Dianne Feinstein – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Thu, 01 Mar 2018 06:47:58 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Dianne Feinstein – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Obscene Excuses | Unfilter 271 https://original.jupiterbroadcasting.net/122842/obscene-excuses-unfilter-271/ Wed, 28 Feb 2018 22:47:58 +0000 https://original.jupiterbroadcasting.net/?p=122842 RSS Feeds: Video Feed | MP3 Feed | HD Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Links: No, Medical-Marijuana Legalization Doesn’t Make Teens Smoke More Pot Former Trump campaign aide pleads guilty in Russia probe Top Justice Dept. official alerted White House 2 weeks ago to ongoing issues in […]

The post Obscene Excuses | Unfilter 271 first appeared on Jupiter Broadcasting.

]]>

RSS Feeds:

Video Feed | MP3 Feed | HD Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Links:

The post Obscene Excuses | Unfilter 271 first appeared on Jupiter Broadcasting.

]]>
CIA vs Senate | Unfilter 89 https://original.jupiterbroadcasting.net/53282/cia-vs-senate-unfilter-89/ Wed, 12 Mar 2014 21:18:30 +0000 https://original.jupiterbroadcasting.net/?p=53282 After five years the Senate’s investigation into the Central Intelligence Agencies torture programs has bursted into the light when a massive fight went public.

The post CIA vs Senate | Unfilter 89 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

After five years the Senate’s investigation into the Central Intelligence Agencies torture programs has bursted into the light when a massive fight between top Senate officials and the CIA went public in a big way.

Taking to the floor, traditionally an intelligence agency apologist, blasted the CIA we’ll break it all down.

Plus Snowden makes his first public appearance, Greenwald reveals how the NSA spreads malware, your feedback, and much much more.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is Crazy

Snowden rocks SXSW: FULL SPEECH

Speaking remotely from Russia on Monday, former National Security Agency contractor Edward Snowden told attendees at the SXSW Interactive conference in Austin, Texas that encryption is still a powerful deterrent against government surveillance.

The surprising thing was how much time Snowden spent on technical details like the mechanics of end-to-end encryption or the importance of solid encryption standards, rather than the political problems of NSA reform. “They are setting fire to the future of the internet,” he told the crowd, in what seemed designed to be the standout quote of the talk “And the people in the room now, you guys are the firefighters.”

“Giving Hypocrisy a Bad Name”: NSA-Backing Senate Intel Chair Blasts CIA for Spying on Torture Probe

How the NSA Plans to Infect ‘Millions’ of Computers with Malware – The Intercept

The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.”


Featured photo - How the NSA Plans to Infect ‘Millions’ of Computers with Malware
Featured photo – How the NSA Plans to Infect ‘Millions’ of Computers with Malware

The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware.

Documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”

The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”

TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.”

In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the “Expert System,” which is designed to operate “like the brain.” The system manages the applications and functions of the implants and “decides” what tools they need to best extract data from infected machines.

“When they deploy malware on systems,” Hypponen says, “they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties.”

Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm F-Secure said

The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)

Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations.

The TURBINE implants system does not operate in isolation.

It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.

The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England.

The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet.

When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis.

The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.

The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”

In one secret post on an internal message board, an operative from the NSA’s Signals Intelligence Directorate describes using malware attacks against systems administrators who work at foreign phone and Internet service providers. By hacking an administrator’s computer, the agency can gain covert access to communications that are processed by his company. “Sys admins are a means to an end,” the NSA operative writes.

The internal post – titled “I hunt sys admins” – makes clear that terrorists aren’t the only targets of such NSA attacks. Compromising a systems administrator, the operative notes, makes it easier to get to other targets of interest, including any “government official that happens to be using the network some admin takes care of.”

Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.

The implants also track phone calls sent across the network via Skype and other Voice Over IP software, revealing the username of the person making the call. If the audio of the VOIP conversation is sent over the Internet using unencrypted “Real-time Transport Protocol” packets, the implants can covertly record the audio data and then return it to the NSA for analysis.

But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads.

Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.

What’s more, the TURBINE system operates with the knowledge and support of other governments, some of which have participated in the malware attacks.

Classification markings on the Snowden documents indicate that NSA has shared many of its files on the use of implants with its counterparts in the so-called Five Eyes surveillance alliance – the United Kingdom, Canada, New Zealand, and Australia.


:– William P
:– Robert T
:– Jonathan H
:– Oscar C
:– Martin S
:– Austin J
:– John G
:– Carl M

– Thanks for Supporting Unfilter –

  • Thanks to our 362 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


CIA vs the Senate

Behind Clash Between C.I.A. and Congress, a Secret Report on Interrogations

What the C.I.A. did next opened a new and even more rancorous chapter in the struggle over how the history of the interrogation program will be written. Agency officials began scouring the digital logs of the computer network used by the Senate staff members to try to learn how and where they got the report. Their search not only raised constitutional questions about the propriety of an intelligence agency investigating its congressional overseers, but has also resulted in two parallel inquiries by the Justice Department — one into the C.I.A. and one into the committee.

A deal was struck between Leon E. Panetta, the director of the C.I.A., and Senator Dianne Feinstein of California, the intelligence committee’s Democratic chairwoman, to make millions of documents available to the committee at a C.I.A. facility near the agency’s headquarters in Langley, Va. The documents covered roughly five years: from the inception of the program until September 2006, when all of the C.I.A.’s prisoners were transferred to the American military prison at Guantánamo Bay, Cuba.

At the same time, Mr. Panetta ordered the C.I.A. to conduct its own review of the documents, a move designed to help the agency better understand the volumes of the material it had agreed to hand over to its congressional overseers.

Some people who have read the review memos said that parts of them were particularly scorching in their analysis of extreme interrogation methods like waterboarding, which the memos described as providing little intelligence of any value.

According to a recent court filing in a Freedom of Information Act lawsuit, the C.I.A. created a “network share drive” segregated from the main agency network, a provision intended to allow the committee to work in private.

It is unclear how or when committee investigators obtained parts of the Panetta review. One official said that they had penetrated a firewall inside the C.I.A. computer system that had been set up to separate the committee’s work area from other agency digital files, but exactly what happened will not be known until the Justice Department completes its inquiry.

Senator Mark Udall of Colorado disclosed the existence of the review during an open hearing on Dec. 17.

C.I.A. officials had come to suspect that committee investigators working at the Virginia facility had seen at least a version of the internal review. Senior officials at the agency ordered a search of several years’ worth of digital audit logs that the C.I.A. uses to monitor its computer systems.

In January, the C.I.A. presented the results of its search to the intelligence committee in a tense meeting that ignited the most recent confrontation. The day after the meeting, Senator Feinstein wrote a letter to Mr. Brennan demanding answers for why the C.I.A. carried out the search, which she suggested had violated the constitutional separation of powers and undermined the committee’s oversight role.

Dianne Feinstein launches scathing attack on CIA over alleged cover-up

  • Intelligence committee chair accuses CIA of smear campaign
  • Feinstein alleges CIA broke law and violated constitution
  • CIA director John Brennan denies thwarting investigation
  • Dianne Feinstein statement – full text

Feinstein: CIA searched Intelligence Committee computers

Feinstein described the escalating conflict as a “defining moment” for Congress’s role in overseeing the nation’s intelligence agencies and cited “grave concerns” that the CIA had “violated the separation-of-powers principles embodied in the United States Constitution.”

The CIA: the double life of Dianne Feinstein

The senator’s contradictory nature was on show for all to see on Tuesday, when she delivered an extraordinary speech from the Senate floor. It amounted to the biggest and most public rift between Congress and the spy community since the 9/11 attacks. Ms Feinstein, who chairs the Senate intelligence committee, which has oversight of America’s myriad spy agencies, accused the CIA of breaking into the committee’s computers. It is an extremely serious charge: a breach of the constitution, the executive branch tampering with the elected branch. She described it as “a defining moment for the oversight of our intelligence community”.

The day after Edward Snowden revealed himself as a whistleblower last June, she was among the first to brand him a traitor. In the face of revelation after revelation, she praised the professionalism of the NSA. She defended mass data collection as a necessity, arguing that the NSA had to have access to the whole “haystack” to find the one needle, the terrorist.

Panetta Review

The Panetta Review was a secret internal review conducted by Leon Panetta, then the Director of the United States Central Intelligence Agency, of enhanced interrogation techniques previously used by the CIA during the administration of George W. Bush. The review led to a series of memoranda that, as of March 2014, remained classified. According to The New York Times, the memoranda “cast a particularly harsh light” on the Bush-era interrogation program, and people who have read them have said parts of the memos are “particularly scorching” of techniques such as waterboarding, which the memos describe as providing little valuable intelligence

Legacy of Ashes: The History of the CIA

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post CIA vs Senate | Unfilter 89 first appeared on Jupiter Broadcasting.

]]>
Drone Crimes | Unfilter 72 https://original.jupiterbroadcasting.net/45187/drone-crimes-unfilter-72/ Wed, 23 Oct 2013 20:43:51 +0000 https://original.jupiterbroadcasting.net/?p=45187 Two major reports landed this Tuesday that outline the evidence of war crimes committed by the United States, using Drones.

The post Drone Crimes | Unfilter 72 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Two major reports landed this Tuesday that outline the evidence of war crimes committed by the United States, using Drones. Both reports involved a staggering amount of on the ground data collection, and the timing of the release is no coincidence, we’ll dig in.

Then: Leaks from Edward Snowden has revealed the NSA’s massive surveillance of the French public, hacking the email of the Mexican president, and that’s just the start. We’ll share the details.

Plus our GMO watch, your feedback, and much much more.

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is CRAZY

The French government summoned the US ambassador in Paris on Monday to demand an urgent explanation over claims that the National Security Agency had engaged in widespread phone and internet surveillance of French citizens.

More than 70m French phone calls had been recorded in one 30-day period late last year. Techniques included the automatic recording of conversations from certain numbers, and sweeping up text messages based on keywords. The paper warned that the interceptions were likely to have targeted not just those with suspected terrorist links but also people in business, politics and the French administration.

Also when it comes to spying on citizens, French or foreign, they are no different from the NSA. Le Monde itself detailed the activity of French external intelligence agency DGSE only three months ago. According to the report, the DGSE collects phone calls and emails in France and other countries, breaking French law with the authorization of previous presidents and the current Francois Hollande.

In reporting the story, the Post disclosed that it withheld “many details” about NSA activities that help the CIA. This was done, they said, “at the request of U.S. intelligence officials who cited potential damage to ongoing operations and national security.”

When asked about its CIA collaboration, an NSA spokesman said in a statement that the agency is “focused on discovering and developing intelligence about valid foreign intelligence targets,” adding that its operations “protect the nation and its interests from threats such as terrorism and the proliferation of weapons of mass destruction.”

The German government’s spokesman said it believes Chancellor Angela Merkel’s mobile phone may have been monitored by the National Security Agency, Der Spiegel reports.
Merkel has complained to Obama directly.

Dianne Feinstein, the chair of the US Senate committee charged with holding the intelligence establishment to account, declared on Monday that the National Security Agency’s mass collection of phone records is “not surveillance” and should be maintained as an essential tool to combat terrorism.

Feinstein made the case for retaining the program, which routinely collects and stores the phone records millions of Americans, in an op-ed for USA Today, in which she wrote that the NSA’s work had been “effective in helping to prevent terrorist plots against the US and our allies”.


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Henrik T

  • T E

  • Wim W

  • Russell

  • Alan P

  • Frankie

  • Sean

  • Nicholas C

  • Thomas D

  • Sanny J

  • Campbell H

  • Nicholas B

  • Nathan

  • Chris

  • Ben

  • Thanks to our 229 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘


Drone Crimes

New evidence indicates that the USA has carried out unlawful killings in Pakistan through drone attacks, some of which could even amount to war crimes, Amnesty International said in a major new report released today.

Amnesty International reviewed all 45 known drone strikes that took place in North Waziristan in northwestern Pakistan between January 2012 and August 2013. The region that has seen more strikes than any other part of the country.

The organization conducted detailed field research into nine of these strikes, with the report documenting killings, which raise serious questions about violations of international law that could amount to war crimes or extrajudicial executions.

The report is issued in conjunction with an investigation by Human Rights Watch detailing missile attacks in Yemen which the group believes could contravene the laws of armed conflict, international human rights law and Barack Obama’s own guidelines on drones.

The reports are being published while Nawaz Sharif, Pakistan’s prime minister, is in Washington. Sharif has promised to tell Obama that the drone strikes – which have caused outrage in Pakistan – must end.

This report is not a comprehensive survey of US drone strikes in Pakistan; it is a qualitative assessment based on detailed field research into nine of the 45 reported strikes that occurred in Pakistan’s North Waziristan tribal agency between January 2012 and August 2013 (see Appendix) and a survey of publicly available information on all reported drone strikes in Pakistan over the same period.

An area bordering Afghanistan, North Waziristan is one of the seven tribal agencies that make up the Federally Administered Tribal Areas (Tribal Areas), a loosely-governed territory in northwest Pakistan that has been the focus of all US drone strikes in the country.

Download the Report

Since 2002, armed drones have become an increasingly important element of U.S. national security policy. This project – which will be updated regularly – documents drone strikes in Pakistan, Yemen and Somalia.


Oh no… GMO?

The I–522 proposal isn’t much better. Some foods that are produced with genetically engineered ingredients or processing aids such as cheese, yogurt, and bakery products, all of which may use enzymes in production, would be exempt from the labeling requirements, as would all restaurants and alcoholic beverages.

As critics also claim, there is a labeling program of sorts consumers can already use if they’re looking for GMO-free foods. Both the Non-GMO Project and Genetic ID offer consumers a verified label option, albeit it requires they seek out food manufacturers that themselves have sought the designation

Feedback:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Drone Crimes | Unfilter 72 first appeared on Jupiter Broadcasting.

]]>
In NSA We Trust | Unfilter 61 https://original.jupiterbroadcasting.net/41037/in-nsa-we-trust-unfilter-61/ Wed, 31 Jul 2013 22:21:43 +0000 https://original.jupiterbroadcasting.net/?p=41037 XKeyscore has been exposed in a newly released presentation giving us a better picture of the system said to hold a three day buffer of all Internet activity.

The post In NSA We Trust | Unfilter 61 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A diagram that literally puts the NSA’s world wide spying system on the map has been exposed in a newly released presentation giving us a better picture of the surveillance system that is said to hold a three day buffer of all Internet activity.

Plus: An update on Bradley Manning, the Obama Administration pledges not to torture Snowden, and the US continues to dance around that big problem in Egypt.

Then it’s your feedback, our follow up, and much much more…

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


Violence in Egypt Over the Weekend

A coalition of human rights liberals and conservatives opposed to foreign aid is gaining strength. In mid-July, Senate Republicans John McCain and Lindsey Graham, two party leaders on foreign policy, called canceling military aid “right and necessary.” Though, Graham said Tuesday he’s reserving final judgment until he and McCain return next week from a trip to Egypt at President Obama’s behest.


– Thanks for Supporting Unfilter –

In a twist that television industry gawkers immediately homed in on, the victory was shared by Ms. Sawyer and one of her regular fill-ins, David Muir. That was because Mr. Muir substituted for Ms. Sawyer three nights last week — the same three nights, it turned out, that ABC beat NBC in the all-important ratings demographic. Mr. Williams prevailed, barely, on the two nights that Ms. Sawyer was at work.

This Week’s New Supporters:

  • Benjamin J
  • Craig T
  • Rex
  • Bertel K
  • Thanks to our 142 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience.

  • Become a Supporter


Manning Not Aiding the Enemy – Faces Years in Prison

A military judge on Tuesday found U.S. soldier Bradley Manning not guilty of aiding the enemy, the most serious charge he faced for handing over documents to WikiLeaks, but he still likely faces a long jail term after being found guilty of 19 other counts.

One of Manning’s most visible supporters was banned from the trial Friday after the judge said someone posted threats online. Clark Stoeckley, a college art instructor from New Jersey, confirmed he was the one booted.

Stoeckley attended the court-martial as a sketch artist, arriving each day in a white box truck with bold words painted on the sides: “WikiLeaks TOP SECRET Mobile Information Collection Unit.”

A tweet Thursday night from an account Stoeckley used said: “I don’t know how they sleep at night but I do know where.” It was removed Friday and Stoeckley told The Associated Press on Twitter he couldn’t comment.

During Bradley Manning’s trial in Fort Meade, Maryland, many of the soldier’s supporters showed up during the trial to back the whistleblower for revealing one of the biggest data leaks in US history, but last Friday Clark Stoeckley, courtroom sketch artist, was banned for one of his tweets.

NSA is Crazy

From Greenwald:

XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

Furthermore, Greenwald reports that analysts can use XKeyscore and other NSA systems “to obtain ongoing ‘real-time’ interception of an individual’s internet activity.”

Training materials for the XKeyscore program detail how analysts can use it and other systems to mine enormous agency databases and develop intelligence from the web

Some highlights:

“Performs strong (e.g. email) and soft (content) selection.” pg 2

“Provides real-time target activity.” pg 2

“Show me all the VPN startups in country X, and give me the data so I can decrypt and discover the users” pg 17

“Show me all the exploitable machines in country X” pg 24

According to one of the 11 judges that sits on the Foreign Intelligence Surveillance Court (FISC), no corporation ever served with a “business record” court order under the Patriot Act has ever challenged one, even though the law provides them a means to do so.

Sen. Ron Wyden said Tuesday that U.S. intelligence agencies’ violations of court orders on surveillance of Americans is worse than the government is letting on.

Wyden (D-Ore.), as a member of the Senate Intelligence Committee, is privy to classified briefings on the government’s surveillance. On Tuesday, he told Andrea Mitchell on MSNBC that all he could say is that the violations are worse than being made public.

• XKeyscore gives ‘widest-reaching’ collection of online data
• NSA analysts require no prior authorization for searches
• Sweeps up emails, social media activity and browsing history
NSA’s XKeyscore program – read one of the presentations

United States Representative Mike Rogers serves as the Chairman of the House Permanent Select Committee on Intelligence. The Committee is the House’s primary panel responsible for authorizing the funding for and overseeing the execution of the intelligence activities of the United States government.

General Keith Alexander Visits Black Hat

Alexander’s talk had begun with a plea for the hacker and security researcher community to reconsider the NSA’s role in the wake of a still-unfolding scandal revealed by the classified leaks of former Booz Allen contractor Edward Snowden. “Their reputation has been tarnished,” he said, speaking of his NSA staff. “But you can help us articulate the facts properly. I will answer every question to the fullest extent possible, and I promise you the truth: What I know, what we’re doing, and what I cannot tell you because we don’t want to jeopardize the future of our defense.”

After the talk, I found McCoy in the crowd and asked him about his not-so-friendly debate with the general. “His speech was pretty canned,” said McCoy. “It’s anything you can see on Fox News any day. We’re in danger, we have to get rid of your freedom to keep you safe.”

“Everyone’s thinking this, but no one’s saying it public, so everyone thinks they’re alone,” he said. “Ninety-eight percent of society has issues with this…But no one speaks up.”

He attempted to reassure a skeptical audience by saying “our people have to take courses and pass exams to use this data.” Data from the interception programs has “provided value” across some 53 “terror-related activities” detected by the NSA.


Where in the World is Snowden

In a letter sent this week, US attorney general Eric Holder told his Russian counterpart that the charges faced by Snowden do not carry the death penalty. Holder added that the US “would not seek the death penalty even if Mr Snowden were charged with additional, death penalty-eligible crimes”.

Holder said he had sent the letter, addressed to Alexander Vladimirovich, Russia’s minister of justice, in response to reports that Snowden had applied for temporary asylum in Russia “on the grounds that if he were returned to the United States, he would be tortured and would face the death penalty”.

House Intelligence Committee Chairman Mike Rogers (R-Mich.) said Sunday that Edward Snowden’s actions defy logic.

By granting NSA leaker Edward Snowden temporary asylum, Russia is giving itself time to figure out what their best move is, the chairman of the Senate Intelligence Committee said Sunday.

What has happened to NSA whistleblower who leaked files to Guardian since he decided to reveal his identity to the world and began his asylum battle


Feedback:

Bitmessage Address: BM-GuQ4gqmBeW8CYpSo3Htg2pBrBdHbvpe7

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post In NSA We Trust | Unfilter 61 first appeared on Jupiter Broadcasting.

]]>