New York Times
Common Dreams / The Intercept
U.S. officials, including President Barack Obama and Democratic front-runner Hillary Clinton, have insisted that Snowden should and could have gone through channels – and would have been heard. Crane brings unprecedented evidence from inside the system that ostensibly protects whistleblowers that the system isn’t working. And defenders of the system can’t accuse him of having an outside agenda.
Without public notice or debate, the Obama administration has expanded the National Security Agency’s warrantless surveillance of Americans’ international Internet traffic. The NSA’s activities run “smack into law enforcement land,” said Jonathan Mayer, a cybersecurity scholar. “That’s a major policy decision about how to structure cybersecurity in the U.S. and not a conversation that has been had in public.”
Authorization for the federal government's bulk collection of phone records is set to expire on June 1. Senators will return to Capitol Hill on Sunday afternoon -- and unless they extend it, authorization will "sunset" at midnight ET on June 1. The public must speak out now to close this chapter on mass surveillance.
Tidbits - May 28, 2015 - California Oil Spill; Baltimore; Bernie; Waco White Riot; Freedom for Oscar López Rivera New York - May 30; and more...
Reader Comments - California Oil Spill; Baltimore; Bernie Sanders Campaign; Waco and White Riot; Freedom for Oscar López Rivera - New York March May 30; Why Libraries Matter; Cold War Modernist; Announcements - Last Cold War Spycase - film showing - Washington - June 7; National Healthcare Strategy Conference in Chicago Oct. 30 Today in History - The Paris Commune - 144 Years Ago; Today Marks 5 Years in Confinement for Chelsea Manning
Subscribe to NSA
The NSA wanted to do use Google's app store as a launching pad to infect phones with spyware. They were also keen to hijack them as a way of sending “selective misinformation to the targets’ handsets” to spread propaganda or confuse adversaries. Moreover, the agency wanted to gain access to companies’ app store servers so they could secretly use them for “harvesting” information about phone users.