AMD’s Blowout Second Quarter Got a Boost From the Cryptocurrency Mining Craze – TheStreet.com

Advanced Micro Devices Inc. (AMD) blew past expectations for the second quarter, helped by robust sales in its computing and graphics segment.

Shares of the chipmaker were soaring 10.2% to $15.56 in after-hours trading on Tuesday, after the company beat on its top and bottom line during the period. AMD said computing and graphics revenues jumped 51% from one year ago.

On an earnings call with investors, AMD CEO Lisa Su said sales of the company's RadeonRX GPUs (released in the second quarter) got a boost from the cryptocurrency mining market, as well as the gaming market. Leading up to AMD's earnings report, Wall Street had been trying to measure what impact the rise of cryptocurrency mining will have on chip companies, particularly AMD and its rival Nvidia Corp. (NVDA) . Both companies' chips are used to mine Ethereum, an alternative cryptocurrency to Bitcoin.

AMD's stock has popped 24.5% so far this year, in part due to a wave of demand from cryptocurrency miners. But Su indicated that AMD doesn't view cryptocurrency as a stable, long-term driver for the company.

"Relative to the cryptocurrency, we have seen some elevated demand," Su told investors on the call. "Our priority, though, really is on our core market, which is the gaming market. We are prioritizing supply toward the gaming market...But it's important to say that we didn't have cryptocurrency in our forecast and we are not looking at it as a long-term growth driver, although we will continue to watch the developments around blockchain technologies as they go forward."

Read more:
AMD's Blowout Second Quarter Got a Boost From the Cryptocurrency Mining Craze - TheStreet.com

AMD CEO: Cryptocurrency mining and gaming will boost Q3 graphics shipments – VentureBeat

Lisa Su, CEO of chip maker Advanced Micro Devices, said in an analyst conference call that enthusiasm for cryptocurrency and gaming will drive demand for the companys Vega graphics chips in the third quarter.

Overall, Su said AMD expects to post 23 percent better revenues in Q3 compared to the second quarter, which generated $1.22 billion in revenues. Su said that demand will be driven by a variety of things, including AMDs most competitive processors in a decade in its battle with rival Intel. AMD posted earnings that beat earnings expectations, and it predicted better times to come.

AMD launched its Epyc server chips in July, and it has been releasing new Ryzen processors since March. Those chips are based on the Zen cores, which are 52 percent faster per clock cycle than the previous generation. The gradual ramp of the Zen products will help AMD gain share in the market compared to Intel, and Su said the reception has been good.

Above: Lisa Su, CEO of AMD, introduces Zen.

Image Credit: Dean Takahashi

But Su also responded to questions about cryptocurrency during the call. She noted that the popularity of blockchain is prompting speculators to buy more graphics hardware so that they can mine currency faster. AMD recently launched its first Vega graphics processing units (GPUs), and it has more coming next week. Overall, demand for cryptocurrency mining has been clear.

We have seen elevated demand for cryptocurrency, she said. Inventory for GPUs is lean, but our priority is the core gaming market.

Su said the company is prioritizing supplies for game PC retailers. Semi-custom chips, including game console chips, will likely peak in the third quarter and come down in the fourth quarter, she said. AMD is shipping new processors for Microsofts Xbox One X game console debuting in October. Semi-custom chip sales were down 5 percent in the second quarter.

In the long term, Su said AMD was not counting on revenues from cryptocurrency to change the overall demand profile for graphics chips, but the company is watching the market, as cryptocurrency is definitely a component in overall demand.

Overall, I would view this as GPUs are strong. Its a great market to be in, she said.

More here:
AMD CEO: Cryptocurrency mining and gaming will boost Q3 graphics shipments - VentureBeat

WikiLeaks drops another cache of ‘Vault7’ stolen tools – Naked Security

The WikiLeaks Vault 7 almost-weekly drip-drip-drip of confidential information on the cybertools and tactics of the CIA continued last week.

The latest document dump is a trove from agency contractor Raytheon Blackbird Technologies for the so-called UMBRAGE Component Library (UCL) Project, which includes reports on five types of malware and their attack vectors.

This is the 17th release of specific CIA hacking or surveillance tools since the initial announcement by WikiLeaks on March 7.

According to a statement announcing the latest release:

The documents were submitted to the CIA between November 21st2014 (just two weeks afterRaytheon acquired Blackbird Technologiesto build aCyber Powerhouse) and September 11th2015. They mostly contain Proof-of-Concept ideas and assessments for malware attack vectors partly based on public documents from security researchers and private enterprises in the computer security field.

Raytheon Blackbird Technologiesacted as a kind of technology scout for theRemote Development Branch (RDB)of the CIA by analysing malware attacks in the wild and giving recommendations to the CIA development teams for further investigation and PoC development for their own malware projects.

The component library includes:

A new variant of the HTTPBrowser Remote Access Tool (RAT), used by a threat actor known as Emissary Panda, believed to be in China, which was built in 2015. It is a keylogger, and according to Raytheon captures keystrokes using the standard RegisterRawInputDevice() and GetRawInput() APIs and writes the captured keystrokes to a file.

A new variant of the NfLog RAT, also known as IsSpace and used by Samurai Panda. It is, according to Raytheon, a basic RAT that polls C2 servers every 6 seconds awaiting an encoded response. If it detects that a user has administrative privileges, it will attempt to reload itself using the elevated permissions.

Regin, described as a very sophisticated malware sample, which has been around since 2013. It is used for target surveillance and data collection. Raytheon said it has a six-stage, modular architecture that affords a high degree of flexibility and tailoring of attack capabilities to specific targets. It is also stealthy, with an, ability to hide itself from discovery, and portions of the attack are memory resident only.

HammerToss, a suspected Russian state-sponsored malware, which became operational in 2014 and was discovered in 2015, uses Twitter accounts, GitHub or compromised websites, and cloud storage to arrange the command and control operations for the malware. It is considered the most sophisticated malware of the five in the current release.

Gamker, an information-stealing Trojan that uses an interesting process for self-code injection that ensures nothing is written to disk.

As WikiLeaks noted in its announcement, these were all malware attacks found in the wild, and therefore not secret. But the CIAs hope clearly was that they would lead to development of their own malware projects to be used to conduct attacks not just on individual computers or systems, but social media platforms like Twitter as well.

Read more from the original source:
WikiLeaks drops another cache of 'Vault7' stolen tools - Naked Security

Wikileaks Pettiness Reveals What Might Be the Secret Amazon … – Gizmodo

Justin Berry, right, listens Kurt Eichenwald testify before the House Energy and Commerce Committee regarding sexual exploitation of children over the Internet in Washington in 2006. (Photo: AP)

Well, this is ugly: On Monday evening, international secret-sharing website WikiLeaks, whose founder Julian Assanges behavior of late has been slightly concerning, tweeted out what certainly looks like an Amazon burner account journalist Kurt Eichenwald used to write positive reviews of his own books back in the aughts.

WikiLeaks animosity seems to have been inspired by a legal battle between former Sputnik writer Bill Moran and Newsweek, where Eichenwald published a now-deleted piece in October 2016 claiming President Donald Trump, the Russian government-owned Sputnik, and WikiLeaks were all engaged in a conspiracy to smear Hillary Clinton. Moran fought back with claims of libel and defamation. Moran also alleged that Eichenwald had tried to silence him with bribery and threats. The case resulted in a settlement this month.

Eichenwalds story insinuated WikiLeaks was a tool of the Russian government. Eichenwald is hardly the only person to make the claimUS intelligence linked the hacked documents released by Wikileaks to the Russian government as well, though Assange denies it was his sourcebut Assange and Wikileaks have been reveling in Eichenwalds embarrassment as if it somehow means that Wikileaks didnt influence the election.

Heres Assange suggesting that Eichenwald may have left his job at Newsweek over the Moran affair:

In a reply, Eichenwald claimed to simply be on leave writing a book.

And heres a post from the verified Twitter account of the WikiLeaks Task Force, which the site uses to Correct misinformation about #WikiLeaks. It reads: Haha! Court docs show that @KurtEichenwalds alias is Andrew McDonald. Checkout these Amazon reviews of KEs books.

Linked is an Amazon profile using that name, which has two reviews from 2000 and 2005 calling Eichenwalds books The Informant one of the most exciting, unbelievable and astonishing books I have ever read, and his later book Conspiracy of Fools: A True Story just as thrilling.

The court docs in question were subsequently linked to by WikiLeaks, and are briefs from the defense team of Timothy Ryan Richards, who was convicted of 11 child-pornography related offenses following Eichenwalds 2005 series on JustinsFriends.com, a since-shuttered child porn site.

The documents link Eichenwald to two email addresses under the Andrew McDonald alias via a credit card tied to a PayPal account. Both the email addresses and the PayPal account were allegedly used by Eichenwald in the course of infiltrating JustinsFriends.com.

Eichenwalds reporting on the now-shuttered JustinsFriends.com became a matter of a very public journalistic ethics controversy after it was revealed he paid $2,000 to the sites namesake Justin Berry as part of an attempt to gain his confidence, which he did not disclose to his editors. (Eichenwald later asked for and received repayment of the money.)

Amusingly, all of this decade-old controversy about Eichenwald and his reporting is only coming back into the spotlight now because Eichenwald is being trolled by WikiLeaks following yet another controversial story. Eichenwalds myopic political views and increasingly insufferable behavior on Twitter in recent years have made him a favorite target of online trolls, and WikiLeaks is tossing fuel on the fire in service of its own agenda. Whats worse: Eichenwalds (alleged) humiliating reviews of his own book or WikiLeaks pettiness?

Both Eichenwald and Wikileaks did not respond to a request for comment. Well update if they do.

View original post here:
Wikileaks Pettiness Reveals What Might Be the Secret Amazon ... - Gizmodo

WikiLeaks versus the US – Press TV

These are the headlines we are tracking for you in this episode of On the News Line:

WikiLeaks: To bring down America

The US has made each and every effort to discredit whistleblower organization WikiLeaks, but the latest remarks by the CIA chief is symptomatic of Washington's failure to reverse the damage done to its image as a result of revelations by the group. Mike Pompeo has described WikiLeaks as a non-state hostile intelligence service.Pompeo says the whistleblower website is plotting to "take down America any way they can and find any willing partner to achieve that end." While exposing the US weaknesses and lies, Pompeo's comments also shows how powerful WikiLeaks is and how the organization and its chief Julian Assange have turned into a nightmare for the US as a self-styled defender of human rights which itself stands accused of violating human rights and international law.

Al-Aqsa tensions: Rights not recognized Tensions are rising to alarming levels in the occupied lands of Palestine over Israels latest controversial security measures at al-Aqsa compound in East Jerusalem al-Quds. Several have died in clashes with the Israelis and many wounded in what many fear could trigger a new uprising by the Palestinians. Criticisms are to the same degree rising against the Palestinian president Mahmoud Abbas over his handling of what many see as an Israeli plot to extend its control over al-Aqsa. Abbas has just ordered the suspension of all official contact with Israel until it stopped the new security measures at the third holiest site in the Muslim world.But many are already criticizing that this is too little and coming too late.

Link:
WikiLeaks versus the US - Press TV

One Year Later, Journalists Exposed By WikiLeaks Carry On As Before – The Daily Caller

One year afterWikiLeaks began publishingemails from the Democratic National Committee and Clinton campaign chair John Podesta that exposedprominent journalists as partisans, many of those journalists are continuing their careers without, it seems, any serious consequences.

Take Glenn Thrush, for example. Thrush, now with the New York Times, was exposed sending storiesto the Clinton campaign for approval while at Politico.

Glenn Thrush, chief White House political correspondent for the The New York Times, works in the briefing room after being excluded from an off camera gaggle meeting at the White House in Washington, U.S., February 24, 2017. REUTERS/Yuri Gripas

Because I have become a hack I will send u the whole section that pertains to [you], he wrote in an April 30, 2015 email to Podesta, including five paragraphs froma storylater titled Hillarys big money dilemma.

Please dont share or tell anyone I did this, Thrushadded. Tell me if I fucked up anything.

No problems here, Podesta replied.

Glenn Thrush sends a story to the Clinton campaign for approval (Screenshot/WikiLeaks)

On April 17, 2015, Thrushsent an emailto Clinton communications director Jennifer Palmieri with the subject line: pls read asap the [Jennifer Palmieri] bits dont share.

Palmieri forwarded Thrushs email to other Clinton campaign staffers, writing: He did me courtesy of sending what he is going to say about me. Seems fine.

Thrushs career doesnt appear to have been harmed by the fact that he sent stories to Clinton staffers for approval. If anything, his career trajectory has continued upward: Thrush joined the New York Times in December as a White House correspondent.

While covering the Trump administrationfor the NYT, Thrush has oftenco-authoredstories with fellow White House correspondent Maggie Haberman, whom an internal Clinton campaign memo described as a friendly journalist. The memo added: We have had her tee up stories for us before and have never been disappointed.

The leaked DNC emails also revealed CNBC editor at large John Harwood as clearly biased against Republicans especially Trump.

Harwood repeatedly displayed clear partisanship while emailing with Podesta. In one May 2015 email, for example, Harwood warned Podesta towatch out for Republican presidential candidate Dr. Ben Carson.

Ben Carson could give you real trouble in a general, Harwood wrote, including relevantvideo clips of Carson on topics including gay marriage.

In December 2015, Harwood claimed vindication at the Republican party veering off the rails. In the same email, Harwood bragged to Podesta about provoking Trump during a Republican primary debate that Harwood moderated as an ostensibly neutral journalist.

Harwood titled the email, I imagine before continuing in the body: that Obama feels some (sad) vindication at this demonstration of his years-long point about the opposition party veering off the rails.

I certainly am feeling that way with respect to how I questioned Trump at our debate.

John Harwood emails John Podesta about Republicans veering off the rails and brags about provoking Trump. (Screenshot/WikiLeaks)

Harwood wasreferring to the October 2015 debate he moderated, where he asked Trump if he was running a comic book version of a presidential campaign.

Harwood has played a central role in his networks coverage of the first six months of the Trump White House.

Harwood has like much of the news media covered the Russia probe with bombastic language, comparing it to theWatergate scandalthat led to Richard Nixons resignation.

In a story last week, Harwood lay the blame forRepublicans health care struggles at Trumps feet.

New York Times Magazines chief political correspondent, Mark Leibovich, gave the Clinton campaign veto power over what parts of an interview he could and couldnt use, WikiLeaks revealed. (Internal campaign communications described him as sympathetic.)

Leibovich emailed Jennifer Palmieri, the campaigns communications director, following a July 7, 2015 interview with Hillary Clinton. Leibovich told Palmieri she couldveto what you didnt want, includingparts of the interview that he wanted to use.

Palmieri instructed Leibovich to remove a joke Clinton made about Sarah Palin, as well as Clinton saying thatgay rights has moved much faster than womens rights or civil rights, which is an interesting phenomenon somebody in the future will unpack.

Leibovich complied: neither the Palin joke nor Clintons gay rights line were included in his July 15 feature titled, Re-Re-Re-Reintroducing Hillary Clinton.

Leibovich noted in the piece that Clintons campaign at first declined to make her available for an interview. He did not note that he gave the campaign veto power over what parts of the interview he could use.

Leibovich is still writing long-form pieces for NYT Magazine, which are often met with effusive praised fromother journalists on Twitter.

His most recent piece, a July 11 feature titled, This Town Melts Down, explored what has and hasnt changed about D.C. politics in the age of Trump. One thing that apparently hasnt: the prominence of known partisans in the media.

Here is the original post:
One Year Later, Journalists Exposed By WikiLeaks Carry On As Before - The Daily Caller

WikiLeaks releases documents provided to the CIA by Raytheon for developing malware – Firstpost

WikiLeaks has released five documents that private defense contractorRaytheon Blackbird Technologies provided to the CIA towards building the UMBRAGE Component Library (UCL). According to WikiLeaks, Raytheon acted as a technology scout for the CIA, exploring the malware in the wild, and recommending promising malware to CIA development teams for use in their own tools.

The documents, a part of the Vault 7 series of releases contains five reports. The first is a keylogger by the Emissary Panda, a threat actor believed to be based in China. The actual tool was not that sophisticated, it managed to persist on the system but used plain text to communicate with the command and control servers. The second is also a remote access tool by Samurai Panda, another group believed to be operating from China. The tool was a variant of an Adobe Flash exploit used by the Italian group, Hacking Team.

The next document outlines the capabilities of a fairly sophisticated malware known as Regin. Regin has a six stage architecture, and is modular, allowing for the malware to be customised for a particular target or operation. Themalware is customised using the modular payloads for specific purposes, including file system access, networking capabilities, compression operations, port blocking, packet filtering and so on.

Another document describes the Gamker Trojan, used for stealing information. Apparently the Trojan uses unusual instructions in assembly language, to obfuscate the code.

The most sophisticated malware described in this set of releases is HammerToss, which is suspected to be a Russian state sponsored malware. The malware uses Twitter accounts, GitHub or compromised websites, and cloud storage to arrange the command and control operations for the malware. There is a five stage architecture for the malware. The malware contains an algorithm that generates Twitter handles on a daily basis, that requires the malware to check the Twitter handles for receiving further instructions.

The instructions are hidden in a URL Tweeted out by the handles, and the accompanying hashtag provides the information needed to decode the instructions. The malware then downloads the data, and uses the hashtag in the tweet to figure out the instructions. The malware then executes the instructions on the target machine. If data has to be retrieved, it is stored in the cloud, from where it is later retrieved by the operators of the malware.

Incorporating malware already in the wild into their own tools can mask the origin of the malware, allowing the CIA to disguise the source of the malware from forensic investigation teams. Unlike many other releases that are part of the Vault 7 disclosures, the tools revealed in the Raytheon set of leaks are not developed by the CIA itself. These tools are developed by other threat actors, that have been identified as malware of interest, parts of which could be used by the CIA.

Read more here:
WikiLeaks releases documents provided to the CIA by Raytheon for developing malware - Firstpost

Trump: Transgenders Not Allowed to Serve in the US Military – People’s Pundit Daily

President Donald J. Trump announced Wednesday that the United States will not accept or allow Transgendered individuals to serve in any capacity in the U.S. military.

After consultation with my Generals and military experts, please be advised that the United States Government will not accept or allowTransgender individuals to serve in any capacity in the U.S. Military, President Trump tweeted. Our military must be focused on decisive and overwhelmingvictory and cannot be burdened with the tremendous medical costs and disruption that transgender in the military would entail.

Thank you.

The Trump Administration appears to be reversing policy under Barack Obama, one which drew sharp criticism for using the U.S. military as a social experiment. Taxpayers footed the bill for then-Pfc. Bradley Manning toreceive gender reassignment surgery while in prison. The commuted leaker is now known as Chelsea Manning.

Treatment is estimated to cost as much as $50,000 per service member. Treatment generally begins with counseling and moves on to hormone therapy before gender reassignment surgery.

Link:
Trump: Transgenders Not Allowed to Serve in the US Military - People's Pundit Daily

Newly declassified memos detail extent of improper Obama-era NSA spying – The Hill

The National Security Agency and Federal Bureau of Investigation violated specific civil liberty protections during the Obama years by improperly searching and disseminating raw intelligence on Americans or failing to promptly delete unauthorized intercepts, according to newly declassified memos that provide some of the richest detail to date on the spy agencies ability to obey their own rules.

The memos reviewed by The Hill were publicly released on July 11 through Freedom of Information Act litigation by the American Civil Liberties Union.

The NSA says that the missteps amount to a small number less than 1 percent when compared to the hundreds of thousands of specific phone numbers and email addresses the agencies intercepted through theso-called Section 702 warrantless spying program created by Congress in late 2008.

Quite simply, a compliance program that never finds an incident is not a robust compliance program, said Michael T. Halbig, theNSAs chief spokesman. The National Security Agency has in place a strong compliance program that identifies incidents, reports them to external overseers, and then develops appropriate solutions to remedy any incidents.

But critics say the memos undercut the intelligence communitys claim that it has robust protections for Americans incidentally intercepted under the program.

Americans should be alarmed that theNSAisvacuuming up their emails and phone calls without a warrant, said Patrick ToomeyPat ToomeyNewly declassified memos detail extent of improper Obama-era NSA spying Overnight Tech: FCC won't fine Colbert over Trump joke | Trump budget slashes science funding | Net neutrality comment period opens Appeals court decision keeps lawsuit against NSA surveillance alive MORE, an ACLU staff attorney in New York who helped pursue the FOIA litigation.TheNSAclaims it has rules to protectour privacy, but it turns out those rules are weak, full of loopholes, andviolated again and again.

Section 702 empowers the NSA to spy on foreign powers and to retain and use certain intercepted data that was incidentally collected on Americans under strict privacy protections. Wrongly collected information is supposed to be immediately destroyed.

The Hill reviewed the new ACLU documents as well as compliance memos released by the NSA inspector general and identified more than 90 incidents where violations specifically cited an impact on Americans. Many incidents involved multiple persons, multiple violations or extended periods of time.

For instance, thegovernment admitted improperly searchingNSAs foreign intercept data on multiple occasions, including one instance in which ananalyst ran the same search query about an American every work day for a period between 2013 and 2014.

There also were several instances in which Americans unmasked names were improperly shared inside the intelligence community without being redacted, a violation of the so-called minimization procedures that President Obama loosened in 2011that are supposed to protect an Americans' identity from disclosure when they are intercepted without a warrant.Numerous times improperly unmasked information about Americans had to be recalled and purged after the fact, the memos stated.

CIA and FBI received unminimized data from many Section 702-tasked facilities and at times are thus required to conduct similar purges, one report noted.

NSAissued a report which included the name of a United States person whose identity was not foreign intelligence, said one typical incident report from 2015, which said theNSAeventually discovered the error and recalled the information.

Likewise, the FBI disclosed three instances between December 2013 and February 2014 of improper disseminations of U.S. persons identities.

TheNSAalso admitted it was slow in some cases to notify fellow intelligence agencies when it wrongly disseminated information about Americans. The law requires a notificationwithin five days, but some took as long as 131 business days and the average was 19 days., the memos show

U.S. intelligence officials directly familiar with the violations told The Hill that the memos confirm that the intelligence agencies have routinely policed, fixed and self-disclosed to the nation's intelligence court thousands of minor procedural and more serious privacy infractions that have impacted both Americans and foreigners alike since the so-called Section 702 warrantless spying program was created by Congress in late 2008.

Alexander W. Joel, who leads the Office of Civil Liberties, Privacy and Transparency under the Director of National Intelligence, said the documents chronicle episodes that have been reported to Congress and the Foreign Intelligence Surveillance Court (FISC) for years in real time and are a tribute to the multiple layers of oversight inside the intelligence community.

We take every compliance incident very seriously and continually strive to improve compliance through our oversight regime and as evidence by our reporting requirements to the FISC and Congress, he told The Hill. That said, we believe that, particularly when compared with the overall level of activity, the compliance incident rate is very low.

The FBI told the Hill that the Section 702 law is "One of the most valuable tools the Intelligence Community has, and therefore, is used with the utmost care by the men and women of the FBI so as to notjeopardize future utility. As such, we continuallyevaluate our internal policies and procedures to further reduce the number of these compliance matters."

The new documents show that theNSAhas, on occasion, exempted itself from its legal obligation to destroy all domestic communications that were improperly intercepted.

Under the law, theNSAis supposed to destroy any intercept if it determines the data was domestically gathered, meaning someone was intercepted on U.S. soil without a warrant when the agency thought they were still overseas. The NSA however, has said previously it created destruction waivers to keep such intercepts in certain cases.

The new documents confirm theNSAhas in fact issued such waivers and that it uncovered in 2012 a significant violation in which the waivers were improperly used and the infraction was slow to be reported to the court.

In light of related filings being presented to the Court at the same time this incident was discovered and the significance of the incident, DOJ should have reported this incident under the our immediate notification process, then-Assistant Attorney General Lisa Monaco wrote the FISA court in August 28, 2012 about the episode, according to one memo released through the FOIA.

TheNSAdeclined to say how often destruction waivers are given. But ODNIs Joel said the FISC court has supervised such waivers and affirmed they are consistent with the Fourth Amendment of the Constitution and the statutory requirements of Section 702.

Other violations cited in the memos:

In annual and quarterly compliance reports that have been released in recent years, U.S. intelligence agencies have estimated the number of Section 702 violations has averaged between 0.3 percent and 0.6 percent of the total number of taskings. A tasking is an intelligence term that reflects a request to intercept a specific phone number or email address.

The NSA now targets more than 100,000 individuals a year under Section 702 for foreign spying, and some individual targets get multiple taskings, officials said.

The actual number of compliance incidents remains classified but from the publicly available data it is irrefutable that the number is in the thousands since Section 702 was fully implemented by 2009, said a senior U.S. official with direct knowledge, who spoke only on condition of anonymity.

The increasing transparency on Section 702 violations is having an impact on both critics and supporters of a law that is up for renewal in Congress at the end of this year. Of concern are the instances in which Americans data is incidentally collected and then misused.

Retired House Intelligence Committee chairman Pete Hoekstra, a Republican who strongly supported the NSA warrantless spying program when it started under George W. Bush, said he now fears it has now become too big and intrusive.

If I were still in Congress today, I might vote with the people today to shut the program down or curtail it, Hoekstrak, who has been tapped by Trump to be ambassador to the Netherlands, said in an interview.

One percent or less sounds great, but the truth is one percent of my credit card charges dont come back wrong every month. And in my mind one percent is pretty sloppy when it can impact Americans privacy.

Go here to read the rest:
Newly declassified memos detail extent of improper Obama-era NSA spying - The Hill

Law enforcement radio encryption draws backlash – The Reflector

Pushback from the public regarding the encryption of law enforcement radio traffic has led to discussions about the decision, though its not likely that those channels will go back to being clear any time soon.

Clark Regional Emergency Services Agency completed a switch to an all-digital radio system in June, which among other things involved the encryption of all law enforcement channels for agencies that use CRESA for dispatch services.

The Law Enforcement Council of Clark and Skamania Counties made the decision to encrypt law enforcement channels, citing officer safety as the chief concern that led to it. Members of the public have spoken out about the decision, citing transparency among other concerns.

One local amateur radio enthusiast, Ryan Todd, sent a letter to different local government officials last week listing reasons why full encryption was a bad idea in his mind. Apart from having some police operations available for the public to monitor, managing the keys needed to access the encrypted channels can become costly, the letter read, and in the case of departments that do not have the encryption, the relay of communication could be delayed, compromising the usefulness of the system.

Another point touched on in the letter was how open channels can allow for community awareness. Todd mentioned in an interview that in certain situations having the feedback of the public can help in solving some types of issues.

The letter mentioned that in a recent interview Clark County Sheriff Chuck Atkins had estimated about 25,000 citizens use scanners. In perspective, the letter stated that the two most popular Facebook groups devoted to covering scanner traffic had a combined total of more than 42,000 followers.

That is an incredible amount of eyes and ears that we could have in the community that can help police officers deal with events that dont necessarily pose a risk to either officers or the public, Todd said.

Todd said that those in the scanner enthusiast community do understand the benefits of encryption in certain situations, but blocking out the public totally was not ideal.

If this is an officer safety issue, of course; use encryption. If this is not an officer safety issue, use your community, Todd said.

In between the public and the police chiefs is Clark County Undersheriff Michael Cooke. Cooke himself has a background in amateur radio and has taken an informal role as a liaison between members of the scanner community and local law enforcement leaders.

I cringe a little bit when I hear people that imply that this decision to encrypt has some sort of sinister motive because it absolutely did not, Cooke said.

Cooke recently had a meeting with one of the individuals in the scanner community where he said several concerns were able to be addressed, feeling positive about the chance for understanding on the issue.

Although that meeting went well, feedback from law enforcement doesnt look like there will be any clearing up of channels any time soon. Battle Ground Police Chief Bob Richardson is one of the local law enforcement leaders who is a proponent of encryption, having previous professional experience with it.

Coming from Orange County, California, where full encryption had been around for more than a decade, Richardson said in that instance there wasnt the same pushback as the decision in Clark County has garnered.

We dont make these decisions lightly, nor do we make them in a vacuum. We have had vigorous debate in our meetings with the other police chiefs and the sheriff about whats the right thing to do, Richardson said.

In regard to transparency concerns, Richardson mentioned the crime map on CRESAs website as an attempt to keep the public in the loop. Although not in real-time, the map shows where and why officers are dispatched.

One of local law enforcements chief arguments has been criminals use of scanners to circumvent attempts to catch them.

Weve stopped cars with people that are up to no good with the scanner apps listening to our radios, Richardson said, mentioning another instance where burglars had left their scanner behind at a crime scene.

Another issue Richardson felt was left out of the conversation was peoples right to privacy when they contact the police. He explained how in a situation like domestic violence or a suicide attempt, having the information of that call out on open airwaves could negatively affect members of the community.

Do you want that broadcast to the world live? Richardson asked. He added how in other situations sensitive information such as gate codes would need to be broadcast as well.

Overall, Richardson said that encrypting radios was something necessary with the changing times.

We live in a different world than we used to live in 20 years ago, and we have to protect our officers out in the street, Richardson said.

See original here:
Law enforcement radio encryption draws backlash - The Reflector