Best Apps to Track Cryptocurrency Prices on a Mac – Investopedia


NDTV
Best Apps to Track Cryptocurrency Prices on a Mac
Investopedia
Bitcoin Ticker is a simple app that provides a service exactly as you would expect based on its name: it serves as a ticker for Bitcoin, with information about a number of different exchanges available at once. The app has not been updated since 2014 ...
Step-By-Step Guide To Investing in Cryptocurrency In Bitcoin Pioneer Amit Bhardwaj's New e-BookNDTV
Top 6 Bitcoin and Cryptocurrency Books to Check out This Summer ...The Merkle
What is Bitcoin, what is its price in pound sterling and how does it work?The Sun
TechNode (blog)
all 17 news articles »

Go here to see the original:
Best Apps to Track Cryptocurrency Prices on a Mac - Investopedia

Hackers steal $34 million in second Ethereum cryptocurrency theft this week – PC Gamer

Flickr via Doctorow. Click for original.

One of the most popular cryptocurrencies in the world is drawing increased attention from hackers, or at least that has been the case this week. For the second time in a span of just three days, hackers have been able to make off with millions of dollars worth of Ethereum, leaving vigilante white hat hackers scrambling to prevent further theft.

In this latest robbery, the hacking group (or individual hacker, we don't know yet) exploited a vulnerability in Parity, a digital wallet service where cryptocurrency miners can store their Ethereum. In doing so, the hackers were able to swipe over 153,000 Ether worth approximately $34 million from three separate multi-signature Ethereum wallets, according to the most recent estimates.

Following the latest heist, Parity founder Gavin Wood issued a critical security notice to users.

"A vulnerability in Parity Wallet's variant of the standard multi-sig contract has been found," Wood wrote. He goes on to advise users to "immediately move assets contained in the multi-sig wallet to a secure address."

In the meantime, white hat hackers have been able to siphon some 377,015 Ether worth more than $85 million to prevent further loss.

"White hat group(s) were made aware of a vulnerability in a specific version of a commonly used multi-sig contract. This vulnerability was trivial to execute, so they took the necessary action to drain every vulnerable multi-sig they could find as quickly as possible," the White Hat Group stated on Reddit.

Those funds will be issued back to their owners after the group is able to create another multi-sig for each individual with the same settings as before, minus the vulnerability that made theft possible in the first place.

This is not the only black eye for cryptocurrencies, or even the only theft this week. Back on Monday, hackers made off with an estimated $10.3 million in Ethereum currency from CoinDash. In that instance, it is believed the culprits simply replaced the legitimate Ethereum wallet address listed on CoinDesk with one that belonged to them.

There are several other examples of thieves stealing large amounts of cryptocurrencies, as Gizmodo points out. Back in June of last year, hackers stole $53 million cryptocurrency from venture capital fund Decentralized Autonomous Organization. And then there was the situation in which $450 million of Bitcoin vanished from trading hub Mt. Gox a few years ago.

Despite the risks, mining for cryptocurrency continues be popular, much to the detriment of PC gaming. If and when things ever settle down, it will likely be due to plummeting values rather than the fear of theft.

View post:
Hackers steal $34 million in second Ethereum cryptocurrency theft this week - PC Gamer

What Drives the Valuation of Cryptocurrencies? – The Market Mogul

Introduction

Cryptocurrencies have recently attracted increasing attention from investors and businesses as they promise to provide innovative, secure and cost-effective solutions that improve the current money transfer system and enhance the efficiency of transactions. Cryptocurrencies have also proved to be a volatile market with unpredictable price swings and rapid introduction of new coins that constantly disrupt the current market equilibrium. In this article, I endeavour to explain the key factors that drive the valuation of cryptocurrencies.

A cryptocurrency is broadly described as a cross between a commodity and currency as it stores value and has a finite supply but is also liquid and can also be used to pay for transactions. Fundamentally, its price is determined by supply and demand, as any other asset price is determined. Most, if not all, cryptocurrencies have a finite supply that is either already in circulation or will slowly start decreasing until it reaches a known limit. Due to this, the price of cryptocurrencies is driven primarily by factors that affect demand.

The value and demand for any currency, especially fiat currencies, is derived from the trust of its users in its ability to preserve its purchasing power. When a currency loses trust, its value drops precipitously, exemplified by Argentinas peso during its hyperinflation days.

Cryptocurrencies are no exception. Bitcoin gained traction because users believe in the complete anonymity and security of its blockchain ledger. Since it could not be hacked or tampered with, it would always preserve its value. Similarly, Litecoins value rapidly increased when users understood that it had features that surpassed Bitcoin in certain aspects, such as speed of transactions, and they believed it was the silver to Bitcoins gold.

Government trust, in terms of regulations, also plays a vital role in the success of acryptocurrency and affects its valuation. The original scepticism with Bitcoin was principally due to the belief that governments would never legalise it, owing to fears of facilitating money laundering and black market trade. This was exacerbated by the fact that Bitcoin initially gained popularity as the method of payment in Silk Road, the first modern dark-net black market which was infamous as a platform for selling illegal drugs.

However, governments have looked at cryptocurrencies more favourably than originally assumed and have understood the potential that blockchain technology has in improving efficiency. The impact of government trust on valuations is evidenced by the price spikes that occur when governments legitimize it. Bitcoins total valuation soared to more than $1bn in mid-April this year when Japan and Russia moved to legitimize it. During mid-June, Ethereums price spiked to above $400 when some Asian governments legitimized it in part as a form of payment.

Value investors who invest in cryptocurrencies estimate their value based on the market capitalization of the process or asset it seeks to replace along with an estimation of how much market share the cryptocurrency will control. For example, Bitcoin enthusiasts who believe that bitcoin is a form of digital gold, as Satoshi Nakamoto intended, will take reference from the market cap of the gold market $7trn.

If Bitcoin were to control even 1% of golds market cap, its valuation should be $70bn compared to the current valuation of $36.5bn implying that it is undervalued. Other common examples are estimating Bitcoins value based on the remittance market and Ethereums value based on the IPO market which it seeks to replace with ICOs (Initial Coin Offerings).

However, this method of valuing currencies is risky as it depends on factors, such as the possibility of the emergence of more efficient cryptocurrencies, that are impossible to predict accurately. The investors personal beliefs are also reflected in his choice of the prospective market that the cryptocurrency would replace.

As with any other asset, speculation is a strong driving force in determining the value of cryptocurrencies. Speculation is affected by the perception of cryptocurrencies and is directed by new updates and developments. For example, improvements in liquidity through the establishment of new exchanges leads to a price increase as speculators believe that more people will start using the currency and drive up its price.

Similarly, the introduction of a new coin that performs the same function as an existing one but has increased transaction speed and lower cost would send the existing coins valuation spiralling downwards. The highest short-term price swings are currently in the cryptocurrency market some have spiked by 1000% in less than a week and this attracts traders and other investors who wish to profit from these swings. Furthermore, these wild swings are not just confined to the newer coins but are prevalent even in the established ones.

Many traders do not understand the technical aspect of this market and simply wish to gain from the greater fool theory wherein the assets fundamentals carry no importance if they can sell it to someone at a higher price. These trend-followers exacerbate the price movements by encouraging feedback loops and herd mentality. Furthermore, low-volatility and overvalued metrics in traditional markets have accentuated the attention of investors in cryptocurrencies as it remains one of the few areas which can rapidly deliver huge returns.

Cryptocurrency valueis driven by the demand-side factors that have been explained in this article and the trajectory that investors expect the market to take. Many investors and economists believe cryptocurrencies are currently in a bubble as ICOs are attracting a lot of capital, the market has an uncanny resemblance to the dot com boom and everyone is bragging about how easy it is to make money.

Others believe that the boom has just started and the valuations of cryptocurrencies will increase tremendously over the next decade as they replace traditional forms of money transfers and contracts. The rest believe that in the same way as the dot-com boom left behind Google, Facebook and a plethora of revolutionary technological companies, the cryptocurrency craze will eventually lead to a bust that will leave behind a few cryptocurrencies which will shape the way we transact.

Here is the original post:
What Drives the Valuation of Cryptocurrencies? - The Market Mogul

CIA director: ‘I don’t love’ Wikileaks – The Hill

CIA Director Mike Pompeo took a swipe at Wikileakson Thursday, saying he doesn't "love" the anti-secrecy organization.

Pompeo arguedduring aninterview with conservative New York Times columnist Bret Stephens at theAspen Institutes Security Forum that Wikileaks is intent on harming America.

"WikiLeaks will take down America any way they can," he said.

"I don't love WikiLeaks."

Pompeo was also asked about whether he believes Russia interfered in the 2016 election.

"Of course they did," he said. "And the one before that. And the one before that."

The CIA chiefhas previously come out strongly against WikiLeaks, calling them a non-state hostile intelligence service" in an April speech in his first public speech since joining President Trumps administration.

"It's time to call out WikiLeaks for what it really is: A non-state hostile intelligence service often abetted by state actors like Russia, he said.

But both Trump and Pompeo praised WikiLeaks during the 2016 campaign, with Trump once declaringon the campaign trail, I love WikiLeaks.

Pompeo also once used his congressional Twitter account to tweet a link to WikiLeaks posting of thousands of hacked emails from the Democratic National Committee. CNNfound several other instances in which Pompeo cited WikiLeaks to attack then-Democratic nominee Hillary ClintonHillary Rodham ClintonFormer Justice Dept spokesman: Trump looks 'super guilty' Maxine Waters is joking about 2020 but not about Trump How Florida explains our polarized politics MORE.

Originally posted here:
CIA director: 'I don't love' Wikileaks - The Hill

WikiLeaks: CIA analyzed Russian and Chinese malware to inspire its own hacking and surveillance tools – BetaNews

Some four months after the first Vault 7 leak, WikiLeaks continues to publish revealing CIA documents that detail the agency's ability to hack, infiltrate and surveil targets. The latest batch goes under the banner "UCL / Raytheon", and comprises documents from CIA contractor Raytheon Blackbird Technologies.

Dating from late 2014 and late 2015, the documents show how the CIA, through Raytheon Blackbird Technologies, monitored malware in the wild to see how it could be used by the agency. The documents cover tools produced by the infamous Hacking Team as well as the Russian HammerToss malware delivered via Twitter.

See also:

In all, the latest batch of releases include five documents from Raytheon Blackbird Technologies. The first looks at the HTTPBrowser remote access tool (RAT) developed by the Chinese group Emissary Panda, while another concerns the Hacking Team-inspired RAT IsSpace based on NfLog and used by Samurai Panda.

Also discussed are Regin -- a data collecting malware subtitled Stealthy Surveillance -- and the Gamker Trojan. Particularly interesting, however, is the Russian-produced HammerToss which "leverages Twitter accounts, GitHub or compromised websites, basic steganography, and Cloud-storage to orchestrate command and control (C2) functions of the attack."

Revealing the latest leaks, WikiLeaks says:

Today WikiLeaks publishes documents from the CIA contractor Raytheon Blackbird Technologies for the "UMBRAGE Component Library" (UCL) project. The documents were submitted to the CIA between November 21st 2014 (just two weeks after Raytheon acquired Blackbird Technologies to build a Cyber Powerhouse) and September, 11th 2015. They mostly contain Proof-of-Concept ideas and assessments for malware attack vectors - partly based on public documents from security researchers and private enterprises in the computer security field.

Raytheon Blackbird Technologies acted as a kind of "technology scout" for the Remote Development Branch (RDB) of the CIA by analysing malware attacks in the wild and giving recommendations to the CIA development teams for further investigation and PoC development for their own malware projects.

You can check out the UCL / Raytheon documents over on the WikiLeaks website.

Read more:
WikiLeaks: CIA analyzed Russian and Chinese malware to inspire its own hacking and surveillance tools - BetaNews

5 New CIA Malware Unveiled By WikiLeaks HTTPBrowser, NfLog, Regin, HammerLoss, Gamker – Fossbytes

Short Bytes: As a part of the ongoing CIA Vault 7 series, WikiLeaks has published some new documents. The leaks share details regarding CIAs partnership withRaytheon Blackbird Technologies, which helped CIA with insights into the malware development. The documents also briefly describe 5 CIA-Raytheon malware and their attack vectors.

The leaked documents were submitted to the CIA between 21st Nov2014 and 11th Sep2015. The documents submitted by Raytheon contained proof-of-concept assessments for malware attack vectors.

It should be noted thatRaytheon acted as a technology scout for CIAs Remote Development Branch (RDB). The scout made recommendations to the CIA teams for further research and malware development.

So, without further delay, lets tell you about the 5 CIA-Raytheon malware described in the leaked documents:

The first document gives an introduction to a new variant of the HTTPBrowserRemote Access Tool (RAT). The malwares dropper has a zip file that contains3 files. This RAT captures keystrokes and writes it to a file. It continuously talks to the C&C (command and control) server in clear text communications.

NfLogRAT is also known as IsSpace. This new malware variant is deployed using the leaked Hacking Team Adobe Flash exploit which uses CVE 2015-5122. For C&C communications, NfLog also uses the Google App Engine. By using UAC bypass technique, it attempts UAC bypass and privilege escalation on Windows operating system.

Reign is a sophisticated malware sample that has been in use as early as 2008, with its new iteration appearing in 2013. What makes Reign special is its modular architecture that grants flexibility to the attackers. It also features the capability to hide itself from detection. The attack via Reign is carried out in 5 stages, with the last granting functionalities like file system access, networking, event logging, port loading, rootkit functions, etc.

HammerToss is probably a Russian-sponsored malware. It leverages compromised websites, GitHub, Twitter accounts, and cloud storage for taking care of theC&C functions. Written in C#, HammerToss uses a dedicated program to create new Twitter accounts and use them to execute commands and get the data uploaded by the victim.

Gamker is an information stealing Trojan that uses the process of self-code injection to make sure that nothing is written to disk. Gamker is also able to gain someobfuscation characteristics by using Assembly language instruction in hooking routine.

Have something to add to this story? Dont forget to share your views with us.

Source: WikiLeaks

Read our complete WikiLeaksVault 7 coverage here.

Here is the original post:
5 New CIA Malware Unveiled By WikiLeaks HTTPBrowser, NfLog, Regin, HammerLoss, Gamker - Fossbytes

CIA chief Mike Pompeo: Russia loves to stick it to America – CBS News

ASPEN, Colo. -- CIA Director Mike Pompeo said Thursday Russia has no plans to leave Syria and will continue to try to meddle in U.S. affairs to "stick it to America."

He reiterated his belief that Russia interfered in the U.S. presidential election and described the U.S.-Russia relationship as "complicated."

"I think they find anyplace that they can make our lives more difficult, I think they find that's something that's useful," he said

Pompeo also said he has seen only minimal evidence that Russia has pursued a serious strategy against Islamic State of Iraq and Syrica (ISIS) militants in Syria. He said any suggestion that Russia has been a U.S. ally in Syria is not borne out by what's happening on the ground.

But Pompeo said he was hopeful there will be places in the world where the U.S. and Russia can cooperate on counterterrorism.

He said it's difficult to imagine a stable Syria with President Bashar Assad still in power. He called Assad a "puppet of the Iranians," who now have a "significant foothold in Syria."

Russia will stay in Syria, he said, because it loves its naval port in Tartus, off the Mediterranean Sea.

The CIA director spoke in a wide-ranging conversation at the Aspen Security Forum, an annual gathering of intelligence and national security officials and experts in Aspen, Colorado.

He said the Trump administration is working on ways to push back against Iran, which wants to be a "kingpin" in the Middle East.

Pompeo continued his criticism of the Obama administration's nuclear deal with Iran. The Trump administration recently confirmed that Iran had met its obligations under the deal but warned it would face consequences for breaching "the spirit" of the accord - a reference to Iran's continued pursued of a ballistic missile program.

When it comes to Iranian compliance with the agreement, Iran is a "bad tenant," Pompeo said. He likened their compliance with a renter who doesn't pay rent until the landlord demands it and then sends a bad check. He noted that President Trump has been working with Gulf states and Israel to find a common way to push back against Iranian aggression in the region.

What won't work is appeasing Tehran or forcing them into compliance, he said.

"When we have our strategy in place, I'm confident you will see a fundamental shift in policy" toward Iran, Pompeo said.

Pompeo also addressed the threat from North Korea and said Mr. Trump asks questions about Pyongyang nearly every time he sees him.

"It is at the front of his mind," Pompeo said.

It's one thing for Pyongyang to have a missile that can harm the United States and another for it to have an arsenal of such weapons, he said, adding that things can be done to narrow its capacity to develop a stockpile.

While some people believe North Korea's leader is irrational, Pompeo said he is convinced Kim Jong Un understands his core mission - "which is to keep himself in power."

While he avoided saying the U.S. might favor a regime change, Pompeo said he's "hopeful that we will find a way to separate that regime" from its nuclear capabilities.

"The North Korea people - I'm sure are lovely people - and would love to see him go as well. You know they don't live a very good life there," Pompeo said.

On another issue, Pompeo said he believes WikiLeaks will "take down America any way it can." He noted that the anti-secrecy group's website urges students to become CIA interns so they can become whistleblowers.

Pompeo acknowledged that Donald Trump said during the presidential campaign that he loved WikiLeaks.

"I don't love WikiLeaks," Pompeo said.

Besides Edward Snowden, a former National Security Agency contractor who leaked documents revealing extensive U.S. government surveillance, WikiLeaks has released nearly 8,000 documents that it says reveal secrets about the CIA's cyberespionage tools for breaking into computers. WikiLeaks previously published 250,000 State Department cables and embarrassed the U.S. military with hundreds of thousands of logs from Iraq and Afghanistan.

See the original post here:
CIA chief Mike Pompeo: Russia loves to stick it to America - CBS News

How Not to Catch the Next Reality Winner – The American Conservative

Once upon a time one applied for a government position that required a clearance with the expectation that in three or four months the process would be completed and the authorization would or would not be issued. I experienced the drill on three occasions for top-secret clearances, once for the Department of Defense (DOD) and twice for the Central Intelligence Agency (CIA). Each government agency then managed its own security, and largely does today, in spite of last years creation of the National Background Investigation Board. A subsidiary of the federal governments Office of Personnel Management, the board was intended to coordinate and resolve a massive backlog of clearances. Currently the processing delay in issuing more than 70,000 pending top-secret clearances is approaching one year and there is also a large backlog of existing clearances that are up for reauthorization and under review.

Back in my time there were major differences in how the various national-security components ran their background investigations. The DOD clearance was largely document driven, relying on police reports and public records from the various jurisdictions that I had lived in supplemented by a brief personal interview with the chief of police in the town in New Jersey where I had spent the most time. That pretty much was it and the check did not even include confirmation of the university degree that I claimed to have, as no one asked for my approval to obtain that information. The investigator clearly was looking for illegal activity and did not appear to be particularly interested in confirming that I was who I said I was.

One particular sticking point with the military was the concern over my father rather than me. He was a naturalized citizen and the investigation absolutely required production of the original document confirming that fact, which we were eventually able to produce. It struck me as odd that one part of the government could not have asked another part to confirm the information, but that was the case back then and apparently is still the case now. There is little reciprocity between agencies and information is not routinely shared.

One of the reasons why is that each agency has a different perspective on what is important and what isnt. CIA clearances were quite different than those carried out by the Army. They required a polygraph examination at an early stage and the background checks were very thorough, including interviews with bosses from summer jobs while I was in college as well as of people I knew while I was at school. There were a number of questions about possible homosexuality both directed at friends and as part of the poly, which, of course, would not be allowed today. Public records were, of course, reviewed, as were credit reports. FBI clearances went through a similar vetting, though the polygraph exam was not mandatory in all cases. For CIA there were also follow-up reviews every five years or thereabouts, though they generally consisted of another polygraph exam with particular attention paid to concealed foreign contacts and relationships, both amorous and espionage related.

A big difference between background checks back then and now was that the investigations were initially conducted by the office of security of the actual component that one was intending to work for. Today the investigations are nearly all conducted by contractors, who are themselves hungry for a piece of what has become a multi-billion dollar business. These companies are developing highly sophisticated security software to constantly update government files on its employees.

There are nearly five million United States government employees with clearances. Since Bradley Manning and Edward Snowden, there has been considerable demand from Congress to reduce that number. But the national security industry is, if anything, slated to grow under President Donald Trump. The White House has added its own concerns over politically motivated leakers of classified information and would like to see mechanisms in place that continuously monitor activity by clearance holders to reveal who might have engaged in unauthorized exposure of the sensitive information that has wound up in the Washington Post and New York Times.

But instead of limiting the access to classified information, there has been instead a push for increased and even continuous monitoring of those who have clearances to avoid what are described as insider threats. Software fixes are already in place at some agencies to scour public records and also in some cases redline users who have repeated access to certain types of files that are not directly germane to their work. As we have seen in the recent case of claimed whistleblower Reality Winner, printers connected to classified computers have features that enable identification of the actual user when there is a leak.

Using computers to continuously monitor cleared employees generally employs a variation on software that has already been developed for commercial users, including air carriers, where there is high risk and major liability if an employee is responsible for a violent incident. The special software constantly reviews criminal and civil files, such as divorce filings, bankruptcies, traffic violations, unreported foreign travel, and credit reports, to identify red flags that might result in unacceptable or even aberrant behavior on the part of the employee or prospective employee. Spies are notoriously motivated by money (Aldrich Ames, Robert Hanssen) and careful review of their credit reports might have revealed that they were financially stressed before they took the step of selling secrets to the Soviet Union. Washington Navy Yard shooter Aaron Alexis, who killed 12 people in September 2013, reportedly was the subject of a Rhode Island police report that revealed that he had been hearing voices shortly before he went on his rampage.

Monitoring ones civil and criminal record is not particularly easy to do, as much of the information is only available at state or even county and local levels and not all of it is online. Even though most of the information that is being screened by the government computers is public record and therefore fair game, there is concern that while something like a bankruptcy or a foreign trip is verifiable fact, other information might be either uninterpretable or completely lacking context. Even public databases frequently contain inaccurate information, including what is referred to as false negatives and false positivesand yet if they appear to cross an employer red line, they become part of the personnel file. Some of it is certainly information that once upon a time would have been regarded as both private and sensitive, such as a credit report, even though applicants for security clearances customarily waive any right to privacy when they are being background investigated.

And there is also increasing pressure coming from government managers to begin screening social media to determine if individuals are becoming disgruntled or otherwise developing hostile attitudes towards their employer. To complain about ones job or express unpopular opinions would not exactly be criminalized but it would inevitably become an element in consideration of ones ability to move upward in the organization, even if that is not the intention.

The bottom line is that no one has yet made the case that the continuous monitoring of five million security clearance holders would actually reduce espionage and insider threats. It is clear, however, that it would be enormously expensive and is therefore being pushed hardboth by prospective contractors offering their services and also hardliners in government who seek to have such a weapon in their arsenal to catch spies, leakers, and malcontents. Critics observe that while aggressive monitoring quite possibly might discover an individual instance where someone could appear to be in one of those at risk categories, most individuals who are moving in that direction do not necessarily allow their inner thoughts or hidden activities to become either part of the public record or an entry on Facebook.

And the greatest danger of all is over the horizon. Once the government discovers a new technology to intrude on the lives of ordinary citizens, a pretext will no doubt be developed after the next terrorist incident or insider attack to use it in ever widening circles as new threats are allegedly discovered. When that happens, we can confidently expect Patriot Act III, with a provision allowing continuous surveillance of any and all possible suspects. And there is actually a precedent. Back in 2003, the Pentagon under George W. Bush was already tinkering with what if referred to as Total Information Awareness to examine predictive behavior, described at the time as the biggest surveillance program in the history of the United States.

Total Information Awareness was briefly implemented before being abandoned 14 years ago. Today the technical resources available are much more impressive, with the ability to have a fully automated process that can monitor, store, and recover billions of pieces of data in real time. It means that achieving continuous monitoring for everyone who resides in or travels to the United States is now a reality. Every American will become a potential victim and part of an Orwellian nightmare as a substantially mythical national security narrative trumps privacy concerns and constitutional rights. And the government, to quell any concerns, will continue to insist that what it is doing is only done to make you safer.

Philip Giraldi, a former CIA offier, is executive director of the Council for the National Interest.

Read more here:
How Not to Catch the Next Reality Winner - The American Conservative

What it’s like to turn the camera on Snowden and Assange – PBS NewsHour

JUDY WOODRUFF: Now to another in our Brief But Spectacular series, where we ask people to describe their passions.

Tonight, we hear from Academy Award-winning documentary filmmaker Laura Poitras. Her latest film is Risk, which looks at WikiLeaks and Julian Assange.

LAURA POITRAS, Documentary Filmmaker: Its a bit surprising that I do documentaries, because I consider myself to be a really shy person.

And theres something about the documentary form that I guess it sort of it kind of gives you an invitation, maybe, to go places you wouldnt go otherwise or to take risks you wouldnt take otherwise.

My filmmaking is kind of comes in a tradition of observational cinema or cinema verite. Legendary founders of it is D.A. Pennebaker, Albert Maysles, Frederick Wiseman. They capture human stories. They capture drama, and they capture history as it unfolds.

When you talk to people and who they tell you who they are is oftentimes different than their actions. And so Im interested in peoples actions and choices.

So, for instance, sitting in a hotel room with Edward Snowden, as hes making this monumental decision to leak this information, is an example of the type of cinema that Im interested in doing.

The last two films I have done, Citizenfour and Risk, I became a participant. There were things that were happening that were happening because of work that I was doing, reporting on the NSA.

I mean, if you expose the deepest levels of intelligence agencies, they do tend to pay attention to what youre doing. I was placed on a government terrorist watch list in 2006, and was detained at the U.S. border for probably 50 times, interrogated. I have had computers confiscated. I have had notebooks photocopied.

They have subpoenaed my records. They would send FBI agents to my film screenings to see what I said in Q&As.

MAN: Theres a filmmaker named Laura Poitras. Laura Poitras is known through the defense community as a documentary filmmaker who is anti-U.S.

LAURA POITRAS: I became really interested in WikiLeaks and Julian Assange in 2010, like a lot of people, first when they published the video of Collateral Murder, the Apache helicopter footage that showed killings of Iraqis, by U.S. military.

And having made a film about the war in Iraq, I knew that this was the kind of thing that was happening every day there. I reached out to WikiLeaks and Assange during that time and then started filming in 2011.

And I was interested in how they were changing journalism. I had somewhat of a falling out with him over the film, where he wanted me not to use scenes in the film.

One of the scenes that Julian wanted removed from the film is the scene where his lawyers are giving him advice about how to speak publicly of around these allegations of sexual assault.

JULIAN ASSANGE, Founder, WikiLeaks: Its just a thoroughly tawdry, radical, feminist, political positioning thing. Its some stereotype.

LAURA POITRAS: I still have enormous respect for, like, the project of WikiLeaks and its importance, because I think they have done extraordinary publishing.

Im always interested in access. Like you know, like, I would love to have access to Robert Muellers investigation into Donald Trump, or James Comey.

But I think those are going to be pretty tough to get access to that. But, yes, Im really looking forward to like the really good documentary thats capturing whats happening right now in our politics.

I hope its being documented by someone.

My name is Laura Poitras, and this is my brief take on documentary filmmaking.

JUDY WOODRUFF: And you can watch additional Brief But Spectacular episodes at pbs.org/newshour/brief.

Read more:
What it's like to turn the camera on Snowden and Assange - PBS NewsHour