So much for the Obama administration's assurances that its massive electronic snooping program is subject to extensive safeguards and oversight.
"Every now and then, there may be a mistake," said U.S. deputy attorney general James Cole in congressional testimony cited by the Washington Post.
Turns out "every now and then" actually means 2,776 incidents of unauthorized collection, storage, access or distribution of legally protected communications in the 12 months up to May 2012.
That's according to an internal audit by the U.S. National Security Agency. The Washington Post published this story on the audit, which was provided by ex-NSA contractor Edward Snowden.
Welcome to the investigative reporting blog of award-winning journalist Alex Roslin, author of the book Police Wife: The Secret Epidemic of Police Domestic Violence. Roslin was president of the board of the Canadian Centre for Investigative Reporting, and his awards include the Arlene Book Award of the American Society of Journalists and Authors. He doesn’t necessarily endorse material linked below.
Showing posts with label spying. Show all posts
Showing posts with label spying. Show all posts
Friday, August 16, 2013
Wednesday, August 14, 2013
Resources: Investigative Journalism Techniques From the Black World
Just found this interesting top-10 list of books written about the failure of torture to provide useful information, written by U.S. army lieutenant-colonel Douglas Pryer, who is in military intelligence.
Pryer's list consists mostly of real-life war-time accounts of interrogators who used respect and brains to bring around captives, instead of brutality.
Such accounts aren't just valuable as an indictment of torture and the media that supports it in various movies and TV shows.
They also present techniques of information gathering useful to a journalist dealing with reluctant sources (including those in the security and police community whose experiences are recounted in the books).
Pryer is also author of Fight for the High Ground: The U.S. Army and Interrogation During Operation Iraqi Freedom, May 2003-April 2004.
Astute readers may recall an earlier post I wrote on the same topic back in 2010. It was about a 203-page study of "intelligence interviewing" produced by the U.S. Intelligence Board, which answers to the CIA director.
Pryer's list consists mostly of real-life war-time accounts of interrogators who used respect and brains to bring around captives, instead of brutality.
Such accounts aren't just valuable as an indictment of torture and the media that supports it in various movies and TV shows.
They also present techniques of information gathering useful to a journalist dealing with reluctant sources (including those in the security and police community whose experiences are recounted in the books).
Pryer is also author of Fight for the High Ground: The U.S. Army and Interrogation During Operation Iraqi Freedom, May 2003-April 2004.
Astute readers may recall an earlier post I wrote on the same topic back in 2010. It was about a 203-page study of "intelligence interviewing" produced by the U.S. Intelligence Board, which answers to the CIA director.
Saturday, August 3, 2013
Tools: Worried About the Edward Snowden Revelations? How to Protect Your Investigative Reporting
Concerned about protecting your confidential sources and communications after Edward Snowden's revelations about Big Brother snooping?
Just came across this interesting post on how to do just that from investigative journalist Dan Meredith of Radio Free Asia. Includes tools to conceal your web research, email, calls and files from prying eyes.
Be aware, of course, that using some anonymity tools can actually be a red flag for spies, themselves attracting attention. Do your own research!
Here's a good tipsheet from the Global Investigative Journalism Network on protecting your investigative reporting.
And on a related note, here's a 65-minute video of former MI5 intelligence officer Annie Machon talking about how spy agencies use and manipulate the media, hosted by the UK's Centre for Investigative Journalism.
Just came across this interesting post on how to do just that from investigative journalist Dan Meredith of Radio Free Asia. Includes tools to conceal your web research, email, calls and files from prying eyes.
Be aware, of course, that using some anonymity tools can actually be a red flag for spies, themselves attracting attention. Do your own research!
Here's a good tipsheet from the Global Investigative Journalism Network on protecting your investigative reporting.
And on a related note, here's a 65-minute video of former MI5 intelligence officer Annie Machon talking about how spy agencies use and manipulate the media, hosted by the UK's Centre for Investigative Journalism.
Subscribe to:
Posts (Atom)