Auditors are raising questions about more than $700,000 in federal homeland security grants given to local officials in Laurel County, Ky. A report says the county among other things used $11,000 to pay for five black-marble monuments that immortalized a local official and the former commander of Kentucky’s National Guard. Presumably the decorations wouldn’t go far in protecting area residents.
The Center for Investigative Reporting has devoted much of its homeland security project to examining how state and local governments chose to spend the swell of anti-terrorism and preparedness grants Congress began handing out by the billions after Sept. 11. Our map describes dubious investments revealed elsewhere.
Kentucky auditors had already criticized the use of federal readiness funds in Laurel County for a sectional couch, dressers, night stands, three “captain beds,” La-Z-Boys and more. One emergency manager was also accused of overseeing $530,000 worth of contracts awarded to a woman with whom he had private business ties. The two eventually married.
Google confirmed Sept. 14 that it fired an engineer for snooping on teen Internet users by inappropriately accessing call logs from Google Voice, chat transcripts and contact lists. A segment of Google employees have access to such sensitive information for maintenance purposes.
The governor of Pennsylvania apologized after learning that a firm hired by the state’s Office of Homeland Security collected information about harmless political activists. The list of targets included gay and lesbian groups, antiwar and antinuclear protesters and even an organization founded by the governor’s own chief policy advisor that works to promote education.
Just days before parliamentary elections were scheduled to take place in Afghanistan, independent overseers announced that thousands of bogus voter registration cards were discovered in a province southwest of Kabul. Allegations of widespread fraud plagued the country’s most recent presidential election, won last year by Hamid Karzai.
Lawmakers are proposing legislation that would turn private security guards now in charge of protecting federal buildings into public employees. The move follows a series of blistering, high-profile reports that embarrassed the Federal Protective Service and described congressional investigators easily entering sensitive government facilities with bomb-making materials. A guard was found last year asleep at his post after taking painkillers, while a baby was sent through an X-ray machine accidentally on another occasion. One guard was also caught operating an adult website on government computers.
A federal appeals court has abandoned rules it established just last year directing the government to only take from computer hard drives material described in a previously obtained search warrant, as opposed to copying all of the contents. The past ruling said that when specific data couldn’t be extracted by law enforcement, they should rely on an independent party to single out the desired files while observing the owner’s right to privacy and leaving the rest alone.
Judges on the 9th U.S. Circuit Court of Appeals have now rejected the requirements, but they still emphasized the government’s need to only use files from a computer search outlined in a warrant.
Flickr image courtesy dog manor
Republish this article
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
Republish Our Content
Thanks for your interest in republishing a story from Reveal. As a nonprofit newsroom, we want to share our work with as many people as possible. You are free to embed our audio and video content and republish any written story for free under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 license and will indemnify our content as long as you strictly follow these guidelines:
-
Do not change the story. Do not edit our material, except only to reflect changes in time and location. (For example, “yesterday” can be changed to “last week,” and “Portland, Ore.” to “Portland” or “here.”)
-
Please credit us early in the coverage. Our reporter(s) must be bylined. We prefer the following format: By Will Evans, Reveal.
-
If republishing our stories, please also include this language at the end of the story: “This story was produced by Reveal from The Center for Investigative Reporting, a nonprofit news organization. Learn more at revealnews.org and subscribe to the Reveal podcast, produced with PRX, at revealnews.org/podcast.”
-
Include all links from the story, and please link to us at https://www.revealnews.org.
PHOTOS
-
You can republish Reveal photos only if you run them in or alongside the stories with which they originally appeared and do not change them.
-
If you want to run a photo apart from that story, please request specific permission to license by contacting Digital Engagement Producer Sarah Mirk, smirk@revealnews.org. Reveal often uses photos we purchase from Getty and The Associated Press; those are not available for republication.
DATA
-
If you want to republish Reveal graphics or data, please contact Data Editor Soo Oh, soh@revealnews.org.
IN GENERAL
-
We do not compensate anyone who republishes our work. You also cannot sell our material separately or syndicate it.
-
You can’t republish our material wholesale, or automatically; you need to select stories to be republished individually. To inquire about syndication or licensing opportunities, please contact Sarah Mirk, smirk@revealnews.org.
-
If you plan to republish our content, you must notify us republish@revealnews.org or email Sarah Mirk, smirk@revealnews.org.
-
If we send you a request to remove our content from your website, you must agree to do so immediately.
-
Please note, we will not provide indemnification if you are located or publishing outside the United States, but you may contact us to obtain a license and indemnification on a case-by-case basis.
If you have any other questions, please contact us at republish@revealnews.org.