Federal charges were announced less than an hour after The Intercept published a top-secret document from the National Security Agency that described Russian efforts to launch cyber attacks on at least one U.S. voting software supplier and send “spear-phishing” emails, or targeted emails that try to trick a recipient into clicking on a malicious link to steal data, to more than 100 local election officials days before the presidential election last November.
After reciting some of the troubling facts in the Trump investigation, Rep. Adam Schiff (D-CA), the committee’s ranking Democrat, observed that the likelihood of all these connections being merely coincidental is extremely small. Former White House counsel John Dean, whose 1973 testimony helped to break Nixon’s Watergate defense, went further, saying he sees the Trump White House in a familiar “cover-up mode.”
The classified briefings last week were presented to Trump and President Obama by the Director of National Intelligence and the directors of the CIA, FBI, and National Security Agency. The U.S. intelligence chiefs included a classified summary of the material to make Trump aware that it is circulating among federal agencies, senior members of Congress, and government officials.
Harold Thomas Martin, 51, who worked for Booz Allen Hamilton, was taken into custody in Maryland in August, said a U.S. official, speaking on condition of anonymity. Booze Allen is the consulting firm that employed Edward Snowden when he revealed the collection of metadata by the NSA in 2013.
A federal investigation into a leak of hacking tools used by the National Security Agency is focusing on a theory that one of its operatives carelessly left them available on a remote computer — and Russian hackers found them.
WASHINGTON (Reuters) – The Obama administration is preparing to elevate the stature of the Pentagon’s Cyber Command, signaling more emphasis on developing cyber weapons to deter attacks, punish intruders into U.S. networks and tackle adversaries such as Islamic State, current and former officials told Reuters. Under the plan being considered at the White House, the officials said, U.S. Cyber Command would become what the military calls a “unified command” equal to combat branches of the military such as the Central and Pacific Commands.
The most unusual thing about the case argued in federal court in Providence, Rhode Island, on June 19, 2008, was not that the court convening it, the FISA Court of Review, had met only once before in its thirty-year history. It wasn’t the way technicians had swept the room for bugs and cut it off from the Internet, turning Courtroom 3 temporarily into a Sensitive Compartmented Information Facility (SCIF).
Researcher Jonathon Penney looked at Wikipedia searches conducted after June 2013, when news of NSA spying programs so thoroughly dominated headlines that 87 percent of Americans became aware of them. In the wake of the story, he found “a 20 percent decline in page views on Wikipedia articles related to terrorism, including those that mentioned ‘al-Qaeda,’ ‘car bomb’ or ‘Taliban.’”
The goal of protecting both security and privacy is a worthy one, but it requires two things: One is the maturity to accept the often-difficult trade-offs. The other is an understanding of what the data collection being considered actually involves.
After 14 years and hundreds of millions of records of Americans’ telephone calls, the National Security Agency stopped bulk collection of phone data Sunday, officials said, as legal authority for the once-secret program expired.
A court decision Thursday that declared the National Security Agency’s bulk collection of telephone metadata to be illegal revealed a sharp split among several Republican presidential hopefuls over the scope of the surveillance.