All News Articles for 2015-02-19

Thursday, February 19, 2015
UK Admits to Unlawful Surveillance of Torture Victims
Intelligence agencies violated human rights laws by spying on privileged legal communications
Read more
Explosive New Snowden Doc: NSA/GCHQ Stole Vital Cell Phone Encryption Keys
New reporting by The Intercept, based on documents leaked by whistleblower, reveals how spy agencies hacked world's largest SIM card manufacturer
Read more
Clinton Foundation Receiving Millions From Proponents of Keystone XL
Green groups say revelation raises questions about industry influence over likely 2016 presidential candidate
Read more
Laura Poitras on the Post-9/11 Moral Vacuum and How Snowden Will Go Down in History
In interview with CBC, Citizenfour filmmaker says Snowden 'did something that was a public service.'
Read more
Accused of 'Terrorism,' Animal Rights Activists Head to Federal Court
'Why must low-level criminal activity by animal rights activists be prosecuted in federal court?'
Read more
First Nation Community Says No One Warned Them of Fiery Derailment on Their Territory
Community members say lack of communication from Canadian rail company highlights need for accountability
Read more
#FightFastTrack: Coalition Takes Aim at Lawmakers over Corporate-Friendly 'Trade' Agreement
Environmental, labor, and community groups are staging public forums and creative direct actions urging their representatives to say no to a rushed TPP deal
Read more
Turning Point? Grassroots Groups Mobilize Against Netanyahu's 'Catastrophic' Speech
Analysts say that the current fallout has the potential to move beyond partisan politics towards a real critique of Israel's actions
Read more
All Bets Off? Germany Rejects Greek Proposal for Modified Loan Extension
Syriza offers its version of a temporary agreement, but Europe's financial powerhouse says austerity measures must be included or 'no deal'
Read more
Google Joins Civil Liberties Groups To Oppose Expansion of FBI Spy Powers
'Government is seeking a troubling expansion of its power to surreptitiously hack into computers.'
Read more