and if someone is making a claim, especially one of this magnitude they should provide some evidence
i thought i heard obama say this past friday that they weren't going to release any evidence
because = super secret spy stuff you don't need to know or see
he openly admitted that the voting machines weren't hacked but wikileaks emails outing/exposing behind the scenes info was the result of russian govt handy work
assange and others say no and provide your evidence
it's no secret our politicians and their enforcers have had a boner for wikileaks/assange (example)
True, but it would seem that providing clear evidence of espionage can be a tricky move for several reasons, one of which is compromising one's own methods, but also explaining how they identify the hacking "signatures" or "fingerprints" of known entities in "laymen's terms". It seems to me that at some time there will be some sort "evidence" provided soon, but we'll have to wait and see. The CIA, FBI, and other intelligence agencies have seldom (if ever) really been clear proponents of one political party or another, and the fact that the incoming President is continually denigrating American intelligence agencies and dismissing their claims shows more of his narcissism - thinking it's all about him.
The long read How the Pentagon punished NSA whistleblowers Long before Edward Snowden went public, John Crane was a top Pentagon official fighting to protect NSA whistleblowers. Instead their lives were ruined – and so was his
A newly published study from Oxford’s Jon Penney provides empirical evidence for a key argument long made by privacy advocates: that the mere existence of a surveillance state breeds fear and conformity and stifles free expression. Reporting on the study, the Washington Post this morning described this phenomenon: “If we think that authorities are watching our online actions, we might stop visiting certain websites or not say certain things just to avoid seeming suspicious.
The new study documents how, in the wake of the 2013 Snowden revelations (of which 87% of Americans were aware), there was “a 20 percent decline in page views on Wikipedia articles related to terrorism, including those that mentioned ‘al-Qaeda,’ “car bomb’ or ‘Taliban.'” People were afraid to read articles about those topics because of fear that doing so would bring them under a cloud of suspicion. The dangers of that dynamic were expressed well by Penney: “If people are spooked or deterred from learning about important policy matters like terrorism and national security, this is a real threat to proper democratic debate.”
As the Post explains, several other studies have also demonstrated how mass surveillance crushes free expression and free thought. A 2015 study examined Google search data and demonstrated that, post-Snowden, “users were less likely to search using search terms that they believed might get them in trouble with the US government” and that these “results suggest that there is a chilling effect on search behavior from government surveillance on the Internet.” (...)
Under new guidelines, the FBI is instructing high schools across the country to report students who criticize government policies and "western corruption" as potential future terrorists, warning that "anarchist extremists" are in the same category as ISIS and young people who are poor, immigrants or travel to "suspicious" countries are more likely to commit horrific violence.
Based on the widely unpopular British "anti-terror" mass surveillance program, the FBI's "Preventing Violent Extremism in Schools" guidelines, released in January, are almost certainly designed to single out and target Muslim-American communities. However, in its caution to avoid the appearance of discrimination, the agency identifies risk factors that are so broad and vague that virtually any young person could be deemed dangerous and worthy of surveillance, especially if she is socio-economically marginalized or politically outspoken. (...)
Yeah, the whole thing is bull. The crime has been committed, the perpetrators are dead. This is just a fishing expedition for hypothetical conspirators. Those may exist but it is unlikely that there is anything of importance on the phone - especially since they know there were private phones that were destroyed.
It's not like they have 24 hours to prevent a nuclear attack or anything - there is no immanent threat. But the main thing is that this is a Pandora's box that will put more Americans (and people in other countries) at risk than it could possibly save.
Sworn testimony delivered to the U.S. Congress by Director of National Intelligence James Clapper raised eyebrows on Tuesday as he acknowledged publicly for the first time that surveillance agencies are almost certain to exploit (if they aren't already) the increasing number of web-connected devices—also known as the "Internet of Things"—as a way to keep tabs on the population in the coming years.
"In the future, intelligence services might use the (Internet of Things) for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials," Clapper said in his submitted testimony (pdf).
In a piece at The Register—titled "We're going to use your toothbrush to snoop on you, says US spy boss"—tech-security journalist Kieran McCarthy reports Clapper's acknowledgement that the Internet of Things (IoT) is a "potential goldmine for surveillance" echoes "a similar conclusion reached by academics last week." The testimony on Tuesday, McCarthy adds, follows "repeated warnings over the poor security standards included in smart-home products, even the most well-resourced and well-known. Recently, the Ring doorbell and the Nest thermostat were discovered to have security vulnerabilities that could provide an attacker with your Wi-Fi password – and so access to your home network.
According to Guardian journalist Spencer Ackerman, Clapper's admission about the surveillance potential of networked home devices—which also include wi-fi enabled smoke detectors, larger appliances, and entertainment systems—"is rare for a US official." Not commonly discussed in public, Ackerman points to a 2012 speech by then CIA director David Petraeus who described the surveillance implications of such devices as "transformational … particularly to their effect on clandestine tradecraft."
Though Clapper did "not specifically name any intelligence agency as involved in household-device surveillance", reports Ackerman, "security experts examining the internet of things take as a given that the US and other surveillance services will intercept the signals the newly networked devices emit, much as they do with those from cellphones. Amateurs are already interested in easily compromised hardware; computer programmer John Matherly’s search engine Shodan indexes thousands of completely unsecured web-connected devices." (...)
American and British intelligence secretly tapped into live video feeds from Israeli drones and fighter jets, monitoring military operations in Gaza, watching for a potential strike against Iran, and keeping tabs on the drone technology Israel exports around the world.
Under a classified program code-named “Anarchist,” the U.K.’s Government Communications Headquarters, or GCHQ, working with the National Security Agency, systematically targeted Israeli drones from a mountaintop on the Mediterranean island of Cyprus. GCHQ files provided by former NSA contractor Edward Snowden include a series of “Anarchist snapshots” — thumbnail images from videos recorded by drone cameras. The files also show location data mapping the flight paths of the aircraft. In essence, U.S. and British agencies stole a bird’s-eye view from the drones.
Several of the snapshots, a subset collected in 2009 and 2010, appear to show drones carrying missiles. Although they are not clear enough to be conclusive, the images offer rare visual evidence to support reports that Israel flies attack drones — an open secret that the Israeli government won’t acknowledge.
“There’s a good chance that we are looking at the first images of an armed Israeli drone in the public domain,” said Chris Woods, author of Sudden Justice, a history of drone warfare. “They’ve gone to extraordinary lengths to suppress information on weaponized drones.”
Additionally, in 2012, a GCHQ analyst reported “regular collects of Heron TP carrying weapons,” referring to a giant drone made by the state-owned Israel Aerospace Industries, known as IAI.
Anarchist operated from a Royal Air Force installation in the Troodos Mountains, near Mount Olympus, the highest point on Cyprus. The Troodos site “has long been regarded as a ‘Jewel in the Crown’ by NSA as it offers unique access to the Levant, North Africa, and Turkey,” according to an article from GCHQ’s internal wiki. Last August, The Interceptpublished a portion of a GCHQ document that revealed that NSA and GCHQ tracked weapons signals from Troodos, and earlier reporting on the Snowden documents indicated that the NSA targeted Israeli drones and an Israeli missile system for tracking, but the details of the operations have not been previously disclosed. (...)
One of the National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, The Intercept is publishing 48 top-secret and other classified documents about XKEYSCORE dated up to 2013, which shed new light on the breadth, depth and functionality of this critical spy system — one of the largest releases yet of documents provided by NSA whistleblower Edward Snowden.
The NSA’s XKEYSCORE program, first revealed by The Guardian, sweeps up countless people’s Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is fed a constant flow of Internet traffic from fiber optic cables that make up the backbone of the world’s communication network, among other sources, for processing. As of 2008, the surveillance system boasted approximately 150 field sites in the United States, Mexico, Brazil, United Kingdom, Spain, Russia, Nigeria, Somalia, Pakistan, Japan, Australia, as well as many other countries, consisting of over 700 servers. (...)