All News Articles for 2015-02-19
|
|
UK Admits to Unlawful Surveillance of Torture Victims Intelligence agencies violated human rights laws by spying on privileged legal communications Read more |
|
|
Explosive New Snowden Doc: NSA/GCHQ Stole Vital Cell Phone Encryption Keys New reporting by The Intercept, based on documents leaked by whistleblower, reveals how spy agencies hacked world's largest SIM card manufacturer Read more |
|
|
Clinton Foundation Receiving Millions From Proponents of Keystone XL Green groups say revelation raises questions about industry influence over likely 2016 presidential candidate Read more |
|
|
Laura Poitras on the Post-9/11 Moral Vacuum and How Snowden Will Go Down in History In interview with CBC, Citizenfour filmmaker says Snowden 'did something that was a public service.' Read more |
|
|
Accused of 'Terrorism,' Animal Rights Activists Head to Federal Court 'Why must low-level criminal activity by animal rights activists be prosecuted in federal court?' Read more |
|
|
First Nation Community Says No One Warned Them of Fiery Derailment on Their Territory Community members say lack of communication from Canadian rail company highlights need for accountability Read more |
|
|
#FightFastTrack: Coalition Takes Aim at Lawmakers over Corporate-Friendly 'Trade' Agreement Environmental, labor, and community groups are staging public forums and creative direct actions urging their representatives to say no to a rushed TPP deal Read more |
|
|
Turning Point? Grassroots Groups Mobilize Against Netanyahu's 'Catastrophic' Speech Analysts say that the current fallout has the potential to move beyond partisan politics towards a real critique of Israel's actions Read more |
|
|
All Bets Off? Germany Rejects Greek Proposal for Modified Loan Extension Syriza offers its version of a temporary agreement, but Europe's financial powerhouse says austerity measures must be included or 'no deal' Read more |
|
|
Google Joins Civil Liberties Groups To Oppose Expansion of FBI Spy Powers 'Government is seeking a troubling expansion of its power to surreptitiously hack into computers.' Read more |