Author of the “Underground Steroid Handbook,” Daniel Duchaine is a controversial figure in the bodybuilding world, once described as a “cross between Andy Kaufman and Albert Einstein, with some Bart Simpson thrown in.” A recent release of Federal Bureau of Investigation records on Duchaine reveal him as not only an expert on masking the use of anabolic steroids in athletes, but also an expert at masking their trafficking from the FBI.
To Kill a MOCKINGBIRD: Recently released records dispel old myths surrounding CIA program targeting journalists
A review of a file released to MuckRock on Project MOCKINGBIRD sheds new light on a Central Intelligence Agency program of domestic surveillance that targeted a pair of journalists. In the process, it dispels old myths, highlights and clarifies an error in CIA’s Family Jewels and an omission in the Rockefeller Commission’s Report. The file also reveals that the CIA’s surveillance of the journalists resulted in recording phone conversations with members of Congress - possibly including the Speaker of the House.
EFF and MuckRock have a launched a new public records campaign to reveal how much data law enforcement agencies have collected using automated license plate readers and are sharing with each other.
Today is the 15th anniversary of 2003’s coordinated protest against the Iraq War. With attendance in the millions, at the time it was the “the largest protest event in human history.” Though we don’t have any records from that particular protest, Federal Bureau of Investigation files show that later demonstrations were under heavy Bureau surveillance, taking note of details as banal as a car bearing a pro-peace bumper sticker.
A series of recently released legal guidelines on Open Source Intelligence explain how and when intelligence agencies can exploit social media and other online resources. One of the documents, previously classified SECRET//NOFORN, hints at the online recruitment of people as sources of information. Collectively, the guidelines spell out the restrictions intelligence agencies work with when dealing with OSINT, revealing how users and developers can deter intelligence agencies from some of the most casual, and pervasive, forms of surveillance.