President Trump’s Egomania Shuts Down Teenage Girls Animated Kitten Web Site

(THIS ARTICLE IS COURTESY OF THE MERCURY NEWS)

President Donald Trump has had a lot on his plate in recent weeks — defending his administration from news of a criminal investigation by the FBI for alleged Russia collusion, rallying support for a controversial health care bill.

Somehow amid all that, the president, or his lawyers acting on their own, decided to go after a teenage girl from San Francisco, the Hollywood Reporter said.

Apparently, America’s commander in chief took issue with the girl’s website Kittenfeed.com. Originally called Trumpscratch.com, the site allows users to punch an animated image of Trump’s face with tiny kitten paws. It comes with the tagline: “Trump seems very tough at first but he gets weaker with every scratch.”

The girl, identified as “Lucy,” told the Observer that she developed the site, with its #Trumpcat hashtag, for fun while applying for web developer jobs. Little did she know that her site, which only drew 1700 visitors after its launch in February, had attracted the notice of the most important political leader on earth.

On March 1, she said she received a cease and desist letter from The Trump Organization. The letter claims her site infringed on the “internationally known and famous” Trump trademark.

After Lucy changed the domain name, she received another letter from the Trump Organization because her site linked to an anti-Trump shirt that is available for purchase on Amazon. Lucy told the Hollywood Reporter that she removed the link, and hasn’t heard anything from the campaign since.

Lucy is not alone in thinking that the president should have better things to with his time than to ask his lawyers to go after a teenager for creating a silly website.

“I really just want people to be aware that this is a president who’s clearly more concerned about what people think of him than doing things of substance,” she told the Hollywood Reporter.


Reading this on your phone or tablet? Stay up to date on Bay Area news with our new, free mobile app. Get it from the Apple app store or the Google Play store.


However, she said she’s not surprised he might be so easily provoked by her site, given that he wages Twitter feuds with former California Gov. Arnold Schwarzenegger over ratings for his former reality TV show “Celebrity Apprentice.”

“Literally all my site is, is punching him with kitten paws,” she said. “A president should not have the time or care to hire people to shut sites like mine down. He should be running the country, not tweeting about TV ratings or anything else like that.”

Not surprisingly, the moves by Trump’s lawyers have had the opposite effect of their intention. After the Observer originally published its report on Tuesday, the site’s visitors surged from 3,000 to 50,000.

However, the site was down on Wednesday, possibly from so many users trying to access it.

The lesson here is that Trump may talk a tough game as president, but he and his tough, high-priced attorneys are no match for animated kittens.

China Will Be The Straw That Will Stir The World’s Economic Drink?

(THIS ARTICLE IS COURTESY OF THE SHANGHAI DAILY NEWS)

HOME » BUSINESS » FINANCE

Forum hears pledge of more effort to revitalize China’s real economy

CHINA will remain committed to ensuring innovation drives development and will increase efforts to revitalize the real economy, Vice Premier Zhang Gaoli said yesterday.

“The real economy is the foundation of economic growth and we will optimize it,” Zhang said at the opening ceremony of the China Development Forum 2017 in Beijing.

China will improve its capabilities in scientific innovation and boost the development of strategic emerging sectors and modern manufacturing while transforming traditional industries with new technology and business models, he said.

The government will continue to promote entrepreneurship and the “Internet Plus” plan to meet the diverse needs of the market and Chinese companies will be encouraged to use craftsmanship to establish competitive brands that can stand the test of time.

China will further reduce costs for enterprises by streamlining administration and pushing forward tax reforms, and prevention and control of financial risks will be elevated to a higher position on the government’s agenda, Zhang said, adding that China will manage risks in bad loans, bond default, property bubbles and Internet finance to avoid systemic financial risks.

To stimulate growth and improve market vitality, China should increase supply-side structural reform, Zhang said.

Highlighting the basic tone of “seeking progress while maintaining stability,” he underscored the need for efforts to maintain growth, ensure employment and counteract risks from home and abroad.

China will forge ahead with its supply-side reform, cutting steel production capacity by around 50 million tons and coal capacity by over 150 million tons this year, he said.

The country will prioritize de-stocking unsold houses in third and fourth-tier cities as it fights speculation in the housing market, he added.

Zhang restated China’s commitment to better air, water and soil quality.

The government will speed up the reform of state-owned enterprises, make concrete mixed-ownership reforms in sectors such as power, petroleum, railways, civil aviation and telecommunications and open the market to more private investment, Zhang said.

On the close ties between China and the world economy, he stressed the need to advance globalization and fight protectionism.

“China is willing to join efforts with the international community to steer the world economy toward strong, sustainable, balanced and inclusive growth,” he said.

The country will continue to implement its opening-up strategy and advance the Belt and Road Initiative, he added.

China will host the Belt and Road Forum for International Cooperation in May. Taking part in this “new chapter in win-win cooperation” will be more than 20 heads of state and government, more than 50 leaders of international organizations, more than 100 ministerial-level officials, and more than 1,200 delegates.

Beijing suspends last of its coal-fired power plants: China Goes To The Future: Trump, U.S. In Reverse

(THIS ARTICLE IS COURTESY OF THE SHANGHAI DAILY NEWS)

HOME » NATION

Beijing suspends last of its coal-fired power plants

BEIJING’S last large coal-fired power plant has suspended operations, meaning the capital has become the first city in China to have all its power plants fueled by clean energy.

The Huangneng Beijing Thermal Power Plant came into operation in June 1999. It has five coal-fired units with a total installed capacity of 845,000 kilowatts and heating capacity of 26 million square meters.

Du Chengzhang, the plant’s general manager, said it is an efficient and environmental friendly plant with advanced emission treatment equipment. The plant has provided important support to the stable operation of Beijing’s electric power system and the heat-supply system, he said.

After the suspension of the plant on Saturday, about 1.76 million tons of coal, 91 tons of sulfur dioxide and 285 tons of nitrogen oxide emissions a year will be cut.

According to a clean air plan by Beijing from 2013 to 2017, the city was to build four gas thermal power centers and shut down the four large coal-fueled thermal power plants.

The other three plants which used to consume over 6.8 million tons of coal each year were closed in 2014 and 2015.

Du said Huangneng will prepare to serve as an emergency heat source for the capital’s heating system after operations cease.

Three of the four gas thermal power have already been built and are in use.

Beijing has 27 power plants, all fueled by clean energy with a total installed capacity of 11.3 million kilowatts.

Under the plan, Beijing will build no more large-scale power plants.

US, China to Increase Cooperation on North Korea

(THIS ARTICLE IS COURTESY OF THE SAUDI NEWS PAPER ASHARQ AL-AWSAT)

World

US, China to Increase Cooperation on North Korea

Korea

Beijing – The United States and China vowed to work together against threats of the North Korea’s nuclear program, while US Secretary of State Rex Tillerson warned that the situation has reached a “dangerous” level.

Tillerson and his Chinese counterpart’s language seemed more reconciliatory in light US President Donald Trump’s accusations that China was not exerting enough efforts to control its troublesome neighbor. Beijing had meanwhile accused the White House of causing tensions.

“I think we share a common view and a sense that tensions on the peninsula are quite high right now and things have reached a rather dangerous level. And we have committed ourselves to doing everything we can to prevent any kind of conflict from breaking out,” Tillerson added during a press conference in Beijing with Foreign Minister Wang Yi.

Tillerson’s visit to China is the last leg of his Asian trip, where he made stops in Japan and South Korea.

He avoided using strong language during the joint press conference with Wang, who seemed to have reproached his counterpart for statements he had made earlier this week.

Wang urged the US to remain “cool-headed” and defended his government’s position, saying all international parties should seek diplomatic solutions while implementing UN sanctions against the regime in North Korea.

“We hope that all parties, including our friends from the United States, could size up the situation in a cool-headed and comprehensive fashion and arrive at a wise decision,” he added.

Neither parties announced any tangible future steps to solve the issue and Tillerson did not publically respond to Beijing’s calls for negotiations with North Korea.

Trump had increased the pressure on China, accusing it of not exploiting all means possible to control North Korea, whom he said considered Beijing to be its closest ally and economic benefactor.

“North Korea is behaving very badly. They have been ‘playing’ the United States for years. China has done little to help!” he tweeted.

The developments come after North Korea conducted two nuclear tests last year and launched missiles last month. The US considered the test-launch an attack on its bases in Japan.

The developments alarmed South Korea, spurring it to deploy the US’s Terminal High Altitude Area Defense System (THAAD). The Chinese leadership had accused the US of aggravating the situation through military trainings with its ally Seoul and the deployment of THAAD.

China is hesitant to increase its pressure on North Korea, whose reactions can be unpredictable.

Washington and Seoul insist that the THAAD system is for defense purposes only, but Beijing fears it could undermine its capabilities to denuclearize North Korea.

Beijing had always called for diplomatic talks to denuclearize North Korea, which is barred by the UN from proceeding with its program.

Wang also said that the Korean peninsula nuclear issue is of interest to everyone, reiterating his country’s commitment to the goal of denuclearization

“We are for the settlement of this issue through dialogue and negotiations and the maintenance of peace and stability on the peninsula and the overall region,” he added on Saturday.

Wang reiterated that China, as a close neighbor of the peninsula and a major power, has devoted a lot of energy and efforts to seek a settlement to the issue. The tremendous important efforts China has made are visible to all, he said.

Tillerson, who was CEO of ExxonMobil before being appointed secretary of state, said that a military option is possible if Pyongyang intensified its work.

“We do believe that if North Korea stands down on this nuclear program, that is their quickest means to begin to develop their economy and to become a vibrant economy for the North Korean people,” the US officials said.

He added: “All options are on the table, but we cannot predict the future.”

Maybe one of the reasons for the calm American-Chinese rhetoric is the expected talks between US President Trump and Chinese President Xi during the latter’s upcoming visit to US next month, the first such summit between the two leaders.

Trump is expected to host Xi at his Mar-a-Lago resort in Palm Beach on April 6 and 7 for an informal “no necktie” encounter. Experts hope this meeting will reduce tensions between the two officials.

China shares US fears of Pyongyang’s nuclear ambition, but it makes sure not to provoke its neighbor.

In February, Beijing issued a strong position when it announced it will stop coal imports from North Korea until the end of this year.

North Korea expert at Beijing University Wong Dong said: “It is a mistake to think that China can control Pyongyang and it is not reasonable for Washington to accuse Beijing of doing nothing. The situation is complicated and sensitive and there is no magical solution.”

The Obama administration ruled out any diplomatic involvement with Pyongyang until the latter shows commitment to denuclearization.

The communist state insists on owning nuclear weapons to defend itself and executed its first test in 2006 despite international objection. It had done four other tests, two last year.

Asharq Al-Awsat

Asharq Al-Awsat

Asharq Al-Awsat is the world’s premier pan-Arab daily newspaper, printed simultaneously each day on four continents in 14 cities. Launched in London in 1978, Asharq Al-Awsat has established itself as the decisive publication on pan-Arab and international affairs, offering its readers in-depth analysis and exclusive editorials, as well as the most comprehensive coverage of the entire Arab world.

More PostsTwitterFacebookGoogle PlusYouTube

President Trump Lied About Wire Taps: He Needs To Quickly And Publicly Apologize To Mr. Obama

(THIS ARTICLE IS COURTESY OF CNN)

Washington (CNN) House Speaker Paul Ryan said Thursday that “no such wiretap existed,” citing intelligence reports to House leaders after President Donald Trump accused then-President Barack Obama of wiretapping Trump Tower last year.

“The intelligence committees, in their continuing, widening, ongoing investigations of all things Russia, got to the bottom — at least so far with respect to our intelligence community — that no such wiretap existed,” Ryan said in response to a question from CNN at a news conference.
Ryan’s comment comes as Trump and the White House have retreated from the President’s stunning accusation in a tweet two weeks ago.
“When I say wiretapping, those words were in quotes. That really covers — because wiretapping is pretty old-fashioned stuff — but that really covers surveillance and many other things. And nobody ever talks about the fact that it was in quotes, but that’s a very important thing,” Trump told Fox News Wednesday.
The four lawmakers leading the House and Senate intelligence committees looking into Russia’s interference in the US elections have all said they have not seen any evidence to back up Trump’s claims. The House Intelligence Committee has requested any evidence of a wiretap from the Justice Department by Monday.

Wire Tapping Your Phone Lines, No Proof: The Biggest Habitual Liar: Hillary Or Donald The Quack?


(THIS ARTICLE IS COURTESY OF ABC NEWS)

The top Republican and Democrat on the House Intelligence Committee said today that there is no evidence that any wiretap took place at President Donald Trump’s building in Manhattan during the presidential campaign or transition.

Rep. Adam Schiff, D-Calif., said that there is “no basis” for President Trump‘s accusations that President Obama illegally wiretapped Trump Tower “whatsoever.”

Schiff said it “deeply concerns me that the president would make such an accusation without basis.”

The committee’s chairman, Rep. Devin Nunes, R-Calif., said “I don’t think there was an actual tap of Trump Tower.”

Trump had alleged in a series of Tweets that former President Barack Obama had his phones tapped.

How low has President Obama gone to tapp my phones during the very sacred election process. This is Nixon/Watergate. Bad (or sick) guy!

 “The challenge here is that the President Obama wouldn’t physically go over and wiretap and then you have to decide if you’re going to take the tweets literally, and if you are, then clearly the president was wrong.” Nunes said referring to the multiple tweets that President Trump sent on the morning of March 4 making accusations.

“But if you’re not going to take the tweets literally and if there’s a concern that the president has about other people, other surveillance activities looking at him or his associates, either appropriately or inappropriately, We want to find that out. It’s all in the interpretation of what you believe,” he said.

White House press secretary Sean Spicer maintained that the president will be “vindicated” by evidence. On March 13, Spicer said that Trump was not talking literally or specifically when he accused President Obama of “wiretapping” his campaign.

“If you look at the president’s tweet, he said wiretapping in quotes. There’s been substantial discussion in several reports,” Spicer said.

“The president was very clear in his tweet, it was wiretapping. That spans a host of surveillance options,” he said. “The House and the Senate Intelligence Committees will now look into that and provide a report back. I think there’s been numerous reports from a variety of outlets over the last couple months that seem to indicate that there has been different types of surveillance that occurred during the 2016 election.”

Nunes said that there will be a public hearing about the issue in the coming weeks.

“Certainly at the open hearing that we have… we’ll be asking the director if he has seen any evidence that substantiates the president’s claim,” Schiff said.

American Citizens: U.S. Border Agents Can Search Your Cellphone

(THIS ARTICLE IS COURTESY OF NBC NEWS)

American Citizens: U.S. Border Agents Can Search Your Cellphone

When Buffalo, New York couple Akram Shibly and Kelly McCormick returned to the U.S. from a trip to Toronto on Jan. 1, 2017, U.S. Customs & Border Protection officers held them for two hours, took their cellphones and demanded their passwords.

“It just felt like a gross violation of our rights,” said Shibly, a 23-year-old filmmaker born and raised in New York. But he and McCormick complied, and their phones were searched.

Three days later, they returned from another trip to Canada and were stopped again by CBP.

“One of the officers calls out to me and says, ‘Hey, give me your phone,'” recalled Shibly. “And I said, ‘No, because I already went through this.'”

The officer asked a second time.

Watch Cynthia McFadden on Nightly News for More

Within seconds, he was surrounded: one man held his legs, another squeezed his throat from behind. A third reached into his pocket, pulling out his phone. McCormick watched her boyfriend’s face turn red as the officer’s chokehold tightened.

Then they asked McCormick for her phone.

“I was not about to get tackled,” she said. She handed it over.

American citizens Akram Shibly, left, and Kelly McCormick had their phones searched as they reentered the U.S. at Niagara Falls, New York on two separate trips in January 2017. They say Shibly was put in a chokehold when he refused to hand over his phone on the second crossing. Michael Adamucci / for NBC News

Shibly and McCormick’s experience is not unique. In 25 cases examined by NBC News, American citizens said that CBP officers at airports and border crossings demanded that they hand over their phones and their passwords, or unlock them.

The travelers came from across the nation, naturalized citizens and people born and raised on American soil. They traveled by plane and by car at different times through different states. Businessmen, couples, senior citizens, and families with young kids, questioned, searched, and detained for hours when they tried to enter or leave the U.S. None were on terror watchlists. One had a speeding ticket. Some were asked about their religion and their ethnic origins, and had the validity of their U.S. citizenship questioned

What most of them have in common — 23 of the 25 — is that they are Muslim, like Shibly, whose parents are from Syria.

Data provided by the Department of Homeland Security shows that searches of cellphones by border agents has exploded, growing fivefold in just one year, from fewer than 5,000 in 2015 to nearly 25,000 in 2016.

According to DHS officials, 2017 will be a blockbuster year. Five-thousand devices were searched in February alone, more than in all of 2015.

“That’s shocking,” said Mary Ellen Callahan, former chief privacy officer at the Department of Homeland Security. She wrote the rules and restrictions on how CBP should conduct electronic searches back in 2009. “That [increase] was clearly a conscious strategy, that’s not happenstance.”

“This really puts at risk both the security and liberty of the American people,” said Senator Ron Wyden, D-Oregon. “Law abiding Americans are being caught up in this digital dragnet.”

“This is just going to grow and grow and grow,” said Senator Wyden. “There’s tremendous potential for abuse here.”

What Changed?

What CBP agents call “detaining” cellphones didn’t start after Donald Trump’s election. The practice began a decade ago, late in the George W. Bush administration, but was highly focused on specific individuals.

The more aggressive tactics of the past two years, two senior intelligence officials told NBC News, were sparked by a string of domestic incidents in 2015 and 2016 in which the watch list system and the FBI failed to stop American citizens from conducting attacks. The searches also reflect new abilities to extract contact lists, travel patterns and other data from phones very quickly.

DHS has published 24 reports detailing its extensive technological capability to forensically extract data from mobile devices, regardless of password protection on most Apple and Android phones. The reports document its proven ability to access deleted call logs, videos, photos, and emails to name a few, in addition to the Twitter, Facebook, and Instagram apps.

But the officials caution that rhetoric about a Muslim registry and ban during the presidential campaign also seems to have emboldened federal agents to act more forcefully.

“The shackles are off,” said Hugh Handeyside, a staff attorney with the ACLU’s National Security Project. “We see individual officers and perhaps supervisors as well pushing those limits, exceeding their authority and violating people’s rights.”

And multiple sources told NBC News that law enforcement and the Intelligence Community are exploiting a loophole to collect intelligence.

Under the Fourth Amendment, law enforcement needs at least reasonable suspicion if they want to search people or their possessions within the United States. But not at border crossings, and not at airport terminals.

“The Fourth Amendment, even for U.S. citizens, doesn’t apply at the border,” said Callahan. “That’s under case law that goes back 150 years.”

Customs and Border officers can search travelers without any level of suspicion. They have the legal authority to go through any object crossing the border within 100 miles, including smartphones and laptops. They have the right to take devices away from travelers for five days without providing justification. In the absence of probable cause, however, they have to give the devices back.

CBP also searches people on behalf of other federal law enforcement agencies, sending its findings back to partners in the DEA, FBI, Treasury and the National Counterterrorism Center, among others.

Callahan thinks that CBP’s spike in searches means it is exploiting the loophole “in order to get information they otherwise might hot have been able to.”

On January 31, an engineer from NASA’s Jet Propulsion Laboratory was pulled into additional screening upon his return to the U.S. after a two-week vacation in Chile. Despite being cleared by the Global Entry program, Sidd Bikkannavar received an “X” on his customs form. He is not Muslim, and he is not from any of the seven countries named in President Trump’s original “travel ban” executive order. Half his family comes from India but he was born and raised in California.

Bikkannavar was brought into a closed room and told to hand over his phone and passcode. He paid particular notice to the form CBP handed him which explained it had the right to copy the contents of the phone, and that the penalty for refusal was “detention.”

“I didn’t know if that meant detention of the phone or me and I didn’t want to find out,” said Bikkannavar. He tried to refuse but the officer repeatedly demanded the PIN. Eventually he acquiesced.

“Once they had that, they had everything,” Bikkannavar said. That access allowed CBP officers to review the backend of his social media accounts, work emails, call and text history, photos and other apps. He had expected security might physically search any travelers for potential weapons but accessing his digital data felt different. “Your whole digital life is on your phone.”

The officers disappeared with his phone and PIN. They returned 30 minutes later and let him go home.Sidd Bikkannavar poses for a portrait in 2014. Takashi Akaishi

CBP also regularly searches people leaving the country.

On February 9, Haisam Elsharkawi was stopped by security while trying to board his flight out of Los Angeles International Airport. He said that six Customs officers told him he was randomly selected. They demanded access to his phone and when he refused, Elsharkawi said they handcuffed him, locked him in the airport’s lower level and asked questions including how he became a citizen. Elsharkawi thought he knew his rights and demanded access to legal counsel.

“They said if I need a lawyer, then I must be guilty of something,” said Elsharkawi, and Egyptian-born Muslim and naturalized U.S. citizen. After four hours of questioning in detention, he unlocked his smartphone and, after a search, was eventually released. Elsharkawi said he intends to sue the Department of Homeland Security.

The current policy has not been updated since 2009. Jayson Ahern, who served in CBP under both Bush and Obama, signed off on the current policy. He said the electronic searches are supposed to be based on specific, articulable facts that raise security concerns. They are not meant to be random or routine or applied liberally to border crossers. “That’s reckless and that’s how you would lose the authority, never mind the policy.”

The Customs & Border Patrol policy manual says that electronic devices fall under the same extended search doctrine that allows them to scan bags in the typical security line.

“As the threat landscape changes, so does CBP,” a spokesperson told NBC News.

Since the policy was written in 2009, legal advocates argue, several court cases have set new precedents that could make some CBP electronic searches illegal.

Several former DHS officials pointed to a 2014 Supreme Court ruling in Riley v California that determined law enforcement needed a warrant to search electronic devices when a person is being arrested. The court ruled unanimously, and Chief Justice John Roberts wrote the opinion.

“Modern cellphones are not just another technological convenience. With all they contain and all they may reveal, they hold for many Americans ‘the privacies of life,'” wrote Roberts. “The fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the Founders fought.”

Because that case happened outside of the border context, however, CBP lawyers have repeatedly asserted in court that the ruling does not apply to border searches.

For now a Department of Justice internal bulletin has instructed that, unless border officers have a search warrant, they need to take protective measures to limit intrusions, and make sure their searches do not access travelers’ digital cloud data. The ‘cloud’ is all content not directly stored on a device, which includes anything requiring internet to access, like email and social media.

Former DHS officials who helped design and implement the search policy said they agreed with that guidance.

Wyden Pushes to Change the Policy

On February 20, Sen. Wyden wrote to DHS Secretary John Kelly demanding details on electronic search-practices used on U.S. citizens, and referred to the extent of electronic searches as government “overreach”. As of publication, he had yet to receive an answer.

Now Sen. Wyden says that as early as next week he plans to propose a bill that would require CBP to at least obtain a warrant to search electronics of U.S. citizens, and explicitly prevent officers from demanding passwords.

“The old rules … seem to be on the way to being tossed in the garbage can,” said Senator Wyden. “I think it is time to update the law.”

Akram Shibly at home in Buffalo, Sunday March, 12, 2017. Michael Adamucci / for NBC News

Asked about the Shibly case, a CBP spokesperson declined to comment, but said the Homeland Security Inspector General is investigating. The spokesperson said the agency can’t comment on open investigations or particular travelers, but that it “firmly denies any accusations of racially profiling travelers based on nationality, race, sex, religion, faith, or spiritual beliefs.”

Explaining the sharp increase in electronic searches, a department spokesperson told NBC News: “CBP has adapted and adjusted to align with current threat information, which is based on intelligence.” A spokesman also noted that searches of citizens leaving the U.S. protect against the theft of American industrial and national security secrets.

After repeated communications, the Department of Homeland Security never responded to NBC News’ requests for comments. Nonetheless, the Homeland Security Inspector General is currently auditing CBP’s electronic search practices.

The Council on American-Islamic Relations (CAIR) also has filed two dozen complaints against CBP this year for issues profiling Muslim Americans. CAIR and the Electronic Frontier Foundation are considering legal action against the government for what they consider to be unconstitutional searches at the border.

FBI Director James Comey Warned Wednesday That Americans Should Not Have Expectations Of “absolute privacy,

 

(CNN) FBI Director James Comey warned Wednesday that Americans should not have expectations of “absolute privacy,” adding that he planned to finish his term leading the FBI.

“There is no such thing as absolute privacy in America; there is no place outside of judicial reach,” Comey said at a Boston College conference on cybersecurity. He made the remark as he discussed the rise of encryption since 2013 disclosures by former National Security Agency contractor Edward Snowden revealed sensitive US spy practices.
“Even our communications with our spouses, with our clergy members, with our attorneys are not absolutely private in America,” Comey added. “In appropriate circumstances, a judge can compel any one of us to testify in court about those very private communications.”
But, he also said Americans “have a reasonable expectation of privacy in our homes, in our cars, in our devices.
“It is a vital part of being an American. The government cannot invade our privacy without good reason, reviewable in court,” Comey continued.
In the last four months of 2016, the FBI lawfully gained access to 2,800 devices recovered in criminal, terrorism and counterintelligence investigations and the FBI was unable to open 43% of those devices, Comey said.
Americans’ desire for privacy and security should never be viewed as incompatible, he said.
“We all value privacy. We all value security. We should never have to sacrifice one for the other,” Comey said. “Our founders struck a bargain that is at the center of this amazing country of ours and has been for over two centuries.”
FBI director at center of many controversies
Comey’s leadership of the FBI has been marked by controversy in the wake of the bureau’s handling of the investigation into Hillary Clinton’s email controversy and President Donald Trump’s baseless accusations that President Barack Obama ordered the wiretapping of phones at Trump Tower.
He did not address the wiretapping claim nor WikiLeaks’ recent claim that it obtained internal CIA documents.
Comey did, however, say he plans to finish out his 10-year term.
“You’re stuck with me for about another 6 1/2 years, and so I’d love to be invited back again,” he said.

Privacy: Is There No Longer Is Such A Thing On Planet Earth?

 

(THIS ARTICLE IS COURTESY OF THE SAUDI NEWS AGENCY ASHARQ AL-AWSAT)

 

Opinion

Living with Our Privacy Violated

The rule has never changed: Every phenomenon or positive change has a tax to be paid, whether we like it or not.This rule also applies to the enormous technological progress we are witnessing and its unlimited positive outcomes on our lives, businesses and communities. Here, the tax users pay is represented by forbidden acts and taboos becoming accepted and incorporated into our lives.

People might not sense this gradual transformation but they eventually accept it in return for using technology. Speaking of attempts to maintain some privacy has become impossible – privacy has been violated with a knockdown.

A group of scientists from Harvard University has developed a mosquito-sized robot that can steal samples of your DNA without you feeling it. Professor of Computer Science Margo Seltzer said that the privacy we used to know before no more exists, adding that current techniques such as credit cards, internet networks, highway radars, cameras in streets, social media and emails can all leave a digital print of us by which we can be followed.

In 2013, more than five billion data records were lost or stolen, according to the Breach Level Index (BLI). This reveals that perhaps only those distant from the world of internet were not subject to violation of privacy– and they did not avoid it for fear or cautiousness but because they weren’t capable of affording such technology – yet, they are certainly on their way there.

Half the world’s population is constantly connected to the Internet while the other half is on its way. According to Gartner, Inc. there will be 25 billion smartphones by 2020. At that time, no one will be safe regardless if he uses a smartphone or not. Saudi Arabia, for example, has a population of 30 million people, having 24 million internet users and 48 million subscribers of mobile telecommunication services.

Violations taking place every second with data and information divulged have become manifest for anyone connected to the internet. And it is impossible to stop or block them.

Take what has been published by founder of WikiLeaks Julian Assange in 2013 as an example – he published a huge archive of correspondences for former US Secretary of State Henry Kissinger since 1973 till 1976. These correspondences were classified as top secret and totaled 1.7 million, five-fold what has been previously published in WikiLeaks.

Another example is former Central Intelligence Agency (CIA) Edward Snowden, currently residing in Russia, who has unveiled that the National Security Agency (NSA) in the US and the Government Communications Headquarters (GCHQ) in Britain have jointly developed a technology that permits access to many global internet activity, call logs, individuals’ emails and a huge content of other digital telecommunications.

Misuse of personal data is a growing challenge all over the world. Requests were made to governments to take charge of protecting the future of citizens’ privacy and their social prosperity. However, it seems that none is capable of that, with governments themselves failing to protect their own classified data. So, how would a normal individual be able to do that?!

Till now there are no realistic solutions that show optimism in ending the violation of our privacy. Given that we have agreed to be connected to the Internet and to use smartphones, we should admit that our privacy has been violated irreversibly, even if we try to convince ourselves otherwise.

Salman Al-dossary

Salman Al-dossary

Salman Aldosary is the former editor-in-chief of Asharq Al-Awsat newspaper.

More Posts

Wikileaks: The CIA Is Using Popular TVs, Smartphones And Cars To Spy On Their Owners

(THIS ARTICLE IS COURTESY OF THE WASHINGTON POST)

Wikileaks: The CIA is using popular TVs, smartphones and cars to spy on their owners

March 7 2017

Wikileaks posts alleged trove of CIA hacking tools

Embed Share

 
Anti-secrecy group Wikileaks on Tuesday said it had obtained a top-secret trove of hacking tools used by the CIA to break into phones, communication apps and other electronic devices, and published confidential documents on those programs. (Reuters)

The latest revelations about U.S. government’s powerful hacking tools potentially takes surveillance right into the homes and hip pockets of billions of users worldwide, showing how a remarkable variety of every day devices can be turned to spy on their owners.

Televisions, smartphones and Internet-connected vehicles are all vulnerable to CIA hacking, according to the Wikileaks documents released Tuesday. The capabilities described include recording the sounds, images and the private text messages of users, even when they use encrypted apps to communicate. The CIA also studied whether it could infect vehicle control systems used by modern cars and trucks, which Wikileaks said could allow “nearly undetectable assassinations.”

In the case of a tool called “Weeping Angel” for attacking Samsung SmartTVs, Wikileaks wrote, “After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on, In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.”

The documents, which The Washington Post could not independently verify and the CIA has declined to confirm, list supposed tools for cracking into such widely popular devices as Apple’s iPhone or the Android smartphones whose operating system is made by Google, but there are marked differences from the 2013 revelations by the National Security Agency’s former contractor Edward Snowden.

His documents largely described mass surveillance of Internet-based communications systems, more often than the individual devices that appear to have been the focus of the CIA. By targeting devices, the CIA could gain access to even well-encrypted communications, on such popular apps as Signal and WhatsApp, without having to crack the encryption itself. The Wikileaks reports appear to acknowledge that difference by saying the CIA “bypassed” as opposed to defeated encryption technologies.

Resignation and frustration rippled through Silicon Valley on Tuesday as technologists grappled with revelations of yet another government attempt to exploit their systems.

“The argument that there is some terrorist using a Samsung TV somewhere – as a reason to not disclose that vulnerability to the company, when it puts thousands of Americans at risk — I fundamentally disagree with it, “ said Alex Rice, chief technology officer for Hacker One, a startup that enlists hackers to report security gaps to companies and organizations in exchange for cash.

Privacy experts say the CIA may have been forced into focusing on vulnerable devices because the Internet overall has become more secure through more widespread deployment of encryption. In this new world, devices have become the most vulnerable link.

“The idea that the CIA and NSA can hack into devices is kind of old news,” said Johns Hopkins cryptography expert Matthew Green. “Anyone who thought they couldn’t was living in a fantasy world.”

Snowden’s revelations and the backlash made strong encryption a major, well-funded cause for both privacy advocates and, perhaps more importantly, technology companies that had the engineering expertise and budgets to protect data as it flowed across the world.

Google, Microsoft, Facebook, Yahoo and many other companies announced major new initiatives, in part to protect their brands against accusations by some users that they had made it too easy for the NSA to collect information from their systems. Many Web sites, meanwhile, began encrypting their data flows to users to prevent snooping. Encryption tools such as Tor were strengthened.

Encrypting apps for private messaging, such as Signal, Telegram and WhatsApp exploded in popularity, especially among users around the world who were fearful of government intrusion. In the days following the U.S. presidential election, Signal was among the most downloaded in Apple’s app store and downloads grew by more than 300 percent.

Open Whispers Systems, which developed Signal, released a statement: “The CIA/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption.” WhatsApp declined to comment, and Telegram did not respond to requests for comment. Google declined to comment, while Samsung and Apple did not immediately respond to requests for comment.

U.S. government authorities complained loudly that the new wave of encryption was undermining their ability to investigate serious crimes, such as terrorism and child pornography. The FBI sued Apple in hopes of forcing it to unlock an iPhone used by the San Bernadino killers before announcing it had other ways to crack the device amid heavy public criticism.

Against that backdrop, many privacy advocates argued that devices — often called “endpoints” for their place on chains of communications that can criss-cross continents — were the best available target left in a world with widespread online encryption. The Wikileaks documents suggests that the CIA may have reached the same conclusion.

“It would certainly be consistent with the hypothesis that we’ve made real progress in the encryption we’ve been introducing,” said Peter Eckersley, technology projects director for the Electronic Frontier Foundation, a San Francisco-based civil liberties group. “It’s impossible to be 100 percent certain, but reading the tea leaves, it’s plausible.”

The Wikileaks revelations also will serve as a reminder that, for whatever the political backlash to revelations about digital spying, it is not going away and probably will continue to grow. The focus on hacking into individual devices — rather than the messages traveling between them — is likely to increase pressure on companies to make those devices safer because, as experts have long said, they are the most vulnerable target in a long chain of digital interactions.

That could be especially important for U.S. tech companies, such as Google, Apple and Facebook, that have worked to rebuild their reputations as stewards of their users’ privacy in recent years.

Cybersecurity experts, meanwhile, reacted with alarm to the news of the Wikileaks release.

“This is explosive,” said Jake Williams, founder of Rendition Infosec, a cybersecurity firm. The material highlights specific antivirus products that can be defeated, going further than a release of NSA hacking tools last year, he said.

The CIA hackers, according to WikiLeaks, even “discussed what the NSA’s …hackers did wrong and how the CIA’s malware makers could avoid similar exposure.”

Hackers who worked at NSA’s Tailored Access Operations unit said the CIA’s library of tools looked comparable. The description of the implants, which are software that enable a hacker to remotely control a compromised device, and other attack tools appear to be “very, very complex” and “at least on par with the NSA,” said one former TAO hacker who spoke on condition his name not be used.

The WikiLeaks release revealed that they have sophisticated “stealth” capabilities that enable hackers not only to infiltrate systems, but evade detection, as well as abilities to “escalate privileges” or move inside a system as if they owned it.

“The only thing that separates NSA from commodity malware in the first place is their ability to remain hidden,” the former TAO hacker said. “So when you talk about the stealth components, it’s huge that you’re seeing a tangible example here of them using and researching stealth.”

Computer security experts noted that the release includes no actual tools or exploits, “so we don’t know if WikiLeaks did not get them or is just not choosing to publish them,” Nicholas Weaver, a computer security researcher at the University of California at Berkeley. “However we should assume that whoever stole this data has access to the exploits and tools.”

He noted that the dates in the files suggest the tools were taken in February or March 2016 and that there are at least two documents marked Top Secret, “which suggests that somebody in early 2016 managed to compromise a Top Secret CIA development system and is willing to say that they did.”

One internal CIA document listed a set of Apple iPhone “exploits” — or tools that can be used to compromise the device by taking advantage of software flaws. Some of the tools are based on “zero-days,” which are software vulnerabilities that have not been shared with the manufacturer. So “some of these descriptions will allow Apple to fix the vulnerabilities,” Weaver said. “But at the same time, they’re out in the public and whoever stole this data could use them against U.S. interests.”

Follow me on Twitter

Social

Follow Truth Troubles: Why people hate the truths' of the real world on WordPress.com
oldpoet56

oldpoet56

truthtroubles.wordpress.com/ Just an average man who tries to do his best at being the kind of person the Bible tells us we are all suppose to be. Not perfect, never have been, don't expect anyone else to be perfect either. Always try to be very easy going type of a person if allowed to be.

View Full Profile →

A lie can travel half way around the world while the truth is putting on its shoes (Charles Spurgeon)

“The Christian faith has not been tried and found wanting. It has rather been found difficult and left untried.”

mingophoto

Fotos - sonst nichts

♣ WELKOM OP DE SITE VAN ANN ♣

VAN ALLES WAT VOOR ELK WAT WILS.

Ordinary Handsome

Writeography by Steven Baird

Les Petits Pas de Juls

Carnets de Voyages trilingues (Français, English, Español)

PHIELD TRIPS

When you need help with your travels to the Philippines, you're on the right place.

Budding Poet

"Don't Compromise Yourself ,You Are All You've Got!!"

Venus💎Lotus

✧Seeking & Sharing Great ℱood, Art, Astrology, Music...ℬliss✧

Luíz Müller Blog

Espaço de divulgação de textos e ações que defendem trabalho decente no Rio Grande e no Brasil

wakasa15thfd

Just another WordPress.com site

Remember The 14 Words

We Must Secure The Existence Of Our People And A Future For White Children

Chinese Correspondence

Chinese, language, learn, speak, write, textbook, contract, beginner, advanced, intermediate, commercial, marketing, correspondence, characters, radicals, decomposition, business, numbers, numerals

a cooking pot and twisted tales

Thoughts and Tales...A Lifestyle Blog with a Zing.

The ThinkTheorist

Think more...think theory

Yarnspinnerr

Just Fiction and other things that seem fictitious.

MIL QUESTIONS

Latest World News: international news, features and analysis

A Buddhist Year

Meditative Skills for Modern Life

openobserver

Toward Greater Understanding

70news

sharing news that matters to you

BUNKERVILLE | God, Guns and Guts Comrades!

God, Guns and Guts Comrades!

Variety as Life Spice

Words by a post-90s in Hong Kong

sufi

Yarnspinnerr and Sufi Esotericism

Chinese Characters Decomposition

Chinese, language, learn, speak, write, textbook, contract, beginner, advanced, intermediate, commercial, marketing, correspondence, characters, radicals, decomposition, business, numbers, numerals, contract, email

Scottish Muslimah

Fill your paper with the breathings of your heart - William Wordsworth

Welcome to Chanty's Cosmos

~~~Never let anyone to dull your Sparkle~~~

Blame Chocolate

and the girl who has too much of it

The Beauty of Words

Mastering social media, writing, and editing

Blog about Mexico's Riviera Maya

MyMexico.Blog : Playa del Carmen, Tulum, Cancun, Chichen Itza, Playacar, Cenotes, Sian Ka'an, Cozumel, Bacalar, Mahahual...

A Hungry Soul

Truth and love is what makes you human

lucialuz.wordpress.com/

Les Mots du Coeur

simplysands

Photography & Inspiration

HorseAddict

The world is best viewed through the ears of a horse.

this tiny blue house

striving to live simply, mindfully and intentionally.

رمادي

كلمات أرصها فأكتشف بمحض الصدفة أنها أنا.

FREE-VERSE POETRY by Douglas Gilbert

free verse for the universe

Vaca Cut Point

11785 5th Ave Ocean Marathon, Florida 33050

The Godly Chic Diaries

Smiling • Writing • Dreaming

ThumbWind

Fun in Michigan's Upper Thumb

Broken Cookies Taste Just as Sweet

there are no perfect experiences in life, but there is still much to savor

Aspie Under Your Radar

Living well on the autism spectrum - just out of public view

Anonymously Autistic

#ActuallyAutistic - An Aspie obsessed with writing. This site is intend to inspire through sharing stories & experiences. The opinions of the writers are their own. I am just an Autistic woman - NOT a medical professional.

%d bloggers like this: