Bush the first defeat in his effort to preserve the broad powers of the USA Patriot Act, voting yesterday to curtail the FBI's ability to seize library and bookstore records for terrorism investigations.

http://www.washingtonpost.com/wp-dyn/content/article/2005/06/15/AR2005061501953.html

May 2005: As it turned out, the FBI eventually figured out that Jewell had done nothing wrong. But in the meantime, its act of naming him as a suspect in this notorious crime left his life and reputation in tatters.

http://writ.news.findlaw.com/lazarus/20050526.html

January 2005: Ermini said federal legislation was passed 15 years ago directing police to take reports immediately on any missing children under age 18, including runaways. Under the law, that information must be entered into the National Crime Information Center, a computerized database of victims and criminals maintained by the FBI.

http://www.washingtonpost.com/wp-dyn/articles/A16540-2005Jan17.html

Relationships

RoleNameTypeLast Updated
Owner of (partial or full, past or present) Internet Crime Complaint Center (IC3) Organization Jul 29, 2006
Owned by (partial or full, past or present) Justice Department/Department of Justice (DOJ) Organization Mar 5, 2004
Opponent (past or present) Kashmiri American Council Organization Jul 24, 2011
Owner of (partial or full, past or present) National Critical Infrastructure Protection Center (NIPC) Organization May 7, 2004
Opponent (past or present) Primary Global Research (PGR) Organization Dec 17, 2010
Advised by (past or present) Prof. Matt Blaze Person Aug 31, 2007
Research/Analysis Subject Prof. David Burnham Person Aug 7, 2006
Organization Executive (past or present) Valerie E. Caproni Esq. Person Jan 10, 2011
Opponent (past or present) Paul K. Charlton Esq. Person Apr 5, 2007
Possible/Unclear James B. Comey Esq. Person Jun 27, 2013
Opponent (past or present) Prof. Angela Yvonne Davis Ph.D. Person Jun 24, 2007
Organization Executive (past or present) Michael DeFeo Person Oct 18, 2006
Employee/Freelancer/Contractor (past or present) Senator Thomas J. Dodd Esq. Person Oct 21, 2007
Opponent (past or present) Mayor Dennis Elwell Person Jul 24, 2009
Organization Executive (past or present) W. Mark Felt Person Jun 19, 2005
Organization Executive (past or present) Louis Freeh Person
Employee/Freelancer/Contractor (past or present) Michael German Esq. Person Apr 3, 2010
Organization Head/Leader (past or present) J. Edgar Hoover Person
Organization Executive (past or present) James K. Kallstrom Person Mar 18, 2008
Organization Executive (past or present) Dr. Thomas A. Kubic MS, JD Person Oct 10, 2009
Cooperation (past or present) Opponent (past or present) Nicholas Merrill Person Jan 10, 2011
Organization Head/Leader (past or present) Mr. Robert S. Mueller III Person Mar 5, 2004
Organization Executive (past or present) John S. Pistole Esq. Person Nov 29, 2010
Organization Executive (past or present) Chris Ronay M.A. Person Jun 19, 2006
Organization Head/Leader (past or present) William S. Sessions Person Aug 2, 2005
Research/Analysis Subject Opponent (past or present) Ryan Shapiro Person Nov 16, 2013
Cooperation (past or present) Alvin Sykes Person Feb 28, 2010
Organization Head/Leader (past or present) William H. Webster Esq. Person
Employee/Freelancer/Contractor (past or present) Frederic Whitehurst Person Apr 19, 2012
Opponent (past or present) Sen. Harrison A. Williams Jr. Person Oct 28, 2008
Organization Executive (past or present) Michael J. Woods Esq. Person Dec 18, 2005

Articles and Resources

350 Articles and Resources. Go to:  [Next 20]   [End]

Date Fairness.com Resource Read it at:
Aug 27, 2014 Put More Resources Toward Regulation

QUOTE: the Department of Justice shifted gears in 2003 to leverage resources by offering cooperating companies non–prosecution deals. While corporate fines have skyrocketed, only a handful of financial institutions have pled guilty to criminal behavior.

New York Times
Nov 13, 2013 Meet the Punk Rocker Who Can Liberate Your FBI File: Ryan Shapiro's technique is so effective at unburying sensitive documents, the feds are asking the courts to stop him.

QUOTE: Invoking a legal strategy that had its heyday during the Bush administration, the FBI claims that Shapiro's multitudinous requests, taken together, constitute a "mosaic" of information whose release could "significantly and irreparably damage national security" and would have "significant deleterious effects" on the bureau's "ongoing efforts to investigate and combat domestic terrorism."

Mother Jones
Oct 10, 2013 Rabbis plotted to kidnap husbands, force divorces, FBI says

QUOTE: A group of rabbis face kidnapping charges after allegedly arranging assaults of Orthodox Jewish husbands to persuade them to grant divorces to their wives, authorities said Thursday....Their goal? To obtain "gets," a document that Jewish law requires a husband to present to his wife in order to be issued a divorce, the complaint says.

CNN (Cable News Network)
Sep 10, 2013 New details in how the feds take laptops at border

QUOTE: President Barack Obama and his predecessors have maintained that people crossing into U.S. territory aren't protected by the Fourth Amendment. That policy is intended to allow for intrusive searches that keep drugs, child pornography and other illegal imports out of the country. But it also means the government can target travelers for no reason other than political advocacy if it wants, and obtain electronic documents identifying fellow supporters.

Yahoo News
Jun 27, 2013 NSA collected US email records in bulk for more than two years under Obama

QUOTE: The Obama administration for more than two years permitted the National Security Agency to continue collecting vast amounts of records detailing the email and internet usage of Americans...under the program, launched in 2001, a federal judge sitting on the secret surveillance panel called the Fisa court would approve a bulk collection order for internet metadata "every 90 days"... The collection of these records began under the Bush administration's wide-ranging warrantless surveillance program, collectively known by the NSA codename Stellar Wind.

Guardian Unlimited
Mar 16, 2013 The Internet is a surveillance state

QUOTE: ...we're being tracked all the time. Google tracks us, both on its pages and on other pages it has access to. Facebook does the same; it even tracks non-Facebook users. Apple tracks us on our iPhones and iPads....Increasingly, what we do on the Internet is being combined with other data about us. Unmasking Broadwell's identity involved correlating her Internet activity with her hotel stays.

CNN (Cable News Network)
Dec 13, 2012 Attorney General Secretly Granted Gov. Ability to Develop and Store Dossiers on Innocent Americans

QUOTE: In a secret government agreement granted without approval or debate from lawmakers, the U.S. attorney general recently gave the National Counterterrorism Center sweeping new powers to store dossiers on U.S. citizens...Earlier this year, Attorney General Eric Holder granted the center the ability to copy entire government databases...

Wired
Nov 15, 2012 The Real Reason You Should Care About the Petraeus Affair: Privacy

QUOTE: Once you've opened an email or your Facebook account, you've provided your personal information to a third party. The government can then ask that third party—Google, Yahoo, Facebook, Friendster, or whatever—for your information, and they don't necessarily need a warrant. The Constitution protects you from unreasonable search and seizure by the government. It doesn't stop third parties from sharing personal information you willingly give them.

Mother Jones
Nov 11, 2012 Officials Say F.B.I. Knew of Petraeus Affair in the Summer

QUOTE: The new accounts of the events that led to Mr. Petraeus’s sudden resignation on Friday shed light on the competing pressures facing F.B.I. agents who recognized the high stakes of any investigation involving the C.I.A. director but who were wary of exposing a private affair with no criminal or security implications.

New York Times
Apr 17, 2012 DOJ review of flawed FBI forensics processes lacked transparency

QUOTE: Attorney General Janet Reno and FBI Director Louis J. Freeh decided to launch a task force to dig through thousands of cases involving discredited agents, to ensure that “no defendant’s right to a fair trial was jeopardized,”...The task force took nine years to complete its work and never publicly released its findings. Not the results of its case reviews of suspect lab work. Not the names of the defendants who were convicted as a result. And not the nature or scope of the forensic problems it found. Those decisions more than a decade ago remain relevant today for hundreds of people still in the U.S. court system, because officials never notified many defendants of the forensic flaws in their cases and never expanded their review to catch similar mistakes.

Washington Post
Mar 14, 2012 Domain seizures for copyright infringement likely to go global

QUOTE: Efforts to take down websites for copyright infringement are likely to move beyond U.S.-based registries, with ICANN (the Internet Corporation for Assigned Names and Numbers) promising to more closely cooperate with global law enforcement agencies and governments.

Computerworld
Jan 23, 2012 MegaUpload: The content cartel strikes back

QUOTE: Like SOPA and PIPA, the bust comes with its own collateral damage. Along with those pirated movies and music, the feds took down noninfringing data from thousands of legit MegaUpload users, who are howling in protest and demanding -- futilely, so far -- the return of their stuff.

InfoWorld
Oct 25, 2011 How the Patriot Act stripped me of my free-speech rights

QUOTE: the government implausibly claimed that if I were able to identify myself as the plaintiff in the case, irreparable damage to national security would result. But I did not believe then, nor do I believe now, that the FBI’s gag order was motivated by legitimate national security concerns. It was motivated by a desire to insulate the FBI from public criticism and oversight.

Washington Post
Sep 05, 2011 Leak Offers Look at Efforts by U.S. to Spy on Israel

QUOTE: While the American government routinely eavesdrops on some embassies inside the United States, intelligence collection against allies is always politically delicate, especially one as close as Israel.

New York Times
Jun 22, 2011 Free to Search and Seize

QUOTE: legally, if a black man in a poor neighborhood can be stopped and frisked with minimal reason, so can a white woman in a rich neighborhood — even if the police tactics differ. American history is replete with assaults on liberties that first target foreigners, minorities and those on the political margins, then spread toward the mainstream.

New York Times
Jun 12, 2011 F.B.I. Agents Get Leeway to Push Privacy Bounds

QUOTE: The Federal Bureau of Investigation is giving significant new powers to its roughly 14,000 agents, allowing them more leeway to search databases, go through household trash or use surveillance teams to scrutinize the lives of people who have attracted their attention.

New York Times
May 11, 2011 Prosecutors’ Hardball Tactics Produce Big Results in Galleon Case

QUOTE: Will the conviction of Raj Rajaratnam, the founder of the hedge fund firm Galleon Group, change anything on Wall Street?....Government crackdowns on insider trading tend to run in cycles. The last one that received as much attention was the Wall Street sweep in the 1980s that resulted in the convictions of Ivan Boesky and Michael R. Milken...

New York Times
Apr 26, 2011 Sony Says PlayStation Hacker Got Personal Data

QUOTE: An “unauthorized person” had obtained personal information about account holders, including their names, addresses, e-mail addresses, and PlayStation user names and passwords. Sony warned that other confidential information, including credit card numbers, could have been compromised.

New York Times
Feb 24, 2011 Suit Accuses F.B.I. of Spying at Mosques in California

QUOTE: The American Civil Liberties Union of Southern California and the Los Angeles chapter of the Council on American-Islamic Relations say in the suit that the informant, Craig Monteilh, violated members’ civil rights and subjected them to “indiscriminate surveillance” because of their religion.

New York Times
Jan 06, 2011 Software security: Honesty is the best policy

QUOTE: Admitting to flaws in your code can be embarrassing, but OpenBSD's hunt for a backdoor proves the alternative could be much worse

InfoWorld

350 Articles and Resources. Go to:  [Next 20]   [End]