Michael from Mother Jones
sez, "This yearlong investigation by Mother Jones and the Investigative Reporting Program at UC-Berkeley explores the network of thousands of informants the FBI employs in its domestic counter-terrorism program, operating in gray area where the snitches don't merely observe and report, but actively push their targets (in many cases hapless losers who never would have acted otherwise) to pursue their darkest fantasies. In the process, MoJo created a searchable database of 508 terror prosecutions."
Here's how it works: Informants report to their handlers on people who have, say, made statements sympathizing with terrorists. Those names are then cross-referenced with existing intelligence data, such as immigration and criminal records. FBI agents may then assign an undercover operative to approach the target by posing as a radical. Sometimes the operative will propose a plot, provide explosives, even lead the target in a fake oath to Al Qaeda. Once enough incriminating information has been gathered, there's an arrest—and a press conference announcing another foiled plot.
Terrorists for the FBI Exclusive | Mother Jones
If this sounds vaguely familiar, it's because such sting operations are a fixture in the headlines. Remember the Washington Metro bombing plot? The New York subway plot? The guys who planned to blow up the Sears Tower? The teenager seeking to bomb a Portland Christmas tree lighting? Each of those plots, and dozens more across the nation, was led by an FBI asset.
Over the past year, Mother Jones and the Investigative Reporting Program at the University of California-Berkeley have examined prosecutions of 508 defendants in terrorism-related cases, as defined by the Department of Justice.
(Image: Jeffrey Smith
Edinburgh’s Nahid Akram installed a CCTV system that let him record his downstairs neighbours Debbie and Tony Woolley in their back garden, capturing both images and audio of their private conversations, with a system that had the capacity to record continuously for five days.
Internet traffic nowadays is mostly encrypted (“HTTPS”). Thus, for a few years now, Law Enforcement Agencies (LEA) have been facing far more challenges at gathering data through the interception of connections than they used to.
Civil asset forfeiture is the bizarre American practice of seizing peoples’ property without charging its owner: instead the property is charged with being the ill-gotten gains of a crime, and if the owner doesn’t pay their property’s legal bills, the police get to keep or sell the property.
Python is immensely popular in the data science world for the same reason it is in most other areas of computing—it has highly readable syntax and is suitable for anything from short scripts to massive web services. One of its most exciting, newest applications, however, is in machine learning. You can dive into this booming […]
Learning new skills is a great way to improve your resume and stand out from other candidates. Especially in a workforce in which many job-seekers have a wide variety of qualifications. With lifetime access to Virtual Training Company, you won’t have to choose a specific focus. You can pick up new expertise whenever you deem it […]
Instead of throwing out all the empties after your next party, why not transform them into some new DIY glassware? Cut back on waste and add some home ambiance with the Kinkajou Bottle Cutter and Candle Making Kit.The Kinkajou is designed as a clamp-on scoring blade to make precise cuts. Just slide a bottle in, tighten […]