ForgotPassword?
Sign Up
Search this Topic:
Posts: 27156
Dec 26 15 3:49 PM
Whistleblower Edward Snowden took to Twitter to condemn Clinton's hawkishness in the last 2015 Democratic debate “Aaaaaaaaand Hillary just terrified everyone with an internet connection,” whistleblower Edward Snowden tweeted Saturday night, during the third Democratic presidential debate. Aaaaaaaaand Hillary just terrified everyone with an internet connection. #DemDebate — Edward Snowden (@Snowden) December 20, 2015 Snowden, who worked for a private contractor with the National Security Agency (NSA), leaked documents in 2013 showing how the U.S. government was spying not just on all of its citizens’ private phone calls and messages, but also even on the private phone calls of allied heads of state in Germany, France, and more. Journalist Glenn Greenwald, the Washington Post, and leading British newspaper the Guardian were awarded the prestigious Pulitzer Prize, journalism’s highest honor, for their work with Snowden. Snowden was referring to Clinton’s hawkish foreign policy positions, which she defended in the New Hampshire debate. When Clinton proudly stood by her role building a coalition and leading the 2011 NATO war in Libya, which destroyed the government and plunged the country into chaos, Snowden sarcastically tweeted “That Libya coalition worked out great.”
“Aaaaaaaaand Hillary just terrified everyone with an internet connection,” whistleblower Edward Snowden tweeted Saturday night, during the third Democratic presidential debate.
Aaaaaaaaand Hillary just terrified everyone with an internet connection. #DemDebate
— Edward Snowden (@Snowden) December 20, 2015
Snowden, who worked for a private contractor with the National Security Agency (NSA), leaked documents in 2013 showing how the U.S. government was spying not just on all of its citizens’ private phone calls and messages, but also even on the private phone calls of allied heads of state in Germany, France, and more. Journalist Glenn Greenwald, the Washington Post, and leading British newspaper the Guardian were awarded the prestigious Pulitzer Prize, journalism’s highest honor, for their work with Snowden.
Snowden was referring to Clinton’s hawkish foreign policy positions, which she defended in the New Hampshire debate.
When Clinton proudly stood by her role building a coalition and leading the 2011 NATO war in Libya, which destroyed the government and plunged the country into chaos, Snowden sarcastically tweeted “That Libya coalition worked out great.”
Read more @ http://www.salon.com/2015/12/20/hillary_just_terrified_everyone_edward_snowden_slams_clintons_hawkish_foreign_policy_in_third_debate/
Apple has rejected the UK’s new draft surveillance bill. This new bill will force a handful of companies currently operating there to either tone down encryption or get rid of it completely. DRIPA Bill Puts UK Government Against Encryption The draft Investigatory Powers Bill was first released last month. It has been rewritten to clarify laws that would allow the UK government to monitor surveillance over phone hacking and malware installment on target devices. They’ve been doing this for the past decade, and the bill would justify and extend this policy. This Bill Puts the UK Government as the Supreme Authority No Matter What The bill also forces technological companies to take out any encryption upon the request of any authority. This week, Apple released a letter in response to the bill. The letter details that this bill could cause some damage to lawful users to find a couple of bad eggs ruining technology for everyone else. As such, they will not abide by the rules of this bill.
Apple has rejected the UK’s new draft surveillance bill. This new bill will force a handful of companies currently operating there to either tone down encryption or get rid of it completely.
The draft Investigatory Powers Bill was first released last month. It has been rewritten to clarify laws that would allow the UK government to monitor surveillance over phone hacking and malware installment on target devices. They’ve been doing this for the past decade, and the bill would justify and extend this policy.
The bill also forces technological companies to take out any encryption upon the request of any authority. This week, Apple released a letter in response to the bill. The letter details that this bill could cause some damage to lawful users to find a couple of bad eggs ruining technology for everyone else. As such, they will not abide by the rules of this bill.
Read more @ http://clapway.com/2015/12/23/apple-yahoo-google-and-edward-snowden-fight-uk-government-123/
Apple has launched a counteroffensive against the UK’s proposed new surveillance law saying the measures risk paralysing vast reaches of the technology sector across the globe and even sparking “serious international conflicts”. The intervention from the world’s most valuable company comes amid growing anxiety from big US tech groups that the British proposals will set a dangerous precedent, as other countries seek to upgrade spying regimes for the digital age.
Apple has launched a counteroffensive against the UK’s proposed new surveillance law saying the measures risk paralysing vast reaches of the technology sector across the globe and even sparking “serious international conflicts”.
The intervention from the world’s most valuable company comes amid growing anxiety from big US tech groups that the British proposals will set a dangerous precedent, as other countries seek to upgrade spying regimes for the digital age.
Read more @ http://www.ft.com/cms/s/0/1ec9cdfc-a7ff-11e5-955c-1e1d6de94879.html
Apple Inc. outlined its opposition to a proposed U.K. surveillance law, saying threats to national security don’t justify weakening privacy and putting the data of hundreds of millions of users at risk. The world’s most valuable company is leading a Silicon Valley challenge to the Investigatory Powers Bill, which attempts to strengthen the capabilities of law-enforcement agencies to investigate potential crimes or terrorist attacks. The bill would, among other things, give the government the ability to see the Internet browsing history of U.K. citizens.
Apple Inc. outlined its opposition to a proposed U.K. surveillance law, saying threats to national security don’t justify weakening privacy and putting the data of hundreds of millions of users at risk.
The world’s most valuable company is leading a Silicon Valley challenge to the Investigatory Powers Bill, which attempts to strengthen the capabilities of law-enforcement agencies to investigate potential crimes or terrorist attacks. The bill would, among other things, give the government the ability to see the Internet browsing history of U.K. citizens.
Read more @ http://www.bloomberg.com/news/articles/2015-12-21/apple-says-u-k-surveillance-law-would-endanger-all-customers
Read more @ http://www.afr.com/technology/apple-speaks-out-against-proposed-uk-surveillance-laws-20151222-glt4rc
Did someone or persons line their pockets to do that?
A group run by supporters of Senator Marco Rubio sent a mailing to Iowa Republicans this week criticizing Senator Ted Cruz for not condemning Edward J. Snowden, the former National Security Agency contractor who leaked a trove of classified documents. Linking Mr. Cruz to Senators Rand Paul and Bernie Sanders, the group, the Conservative Solutions Project, placed pictures of the three presidential candidates side by side. “These senators have defended Snowden’s actions,” the mailer reads, citing quotations from each of the three about Mr. Snowden. The mailing was shared by an Iowa Republican, who requested anonymity because he does not want to appear to be taking sides in the campaign. Mr. Cruz in the past has offered some conditional words of praise for Mr. Snowden for exposing government surveillance. But he has also said, “If Mr. Snowden has violated the laws of this country, there are consequences to violating laws and that is something he has publicly stated he understands and I think the law needs to be enforced.”
A group run by supporters of Senator Marco Rubio sent a mailing to Iowa Republicans this week criticizing Senator Ted Cruz for not condemning Edward J. Snowden, the former National Security Agency contractor who leaked a trove of classified documents.
Linking Mr. Cruz to Senators Rand Paul and Bernie Sanders, the group, the Conservative Solutions Project, placed pictures of the three presidential candidates side by side.
“These senators have defended Snowden’s actions,” the mailer reads, citing quotations from each of the three about Mr. Snowden. The mailing was shared by an Iowa Republican, who requested anonymity because he does not want to appear to be taking sides in the campaign.
Mr. Cruz in the past has offered some conditional words of praise for Mr. Snowden for exposing government surveillance. But he has also said, “If Mr. Snowden has violated the laws of this country, there are consequences to violating laws and that is something he has publicly stated he understands and I think the law needs to be enforced.”
Read more @ http://www.nytimes.com/politics/first-draft/2015/12/18/backers-of-marco-rubio-target-ted-cruz-for-stance-on-edward-snowden/
British spies enlisted the help of the US National Security Agency (NSA) to learn how to hack firewalls made by top internet security provider Juniper, according to leaked documents. Government Communications Headquarters (GCHQ), which is the UK’s foremost electronic intelligence and surveillance agency, looked to its counterpart across the Atlantic to access the firm’s firewalls. The revelations come as the Intercept website released a six-page document dating back to 2011 titled “Assessment of Intelligence Opportunity – Juniper.” The document was written by an NSA employee working with GCHQ and shows the urgency with which spies sought ways to penetrate Juniper’s security products.
British spies enlisted the help of the US National Security Agency (NSA) to learn how to hack firewalls made by top internet security provider Juniper, according to leaked documents.
Government Communications Headquarters (GCHQ), which is the UK’s foremost electronic intelligence and surveillance agency, looked to its counterpart across the Atlantic to access the firm’s firewalls.
The revelations come as the Intercept website released a six-page document dating back to 2011 titled “Assessment of Intelligence Opportunity – Juniper.”
The document was written by an NSA employee working with GCHQ and shows the urgency with which spies sought ways to penetrate Juniper’s security products.
Read more @ https://www.rt.com/uk/327011-nsa-gchq-juniper-hacking/
The federal government has reportedly joined the investigation of the hack—which experts say could be the work of spies here or abroad. As researchers uncover more about two vulnerabilities recently patched in some Juniper Networks firewalls, the security community continues to speculate about who inserted what Juniper called "unauthorized code" into the company’s firewall operating system ScreenOS. Security experts suggested that one of the security holes in particular, which Juniper warns could allow eavesdroppers to decrypt VPN traffic to some of its NetScreen firewalls, could be the work of the National Security Agency or another spy agency overseas. "There is no way to detect that this vulnerability was exploited," Juniper cautioned. The company indicated it has no evidence that either that weakness, or a second vulnerability introducing a secret password that allows anyone to remotely take control of the firewalls, has actually been used. U.S. law enforcement agencies have reportedly joined Juniper in investigating how the code came to be in the firewalls, which are used by big companies and government agencies to secure their networks, Reuters reported Tuesday.
The federal government has reportedly joined the investigation of the hack—which experts say could be the work of spies here or abroad.
As researchers uncover more about two vulnerabilities recently patched in some Juniper Networks firewalls, the security community continues to speculate about who inserted what Juniper called "unauthorized code" into the company’s firewall operating system ScreenOS.
Security experts suggested that one of the security holes in particular, which Juniper warns could allow eavesdroppers to decrypt VPN traffic to some of its NetScreen firewalls, could be the work of the National Security Agency or another spy agency overseas.
"There is no way to detect that this vulnerability was exploited," Juniper cautioned.
The company indicated it has no evidence that either that weakness, or a second vulnerability introducing a secret password that allows anyone to remotely take control of the firewalls, has actually been used. U.S. law enforcement agencies have reportedly joined Juniper in investigating how the code came to be in the firewalls, which are used by big companies and government agencies to secure their networks, Reuters reported Tuesday.
Read more @ http://www.fastcompany.com/3054945/elasticity/researchers-say-the-juniper-hack-could-be-the-work-of-government-but-which-one
Opinion: If ever there's been a shining example of why government backdoors are a bad idea, the motherlode just got served up hot on a platter. Aaron Sorkin may not be a household name, but you've probably heard of his work. From "The West Wing" to "The Social Network," and "Studio 60 on the Sunset Strip," and "The Newsroom," Sorkin has dedicated the name of one episode in each of his productions to asking the same question: "What kind of day has it been?" Let me tell you that almost every day of the year, it's been a complete and unmitigated disaster for security. Encryption is used by banks to keep your money safe, it's used by government to keep its secrets safe, and it's used by companies to protect your data. But despite being the very fabric of keeping society and the internet safe and secure, encryption has been threatened by far too many narrow-minded bureaucrats with little knowledge or foresight to the consequences of its unraveling, who are paid by businesses to act as proxy spokespeople on their behalf for the trade-off of staying in power.
Opinion: If ever there's been a shining example of why government backdoors are a bad idea, the motherlode just got served up hot on a platter.
Aaron Sorkin may not be a household name, but you've probably heard of his work. From "The West Wing" to "The Social Network," and "Studio 60 on the Sunset Strip," and "The Newsroom," Sorkin has dedicated the name of one episode in each of his productions to asking the same question:
"What kind of day has it been?"
Let me tell you that almost every day of the year, it's been a complete and unmitigated disaster for security. Encryption is used by banks to keep your money safe, it's used by government to keep its secrets safe, and it's used by companies to protect your data. But despite being the very fabric of keeping society and the internet safe and secure, encryption has been threatened by far too many narrow-minded bureaucrats with little knowledge or foresight to the consequences of its unraveling, who are paid by businesses to act as proxy spokespeople on their behalf for the trade-off of staying in power.
Read more @ http://www.zdnet.com/article/juniper-flaw-is-a-major-backfire-for-governments-backdoor-plans/
Putting backdoors in encryption isn't looking like such a great idea, after Juniper, a major provider of security networking equipment, falls victim to a suspected nation-state attack. Security researchers suspect the US may have contributed in some way for the planting of "unauthorized" backdoor code in Juniper firewall technology. Researchers believe that even if the National Security Agency wasn't directly to blame for inserting the backdoor code, it was at least helped along by creating a weakness in a cryptographic algorithm used in part by Juniper that allowed the attackers to strike. CNN said on Saturday, citing unnamed US officials, that it didn't believe the NSA was behind it, pointing to "the work of a foreign government." The FBI is currently investigating the attack.
Putting backdoors in encryption isn't looking like such a great idea, after Juniper, a major provider of security networking equipment, falls victim to a suspected nation-state attack.
Security researchers suspect the US may have contributed in some way for the planting of "unauthorized" backdoor code in Juniper firewall technology.
Researchers believe that even if the National Security Agency wasn't directly to blame for inserting the backdoor code, it was at least helped along by creating a weakness in a cryptographic algorithm used in part by Juniper that allowed the attackers to strike. CNN said on Saturday, citing unnamed US officials, that it didn't believe the NSA was behind it, pointing to "the work of a foreign government." The FBI is currently investigating the attack.
Read more @ http://www.zdnet.com/article/nsa-suspected-in-juniper-firewall-backdoor-mystery-but-questions-remain/
A 'honeypot' mimicking a Juniper firewall is seeing login attempts An experiment by a cybersecurity research center shows attackers are trying to find Juniper firewalls that haven't been patched to remove unauthorized spying code. The SANS Internet Storm Center set up a honeypot -- a term for a computer designed to lure attackers in order to study their techniques -- that mimicked a vulnerable Juniper firewall. The honeypot was configured so that it appeared to run ScreenOS, the operating system of the affected Juniper firewalls, wrote Johannes Ullrich, CTO of the Internet Storm Center, on Monday in a blog post. Juniper said last Thursday that it found during an internal audit two instances of unauthorized code in some versions of ScreenOS, which runs its NetScreen model of enterprise firewalls. One problem was a hard-coded password, which could allow an attacker to log into a firewall using SSH or telnet in combination with a valid username. The password was published on Sunday by the security firm Rapid7, which had been analyzing ScreenOS. Juniper released patches for the password issue and another problem, which could allow VPN traffic to be monitored and decrypted.
An experiment by a cybersecurity research center shows attackers are trying to find Juniper firewalls that haven't been patched to remove unauthorized spying code.
The SANS Internet Storm Center set up a honeypot -- a term for a computer designed to lure attackers in order to study their techniques -- that mimicked a vulnerable Juniper firewall.
The honeypot was configured so that it appeared to run ScreenOS, the operating system of the affected Juniper firewalls, wrote Johannes Ullrich, CTO of the Internet Storm Center, on Monday in a blog post.
Juniper said last Thursday that it found during an internal audit two instances of unauthorized code in some versions of ScreenOS, which runs its NetScreen model of enterprise firewalls.
One problem was a hard-coded password, which could allow an attacker to log into a firewall using SSH or telnet in combination with a valid username.
The password was published on Sunday by the security firm Rapid7, which had been analyzing ScreenOS.
Juniper released patches for the password issue and another problem, which could allow VPN traffic to be monitored and decrypted.
Read more @ http://www.pcworld.com/article/3017738/security/attackers-are-hunting-for-tampered-juniper-firewalls.html
As evidence mounts that an intelligence agency had the capability to wiretap Juniper network hardware, technology experts resist political pressure to to make encryption breakable. The mystery surrounding two backdoors in Juniper's virtual private networking (VPN) products—and whether one of them may have originated with a U.S. intelligence agency—has added fuel to the debate surrounding government access to communications and data. On Dec. 17, Juniper announced that an internal code review had revealed that two backdoors had been added to its ScreenOS operating system. One intentionally introduced flaw allows attackers to use a hard-coded password to gain administrative rights to vulnerable systems while the other allows the decryption of communications captured by an attacker who knows a unique key. Juniper's Security Incident Response Team "is not aware of any malicious exploitation of these vulnerabilities; however, the password needed for the administrative access has been revealed publicly," the company stated in an advisory. The hard-coded password was apparently introduced in ScreenOS 6.2.0r15, released by Juniper in September 2012, while an attacker inserted the decryption bypass vulnerability into ScreenOS 6.2.0r17, released in May, according to Juniper. Versions of the operating system released as far back as August 2012 have, however, been patched for the issue.
As evidence mounts that an intelligence agency had the capability to wiretap Juniper network hardware, technology experts resist political pressure to to make encryption breakable.
The mystery surrounding two backdoors in Juniper's virtual private networking (VPN) products—and whether one of them may have originated with a U.S. intelligence agency—has added fuel to the debate surrounding government access to communications and data.
On Dec. 17, Juniper announced that an internal code review had revealed that two backdoors had been added to its ScreenOS operating system. One intentionally introduced flaw allows attackers to use a hard-coded password to gain administrative rights to vulnerable systems while the other allows the decryption of communications captured by an attacker who knows a unique key.
Juniper's Security Incident Response Team "is not aware of any malicious exploitation of these vulnerabilities; however, the password needed for the administrative access has been revealed publicly," the company stated in an advisory.
The hard-coded password was apparently introduced in ScreenOS 6.2.0r15, released by Juniper in September 2012, while an attacker inserted the decryption bypass vulnerability into ScreenOS 6.2.0r17, released in May, according to Juniper. Versions of the operating system released as far back as August 2012 have, however, been patched for the issue.
Read more @ http://www.eweek.com/security/encryption-backdoor-debate-heats-up-with-juniper-breach-discovery.html
BRITS have been snooped on by MI5 for years under a special Operation known as "Preston", according to leaks from whistleblower Edward Snowden. The secret surveillance programme has a specialist internet and phone-tapping centre at MI5's headquarters in Vauxhall, central London, according to IT website, The Register, and its veteran espionage journalist Duncan Campbell. Mr Campbell wrote on The Register: "The 'Big Brother' comprehensive national database system feared by many MPs has been built behind their backs over the last decade." The report comes two months after Snowden told the BBC's Panorama programme how GCHQ – the massive spying centre near Cheltenham – had the power to hack into smartphones without the owner's knowledge. Mr Snowden said GCHQ could gain access to a handset by planting malware and then sending it an encrypted text message which would take pictures and listen in on its owner without them even being aware.
BRITS have been snooped on by MI5 for years under a special Operation known as "Preston", according to leaks from whistleblower Edward Snowden.
The secret surveillance programme has a specialist internet and phone-tapping centre at MI5's headquarters in Vauxhall, central London, according to IT website, The Register, and its veteran espionage journalist Duncan Campbell.
Mr Campbell wrote on The Register: "The 'Big Brother' comprehensive national database system feared by many MPs has been built behind their backs over the last decade."
The report comes two months after Snowden told the BBC's Panorama programme how GCHQ – the massive spying centre near Cheltenham – had the power to hack into smartphones without the owner's knowledge.
Mr Snowden said GCHQ could gain access to a handset by planting malware and then sending it an encrypted text message which would take pictures and listen in on its owner without them even being aware.
Read more @ http://www.dailystar.co.uk/news/latest-news/482162/MI5-phone-tapping-Preston
They are giving governments so much power that sooner or later they will regret it…. No one should have such power….. NO ONE! Humans will be humans no matter whether they are in government or not…. Look at the track record of humans in history….. Fear is a mind killer and it may end up being far more than that in the future if people keep giving up their freedoms.
Fears of terrorism are once again trumping talk of civil liberties. Political debates, particularly among Republicans, are filled with fearful talk about threats to the country. The FBI director is pushing for "backdoors" into encryption software that would allow it to read scrambled communications. And perhaps worst of all, instead of constraining surveillance, Congress on Friday opened a big new door for domestic spying in the guise of the Cybersecurity Information Sharing Act of 2015. It's beginning to look like the Snowden moment -- the reform movement sparked by revelations by former National Security Agency contractor Edward Snowden of pervasive, illegal and largely uncontrolled government spying -- may be passing.
Fears of terrorism are once again trumping talk of civil liberties.
Political debates, particularly among Republicans, are filled with fearful talk about threats to the country. The FBI director is pushing for "backdoors" into encryption software that would allow it to read scrambled communications. And perhaps worst of all, instead of constraining surveillance, Congress on Friday opened a big new door for domestic spying in the guise of the Cybersecurity Information Sharing Act of 2015.
It's beginning to look like the Snowden moment -- the reform movement sparked by revelations by former National Security Agency contractor Edward Snowden of pervasive, illegal and largely uncontrolled government spying -- may be passing.
Read more @ http://www.mercurynews.com/politics-government/ci_29275334/wolverton-snowden-moment-may-be-passing-new-fears
Despite saying that he “respects” Telegram’s founder, Russian Pavel Durov, NSA whistleblower Edward Snowden said the messenger lacks security at its default settings. “I respect @durov, but Ptacek is right: @telegram's defaults are dangerous. Without a major update, it's unsafe,” former CIA employee tweeted on Saturday. To be clear, what matters is that the plaintext of messages is *accessible* to the server (or service provider), not whether it's "stored." — Edward Snowden (@Snowden) December 19, 2015 Snowden was referring to Thomas Ptacek, founder of Matasano Security and a specialist in cryptographic and embedded software security, who tweeted that Telegram’s plaintext is stored on the server. Pointing towards the vulnerability of such a setup, Snowden hinted that the plaintext of the messages should not be accessible to a service provider at all for a connection to be truly secure.
Despite saying that he “respects” Telegram’s founder, Russian Pavel Durov, NSA whistleblower Edward Snowden said the messenger lacks security at its default settings.
“I respect @durov, but Ptacek is right: @telegram's defaults are dangerous. Without a major update, it's unsafe,” former CIA employee tweeted on Saturday.
To be clear, what matters is that the plaintext of messages is *accessible* to the server (or service provider), not whether it's "stored."
— Edward Snowden (@Snowden) December 19, 2015
Snowden was referring to Thomas Ptacek, founder of Matasano Security and a specialist in cryptographic and embedded software security, who tweeted that Telegram’s plaintext is stored on the server. Pointing towards the vulnerability of such a setup, Snowden hinted that the plaintext of the messages should not be accessible to a service provider at all for a connection to be truly secure.
Read more @ https://www.rt.com/news/326565-snowden-durov-security-telegram/
Edward Snowden To Appear At New Hampshire Convention: NSA Whistleblower To Be Keynote Speaker Via Video Link
Edward Snowden, the NSA whistleblower who exposed the government’s bulk phone data collection and other surveillance practices, will be the keynote speaker at a New Hampshire convention of libertarians, The Valley News reports. Snowden will speak to the New Hampshire Liberty Forum via a video conference from Russia, where he’s been granted political asylum while he faces federal charges here in the United States. The New Hampshire Liberty Forum is an annual conference held in Manchester, New Hampshire (population: 109,000). The 2016 Liberty Forum will take place February 18-21.
Edward Snowden, the NSA whistleblower who exposed the government’s bulk phone data collection and other surveillance practices, will be the keynote speaker at a New Hampshire convention of libertarians, The Valley News reports.
Snowden will speak to the New Hampshire Liberty Forum via a video conference from Russia, where he’s been granted political asylum while he faces federal charges here in the United States. The New Hampshire Liberty Forum is an annual conference held in Manchester, New Hampshire (population: 109,000). The 2016 Liberty Forum will take place February 18-21.
Read more @ http://www.inquisitr.com/2649633/edward-snowden-to-appear-at-new-hampshire-convention-nsa-whistleblower-to-be-keynote-speaker-via-video-link/
Read more @ http://www.argus-press.com/news/state_news/article_9294759a-e034-5d9b-9c9e-469731ec6f8e.html
POLITICO's live coverage of the 2016 presidential debate. Edward Snowden either stayed up late or got up early in Moscow to watch the third Democratic debate, tweeting his takes on foreign policy and surveillance — and he seems favorably inclined toward Vermont Sen. Bernie Sanders. The former NSA contractor who leaked information about the agency's surveillance programs in 2013 apparently didn't like Hillary Clinton's call to increase vetting and screening through government intelligence agencies:
POLITICO's live coverage of the 2016 presidential debate.
Edward Snowden either stayed up late or got up early in Moscow to watch the third Democratic debate, tweeting his takes on foreign policy and surveillance — and he seems favorably inclined toward Vermont Sen. Bernie Sanders.
The former NSA contractor who leaked information about the agency's surveillance programs in 2013 apparently didn't like Hillary Clinton's call to increase vetting and screening through government intelligence agencies:
Read more @ http://www.politico.com/blogs/live-from-st-anselm-college/2015/12/snowden-livetweets-the-debate-216992
"What lies behind us and what lies before us are small matters compared to what lies within us." ~ Ralph Waldo Emerson ~
Interact