Young people don’t want to become spies

This video says about itself:

Welcome to Haven: Snowden launches spy-blocking smart phone app

26 December 2017

A new app developed by NSA whistleblower Edward Snowden promises to harness the surveillance power of your smart phone and turn it into a tiny security system to physically guard your data. Read more here.

Translated from Dutch NOS radio today:

For the British intelligence service GCHQ finds it more and more difficult to recruit staff, because well-trained cyberspecialists more often opt for better paid jobs at tech giants like Facebook and Google. They pay up to five times more than the government, according to a study by a British parliamentary committee.

The GCHQ (Government Communications Headquarters) says they need more and more staff …

The staff shortage among cyberspecialists at the GHCQ is around 20 percent. In 2016, 51 experts worked at the service and by 2018, according to the service, they should be 110. …

The intelligence services in the Netherlands also find it difficult to find staff. The military spying service MIVD also said early this year that a lot of young talent chooses to work in business.

“After all the revelations by, for example, Snowden, which exposed secret spying activities of the American intelligence service NSA, many cyberspecialists in training have their reservations about being hired by national intelligence services. Do I really want to work for such an organization? they think”, says [Delft university cybersecurity professor] Van Eeten in the NOS Radio 1 news.


British, Dutch governments spying on citizens

This 2014 video is called NSA whistleblower Edward Snowden says UK surveillance law “defies belief” | Guardian Interview.

By Julian Vigo in Britain:

British and Dutch states challenged on snooping

Thursday 23rd November 2017

As Liberty in the UK and Sleepwet in the Netherlands challenge the extent of state surveillance, JULIAN VIGO calls for public advocacy and local activism to protect the rights of privacy

The UK’s new web spying rules are taking shape despite the legislation governing it, the Investigatory Powers Act (IPA), having become law late last year. There is so much left unresolved about what this Act represents.

For instance, the IPA, also known as the “snoopers’ charter”, represents a massive extension of the surveillance power of the state. It requires internet companies to keep customers’ web traffic history for 12 months.

It also gives spying agencies and police powers the ability to conduct the mass hacking of IT infrastructures, personal computers, smartphones and any electronic device.

Just a year ago, National Security Agency (NSA) whistleblower Edward Snowden labelled this as “the most extreme surveillance in the history of Western democracy. It goes further than many autocracies.”

So why are the British not reacting?

The Dutch are set to have a national referendum about similar mass-surveillance after opponents of this “dragnet law,” or Sleepwet, gained enough signatures to demand a public vote.

According to Dutch law the government must hold a non-binding referendum on any issue if the country’s voting commission receives 300,000 signatures in request of such a vote. The campaigners of Sleepwet got over 417,000 signatures of which, the commission said, 384,126 were valid.

The regulator recommended in October that the referendum should take place on March 21 in order to coincide with municipal elections.

In July of this year, the Dutch senate cleared the Intelligence and Security Agencies Act which is quite similar to the UK’s Investigatory Powers Act.

It expands the governments’ powers to monitor all the data which moves through the country’s internet infrastructure.

Like the IPA, this law would also grant the government broad device-hacking powers, which means, practically speaking, that the government would have the legal authority to hack an entire town if it so chooses.

The organisers of Sleepwet claim that they are not trying to abolish the law, but they insist that there needs to be a legal basis for any targeted surveillance and they worry about the infringement of the basic rights to privacy and security.

As in the UK, one of the major concerns is the “untargeted interception of cable traffic and automated analysis of that data, which is basically mass surveillance,” according to Nina Boelsums, one of the five university students who initiated the call for a referendum.

Boelsums also calls into the question the hacking of third parties which she calls “an incentive for the intelligence agencies to collect zero-day vulnerabilities,” adding, “security experts are worried that that will actually make us less secure.”

What this also means is that data from all personal social media accounts, banking details, online purchases, social media, and personal information (ie sexual preferences, where your children go to school, etc) will be accessible to the government.

Like Sleepwet in the Netherlands, Liberty in the United Kingdom received more than 200,000 signatures on a petition calling for the repeal of the IPA after it became law last year.

Liberty has launched a legal challenge against the British government and this summer received the go-ahead from the High Court to challenge part of the government’s extreme mass surveillance regime with a judicial review of the IPA.

While groups like Amnesty International have called for an end to such legislation in the UK, they have been equally active in the Netherlands where the referendum was welcomed as a victory, albeit temporary, over the mass surveillance of people who pose no threat to national security.

The outcomes of Liberty’s lawsuit in the UK and Sleepwet’s referendum in the Netherlands are yet to be seen. But it will take public advocacy and local activism if we are to protect the basic rights of privacy and freedom from surveillance.

United States NSA-derived malware damaging Internet again

This video says about itself:

28 June 2017

The latest cyberattack has spread rapidly across the world, affecting banks, retailers and major energy firms. Experts say ransomware known as Petya appears to be behind the computer meltdown. And whistleblower Edward Snowden says the US government [the NSA] developed the sophisticated hacking tools that are being used in this attack. Sara Firth reports.

By Kevin Reed:

Petya ransomware attack shuts down computers in 65 countries

29 June 2017

In the second massive cyberattack in 44 days, both originating from malicious software developed by the US National Security Agency, personal computers in at least 65 countries were shut down Tuesday by an epidemic of ransomware known as Petya.

The attack had its greatest impact and first manifestation in Ukraine, where an estimated 12,500 computer systems were infected. Initial reports of the malware came when Ukrainian computer users attempted to update their copies of the tax and accounting software MeDoc. From there, the ransomware spread quickly all over the world, with major outages reported in Belgium, Brazil, Germany, Russia and the United States.

Among the corporations hit by the attack were the American pharmaceutical giant Merck, the British advertising agency WPP, the French multinational Saint-Gobain, the Russian steel and mining company Evraz and the Australian factory of the chocolate company Cadbury. In Ukraine, government ministries, ATMs and transit and airports systems were paralyzed and workers at the Chernobyl nuclear disaster site were forced to monitor radiation levels manually because their computers became inoperable.

In the US, Heritage Valley Health Systems, a Pennsylvania health care provider, was forced to cancel operations at its hospitals in Beaver and Sewickley due to the computer outage caused by Petya. According to some security experts, the latest ransomware attack represents a more sophisticated and lethal application of the malware than previously encountered.

The Petya ransomware causes computers to stop functioning and brings up a red screen with white letters that says the hard disks on the system have been encrypted with “military grade encryption.” The files on the system will be restored, the message explains, only in exchange for a payment of $300 in bitcoin electronic currency to a specified email address. It is not clear if making the ransom payment leads to the restoration of file access.

Once cybersecurity experts identified the email account, it was shut down.

The virus attacks Windows-based computers by taking advantage of the EternalBlue vulnerability. EternalBlue is known as an “exploit” or “bug” in the Windows operating system that can be used to cause unexpected behavior. Although Microsoft had released security updates to address the EternalBlue issue when they became aware of the problem last March, the latest attack is a “new variant” of Petya that can circumvent previous software patches.

Once a single system has been infected, the ransomware has the ability to move from computer to computer on a network without users doing anything. The Petya virus also has the ability to utilize unprotected machines to access networking features and infect machines that have been previously protected. Because of these innovations, some security experts are referring to the new ransomware as GoldenEye.

It is well known that the EternalBlue exploit was developed by the NSA as part of its arsenal of cyberwarfare weaponry for use against the rivals of US imperialism. Due to a combination of recklessness and stupidity, however, the NSA’s arsenal servers were hacked earlier this year and the tools were stolen by as-of-yet unidentified hackers.

In April, an Internet group known as Shadow Brokers published information about the NSA arsenal, including details about exploits that take advantage of vulnerabilities in enterprise firewalls, anti-virus products and Microsoft software.

The Petya attack comes less than two months after the outbreak in early May of the WannaCry ransomware, which spread around the world in a similar manner. In that instance, the malware shut down hundreds of thousands of computers in more than 150 countries.

So far, the NSA has not acknowledged any responsibility for the malware code that has now disrupted the economy in countless countries and endangered the lives of millions of people on two separate occasions. Computer security experts are coming forward in increasing numbers to demand that the NSA work with specialists to help defend computer systems from the destructive mayhem that the agency has unleashed upon society.

Mexican government uses malware to spy on journalists and political opponents: here.

WannaCry ransomware, ‘thank you’, NSA!

This 15 May 2017 video is about WannaCry ransomware and NSA whistleblower Edward Snowden.

By Andre Damon in the USA:

The global ransomware attack and the crimes of the US spy agencies

16 May 2017

Over the past four days, some 350,000 computers have been infected by the so-called “WannaCry” malware, including 70,000 devices such as MRI scanners, blood storage refrigerators and operating equipment used by Britain’s National Health Service. As a result of the attack, the NHS was forced to turn away emergency room patients and divert ambulances, potentially resulting in serious illnesses and even fatalities.

The worm is a piece of “ransomware” that encrypts users’ data until the creators receive a payment. It uses “exploits” developed by the US National Security Agency as just a small part of the NSA’s catalog of hacking tools.

When NSA researchers discovered the vulnerability in the Windows operating system targeted by “WannaCry,” they refused to inform Microsoft. The company found out about the existence of the vulnerability only shortly before the general public, when it was leaked by the Shadow Brokers hacker group on April 14 of this year.

On Saturday, Microsoft President Brad Smith, in a tersely worded blog post, faulted the NSA for failing to share its knowledge of the exploit. “This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem,” he wrote, adding that “this most recent attack represents a completely unintended but disconcerting link between the two most serious forms of cybersecurity threats in the world today—nation-state action and organized criminal action.”

He concluded, “We need governments to consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits.”

Microsoft is far from blameless when it comes to the NSA’s operations. It has established a standing practice of reporting bugs to the US government before they are repaired and publicly acknowledged, allowing the NSA to use these vulnerabilities to break into systems.

Regardless, Smith’s statement represents a stinging indictment of the operations of the US intelligence apparatus, implying that its actions are only once removed from those of criminals.

The hacking tools used in the “WannaCry” malware serve an even more malevolent purpose than any ransomware: illegal spying on the population of the whole world as part of a systematic practice of subversion and cyber aggression.

In May 2013, NSA contractor Edward Snowden revealed that the US intelligence apparatus collects, processes, reads and catalogs a vast quantity of private communications, both in the United States and internationally. Snowden explained that the stated aim of the NSA, the “signals intelligence” arm of the US intelligence apparatus, is unfettered access to all private information. Its mottos are, according to a leaked internal presentation, “Collect it All,” “Process it All,” “Exploit it All, “Sniff it All” and “Know it All.”

Illegal domestic surveillance operations authorized by the Bush administration after 9/11 resulted in the vastly expanded scale of government spying that was exposed by Snowden. With the collaboration, both voluntary and coerced, of the major telecommunications companies, the US government was able to vacuum up nearly all phone conversations, email and chat messages exchanged on digital devices.

In subsequent years, common communications platforms substantially improved their security capabilities, with nearly all Internet communication systems enabling encryption by default. These developments prompted US intelligence officials to complain of the Internet “going dark” to the NSA and CIA, prompting repeated calls by politicians, including Democratic presidential candidate Hillary Clinton, to criminalize the use of encryption.

The NSA responded by vastly expanding its use of “Tailored Access Operations,” the arm of the NSA devoted to “computer network exploitation,” commonly known as hacking. The agency adopted the slogan, “Your data is our data, your equipment is our equipment—anytime, any place.”

The NSA worked to build up a catalog of cyber weapons, known as “exploits,” which allow it to easily break into almost any Internet-connected device. One internal NSA document from 2012 claimed that the NSA worked with the largest telecommunications and technology companies in the world to “insert vulnerabilities into commercial encryption systems, IT systems, networks and endpoint communications devices used by targets.”

The NSA’s massive team of security researchers—the largest in the world—also worked to discover and exploit vulnerabilities within existing products, keeping these bugs a secret from manufacturers in order to allow the NSA to exploit them to gain access to computers, networks and Internet-connected devices before other researchers could discover them and recommend fixes to manufacturers.

In addition to using these tools to carry out mass surveillance, the NSA weaponized them in order to carry out cyberattacks against Washington’s geopolitical adversaries. The most notorious of these efforts was the release of the Stuxnet worm in 2010, which ruined some 1,000 Iranian nuclear centrifuges. The cyberattack was coordinated with a series of car bomb murders, attributed by the media to the US and Israel, which killed at least three Iranian nuclear physicists.

The fact that over 70 percent of the initially reported “WannaCry” infections took place in Russia raises the very real possibility that the current disaster is the result of a Stuxnet-like cyberattack by the United States. The other country disproportionately affected was China.

Speaking in Beijing on Monday, Russian President Vladimir Putin said, “As for the source of these threats, Microsoft’s leadership stated this directly. They said the source of the virus was the special services of the United States.”

White House Homeland Security adviser Tom Bossert declared that finding those responsible for cyberattacks is “something that sometimes eludes us. Attribution can be difficult here.”

Bossert’s statement contrasts sharply with the declaration by the director of national intelligence in October 2016 that the US spy agencies were “confident that the Russian Government directed… recent compromises” of emails related to the Clinton campaign.

That declaration was part of a vast campaign by the Democratic Party, the media and much of the political establishment aimed at demonizing Russia by claiming it had “hacked” the 2016 US elections. As part of that campaign, media outlets, led by the New York Times, sought to present Russia as a global hacking powerhouse, subverting the spotless US electoral system.

One can only imagine what would have happened if, instead of the current malware attack mainly affecting Russia and largely bypassing the US in its initial stages, the situation had been reversed. The media would be up in arms about Russian “hackers,” with demands that the Trump administration retaliate with sanctions, cyberattacks and more menacing military moves. The Democrats would be in the forefront of calls for new war-mongering resolutions in Congress.

An examination of the facts exposed by the “WannaCry” attack, however, show that the world’s biggest band of cyber criminals by far is headquartered in Washington, D.C.

The cyberattack that hit some 200,000 computers around the world last Friday, apparently using malicious software developed by the US National Security Agency, is only expected to escalate and spread with the start of the new workweek: here.

What accounts for the success of the WannaCrypt ransomware attack on Britain’s National Health Service? Here.

Microsoft blames NSA for Wannacry ransomware scandal

This video says about itself:

13 May 2017

See what NSA whistleblower Edward Snowden had to say on WannaCry ransomware cyber attack that infected servers in more than 100 countries.

After non-establishment Edward Snowden and non-establishment WikiLeaks blamed the United States NSA for the present Wannacry ransomware worldwide attacks on computers scandal, now Microsoft agrees. Microsoft, very much part of the establishment and sometimes collaborators with the NSA and other spying government agencies.

Translated from Dutch NOS TV:

Microsoft: NSA should have reported leak earlier

Today, 09:17

The Wannacry ransomware that holds the ICT world to ransom ever since Friday actually uses a leak [in Microsoft Windows] discovered by the US secret service NSA. Microsoft confirms this. Many security investigators had already drawn that conclusion.

It is a security issue used by the NSA to hack suspects. However, because the secret service kept this secret, computers of innocent civilians and organizations continued to be vulnerable to attacks.

Leak leaked

Last month, a package of NSA digital weapons was leaked, where that leak [in Microsoft Windows] was part of. Researchers feared that malicious people would abuse that. Although Microsoft has been patching up this issue, businesses and consumers who have not updated their computers are still vulnerable.

Microsoft is not happy that the NSA has kept the leak secret. As a consequence, the security issue was not resolved earlier. “This shows the danger of governments collecting [computer] security issues.” Governments worldwide should see this as a wake up call and think better about using digital weapons, Microsoft says.


In the Netherlands, the AIVD secret service also collects security issues in software to target targets. The government also wants the police to have the power to hack suspects. The Dutch House of Representatives will soon be discussing this. Critics fear that maliciously-collected leaks will also be exploited by malicious people, as happened to the NSA.

This video says about itself:

WannaCry Ransomware in Action | NSA Exploit based

13 May 2017

WannaCry or WannaCrypt0r, a new ransomware based on an NSA exploit, has been taking over several computers since the last couple of days (May, 2017). As usual it encrypts user files, and demands a ransom payment in bitcoin for decryption. Airports, businesses, govt. organizations, universities, health services (like NHS) and even the Russian Internal Affairs department are affected. Over 99 countries are under siege including Russia, Germany (most of Europe), China, US.

Make sure you have backups of important data on a separate external drive and don’t forget to patch your systems, cause the NSA vulnerability has been fixed by Microsoft via updates.

From News Line daily in Britain:

Monday, 15 May 2017

NHS held to ransom by cyber terrorists – Hunt must resign and the Tories must be sacked on June 8th!

ON FRIDAY afternoon a terrorist cyber attack was launched on the NHS in England and Scotland that brought it to a standstill in many areas, a standstill that is still continuing. The terrorists encrypted vital NHS patient information to prevent doctors having access to it so that patients’ lives were directly threatened with their operations unable to take place!

Apparently, the ransom demands were for £230 in Bitcoins, so the likelihood is that the NHS, the great gain and pride of the British people is being held to ransom by a gang of amateur robbers!

One would think that the government would die of shame at what has happened, but it marches brazenly on, as if nothing has happened except that Health Secretary, Jeremy Hunt, has gone into hiding, and we have been warned that more of the same is ahead.

The reality is that savage Tory NHS multi-billion cuts have seen hospitals cut and closed, and hundreds of thousands of beds ‘lost’. There are billions of pounds of more savage STP reorganisation cuts ahead, leading the way to NHS privatisation. The ongoing cuts have left the NHS not only understaffed and struggling to provide the service that it was intended for, it has left it with decades-old computers, a sitting duck, for the cyber terrorists who want to endanger patients lives for a handful of Bitcoins.

Health Secretary Hunt has spent the last 18 months harrying the junior doctors and forcing them to accept an imposed contract. He told them every day that their protests and refusal to work a seven-day service were endangering patients lives and even causing patient deaths! Now we see the essence of the situation. Cameron‘s, May‘s and Hunt’s cuts have not only left the NHS unable to function, they have allowed its security systems to become so completely outdated that the NHS could be held to ransom and patients lives threatened for a handful of Bitcoins! Their refusal to properly finance and secure the NHS has handed it over to terrorists which may well result in a number of patient deaths!

Hunt is directly in charge of the NHS, and must not be allowed to escape responsibility for the crisis that his policies have created. He must be made to resign at once! In fact on June 8th the Tory government itself must be held to account for the crime of allowing the cyber terrorists to hold the NHS for ransom by being sacked by the electorate. A Labour government must be returned that can be made to to carry out a policy of developing the NHS and not destroying it.

One thing that is missing in the present situation is any attempt to blame Putin and Russian hackers for the NHS security crisis.

This is because as the whistleblower Snowden has pointed out that responsibility for the terrorists getting the tools to do the job rests with the USA. Snowden is not alone in pointing out that the US National Security Agency allowed the terrorists to use an NSA tool codenamed EternalBlue that was one of several tools leaked by the Shadow Brokers hacking gang last month.

The tool exploits a vulnerability in Microsoft’s Server Message Block which allows attackers to crash systems with a denial of service attack. After scrambling computer files, the malware demands $300 (£230) in Bitcoin to restore documents.

Edward Snowden commented that: ‘Last month, the Shadow Brokers hacking group released documents containing vulnerabilities identified by the NSA and hacking tools developed by the intelligence agency to break into Windows computers. Shadow Brokers made the exploits public after the NSA left their arsenal of hacking tools on a server “in the wild”, allowing them to be picked up by any hacker who stumbled upon them.

Snowden raised the issue of whether the NSA would be liable for any consequent hack using the tools. The Shadow Brokers’ file dump included 23 new hacking tools named OddJob, EasyBee, EternalRomance, FuzzBunch, EducatedScholar, and others.

The tools are capable of breaking into computers running versions of the Windows operating system which are earlier than the most recent Windows 10. The way to proceed is to make Hunt quit at once, then sack the Tories on June 8th and then send the clean-up bill to the USA and its NSA for payment!

POST-CYBERATTACK, MONDAY COULD BE ROUGH “U.S. and European officials scrambled to catch the culprits behind a massive ransomware worm that caused damage across the globe over the weekend, stopping car factories, hospitals, shops and schools, as Microsoft pinned blame on governments for not disclosing more software vulnerabilities.” Here’s a look into what it takes to catch a cybercriminal and what to do if you’ve been attacked. [Reuters]

NSA malware causing worlwide ransomware attacks

This video says about itself:

21 March 2017

In a captivating video interview, Edward Snowden, who revealed secrets about U.S. National Security Agency spying activities, answers questions and talks about Russia, U.S. government, cybersecurity and how to deal with the latest security news in the U.S.

By Kevin Reed:

Worldwide ransomware attack linked to hacked NSA cyberwarfare arsenal

13 May 2017

A massive global cyberattack—likely caused by the spread of malware developed by the US National Security Agency as part of its cyberwarfare arsenal—hit computers around the world on Friday and rendered them inoperable. The malicious ransomware attacked computers in 99 countries and locked down their files while demanding that system administrators pay a fee of between $300 and $600 within six hours in exchange for regained access.

The malware, known as “WannaCry” or “WanaCrypt,” rapidly infected computers of organizations internationally such as the National Health Service in the UK, the Spanish telecom firm Telefonica and the US-based delivery service FedEx. Some news outlets reported that the bulk of the cyberattack on Friday took place in Russia, Ukraine and Taiwan. It was also reported that the malware disrupted the functioning of banks, transportation systems and other mission-critical operations around the world.

According to cybersecurity experts, the malware is targeting computers running Microsoft Windows. When downloading or clicking on an infected file or application, the malware exploits a security flaw in the operating system and proceeds to encrypt the files of the target system and then demands a payment in bitcoin (electronic currency) by a specified date in exchange for restoring access.

The ransomware is also a “worm,” which means that it is engineered for self-replication as far and wide as possible and aimed at being transferred to all computers connected with the host system.

Although Microsoft released a patch to fix the OS security vulnerability in March 2017, many users had not updated their systems in time and remained vulnerable to the ransomware. Meanwhile, those users that paid the demanded ransom are reporting that—rather than having file access restored—the malware demands a greater sum of money and threatens to delete all files on the system.

The outbreak of the viral ransomware is connected to the public release in April by the hacking group calling itself Shadow Brokers of a trove of NSA and CIA cyberwarfare documents and computer code. The group published what it described as documents stolen from an NSA server housing the complete arsenal of US cyberwarfare weapons that had been left poorly protected.

In March, the anti-secrecy website WikiLeaks released documents related to the malware theft in an effort to alert the cybersecurity community and the public that the software was being circulated in the black market and posed a significant threat. WikiLeaks’ Julian Assange called the theft of the cyberwarfare arsenal by hackers, “a historic act of devastating incompetence” by the US intelligence establishment.

Additionally, Assange and WikiLeaks exposed the fact that the US government was well aware that their inventory of malware, spyware, netbots, viruses and “Trojan horses”—the product of decades of CIA and NSA cyberwarfare preparations—had been stolen and did nothing to work with the computer industry or to notify the public about the theft of these items from their servers.

At that time, the corporate media around the globe also refused to warn about the dangers posed by the circulation of the malware code among hacker groups and others on the periphery of the US military-intelligence community. Rather than demand emergency action to protect the public from what is now unfolding, the subservient media continued its vilification of WikiLeaks and asserted false claims that the exposure of the criminal activity of the US government threatened national security and endangered the lives of security personnel.

United States filmmaker Laura Poitras persecuted for being smeared in Iraq war

This video from the USA says about itself:

Citizenfour” | Oscar winner Laura Poitras on Edward Snowden

18 February 2015

Citizenfour” has won the Oscar for best documentary. Director Laura Poitras talks about her subject Edward Snowden.

By Natasha Hakimi Zapata in the USA:

Director Laura Poitras Learns Why She Was Being Detained at Airports

Posted on Apr 24, 2017

For six years, “Citizenfour” filmmaker Laura Poitras was stopped at airports without an explanation. Recently, a lawsuit uncovered the startling reason.

From The Associated Press:

[Poitras] was stopped without explanation more than 50 times on foreign travel, and dozens more times on domestic trips, before the extra searches suddenly stopped in 2012. Only now is Poitras beginning to unravel the mystery, which goes back to a bloody day in Baghdad in 2004. … On Nov. 20, 2004, Poitras was in Baghdad filming “My Country, My Country.” The film depicts Iraqi elections from the perspective of an Iraqi doctor, who criticized the U.S. occupation yet hoped democracy would take root in his homeland.

Members of a U.S. Army National Guard unit from Oregon reported seeing a “white female” holding a camera on a rooftop just before they were attacked. David Roustum, 22, an Army National Guardsman from West Seneca, New York, was killed. Several troops were wounded. Some guardsmen who saw Poitras suspected she had a heads-up about the attack and didn’t share that information with American forces because she wanted to film it. If true, Poitras would have broken U.S. criminal law.

Poitras called the allegation false and said she didn’t film the attack.

Read more.

In a win for government-transparency advocates, the FBI has agreed to turn over records it created when it spied on two anti-war journalists and pay $299,000 to settle their attorneys’ fees: here.