Tag Archives: fbi

How Open-Carry Gun Laws Make Mass Shootings Even More Dangerous

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

America has now experienced two mass shootings in less than a year that have been complicated by open-carry gun laws.

As the deadly attack on police officers unfolded in Texas on Thursday, the Dallas Police Department publicized a photo of a “suspect” and solicited the public’s help finding him. The photo showed a man in a camouflage T-shirt with a rifle strapped over his shoulder who was participating in the peaceful Black Lives Matter protest where the attack took place.

About 40 minutes later, the Dallas PD announced that the man, now described as a “person of interest,” had turned himself in. He was interrogated and soon released, no longer suspected of any involvement in the attack. The man, Mark Hughes, was carrying his gun lawfully and has since received numerous death threats, according to his attorney. (Texas, like most states, allows rifles to be carried openly in public.)

The sequence of events involving Hughes underscores how citizens carrying firearms on display can compound the danger in a violent, chaotic situation. Last fall, several police chiefs in Colorado spoke out about the potential perils after authorities responded tepidly to a report of a man in Colorado Springs walking around with an assault rifle—just before he went on a deadly rampage.

“The problem that we all face is that we never have all the information,” said one chief after the Colorado Springs attack. Another noted that the police had no codified way for responding to such situations. In Colorado Springs, that may well have prevented a faster response to a lethal threat. In Dallas, clearly it could have endangered Hughes’ life and possibly those of others around him.

Gun lobbyists argue that arming more “good guys” is the solution to stopping mass shootings, but history shows that’s a myth. And police leaders, FBI agents, and other law enforcement officials have long said that ordinary citizens with guns will “divert them from the real threat.”

Read More:

How Open-Carry Gun Laws Make Mass Shootings Even More Dangerous

Posted in Citizen, FF, GE, LG, ONA, Radius, Uncategorized, Venta | Tagged , , , , , , , | Comments Off on How Open-Carry Gun Laws Make Mass Shootings Even More Dangerous

Here’s the Latest in the Annals of Prosecutorial Misconduct

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

Here’s a jaw-dropping entry in the annals of prosecutorial misconduct. Down in Miami, the US Attorney’s office tells defense attorneys to use a local shop called Imaging Universe when they make copies of discovery documents. Its owner, Ignacio E. Montero, then turns around and provides the government with a CD that contains everything the defense has copied:

Arteaga-Gomez the defense attorney phoned Montero on April 25 to ask who had told him to provide copies of the CDs to the government. Montero, the motion says, answered that an “agent” told his office manager to do it. “Mr. Montero then stated that he had been providing to the U.S. Attorney’s Office for the past 10 years duplicate copies of the discovery documents selected by defense counsel in other cases.”

Montero also forwarded to defense attorneys an April 21 email he sent to a healthcare-fraud paralegal in the U.S. Attorney’s Office, stating that he’d provided the Justice Department with duplicates of defense records “since 2006.” Montero added that both his old company, Xpediacopy, and Imaging Universe had done it.

….“The U.S. Attorney’s Office has admitted that Agent Deanne Lindsey had been receiving copies of the CDs and had been keeping the duplicate CDs in a folder as she received them,” the motion says. Lindsey also “confessed to opening four of those duplicate CDs” looking for files, copying and pasting files onto her own CDs and providing “those new CDs to the government’s expert witness for trial preparation,” the motion says.

The government’s response is apparently to claim that Lindsey, the FBI agent, was some kind of rogue operator, and prosecutors never saw any of this stuff. Maybe so. But then, that’s what they always say, isn’t it?

Visit site:  

Here’s the Latest in the Annals of Prosecutorial Misconduct

Posted in FF, GE, LAI, LG, ONA, Prepara, Uncategorized, Venta | Tagged , , , , , , , , , , , | Comments Off on Here’s the Latest in the Annals of Prosecutorial Misconduct

Conservatives Are Drooling Yet Again Over Hillary’s Email Account

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

Several years ago a Romanian hacker broke into the email accounts of several high-ranking US officials. One of the email accounts he hacked belonged to Clinton pal Sidney Blumenthal, and it was this hack that eventually led to the revelation that Hillary Clinton had a private email address.

In early April he was extradited from Bucharest, where he had been serving a seven-year prison sentence, and conservatives have been drooling with anticipation ever since. Well, guess what? It turns out the hacker claimed in a jailhouse interview that he had, indeed, downloaded “gigabytes” of Hillary Clinton’s email. Imagine that! Let’s listen in:

“It was like an open orchid on the Internet,” Marcel Lehel Lazar, who uses the devilish handle Guccifer, told NBC News in an exclusive interview from a prison in Bucharest. “There were hundreds of folders.”

….A source with knowledge of the probe into Clinton’s email setup told NBC News that with Guccifer in U.S. custody, investigators fully intend to question him about her server.

When pressed by NBC News, Lazar, 44, could provide no documentation to back up his claims, nor did he ever release anything on-line supporting his allegations, as he had frequently done with past hacks. The FBI’s review of the Clinton server logs showed no sign of hacking, according to a source familiar with the case.

Well, I’m sure he’s telling the truth, not just making up shit. Naturally Fox News is on the case with a more recent jailhouse interview:

Wearing a green jumpsuit, Lazar was relaxed and polite in the monitored secure visitor center, separated by thick security glass. In describing the process, Lazar said he did extensive research on the web and then guessed Blumenthal’s security question. Once inside Blumenthal’s account, Lazar said he saw dozens of messages from the Clinton email address.

Asked if he was curious about the address, Lazar merely smiled. Asked if he used the same security question approach to access the Clinton emails, he said no — then described how he allegedly got inside.

“For example, when Sidney Blumenthal got an email, I checked the email pattern from Hillary Clinton, from Colin Powell from anyone else to find out the originating IP. … When they send a letter, the email header is the originating IP usually,” Lazar explained.

He said, “then I scanned with an IP scanner.” Lazar emphasized that he used readily available web programs to see if the server was “alive” and which ports were open. Lazar identified programs like netscan, Netmap, Wireshark and Angry IP, though it was not possible to confirm independently which, if any, he used.

In the process of mining data from the Blumenthal account, Lazar said he came across evidence that others were on the Clinton server. “As far as I remember, yes, there were … up to 10, like, IPs from other parts of the world,” he said.

So there you have it. Not only did Lazar hack into the Clinton server, but nearly a dozen other hackers did too. And every single one of them, apparently, has said nothing about it until now. Nor have they released any actual hacked emails. And they were all able to do it without leaving behind even the slightest trace.

Nonetheless, the resident expert at Fox News called Lazar’s story “plausible.”

Sigh. I’m sure this will lead to yet another whirlwind of emailgate activity. Buckle your seat belts.

Visit site: 

Conservatives Are Drooling Yet Again Over Hillary’s Email Account

Posted in alternative energy, FF, GE, LAI, LG, ONA, solar, Uncategorized, Venta | Tagged , , , , , , , , | Comments Off on Conservatives Are Drooling Yet Again Over Hillary’s Email Account

The Supreme Court Just Made Government Hacking Much Easier

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

A Supreme Court ruling issued Thursday could make it much easier for the FBI and other federal law enforcement agencies to hack computers across the country, angering privacy advocates and drawing a rebuke from Sen. Ron Wyden (D-Ore.).

The court approved a change to Rule 41 of the federal rules of criminal procedure, which outlines how federal criminal cases are run. The current version of the rule says search warrants are only valid in the relatively small judicial districts where they were issued. Under the new rule, magistrate judges would be able to issue warrants that apply to computers throughout the country, allowing law enforcement officers to hack and infect them remotely. The change still has to be approved by Congress, which has until December 1 to reject or alter the rule change before it automatically takes effect.

The government says the change is necessary to keep up with wide-ranging computer networks and criminals who use tools to hide their physical locations online. Courts in Oklahoma and Massachusetts threw out evidence this month in two child pornography cases stemming from the government’s takeover of a dark-web site called Playpen, which it used to insert tracking tools into the computers of people accessing child porn. Because the order allowing the takeover was issued by a judge in Virginia, the judges in the two cases said, the evidence from the investigation could not be used elsewhere.

But privacy advocates say the rule change is an attempt by the government to expand its hacking powers without public debate. “Instead of directly asking Congress for authorization to break into computers, the Justice Department is now trying to quietly circumvent the legislative process by pushing for a change in court rules, pretending that its government hacking proposal is a mere procedural formality rather than the massive change to the law that it really is,” said Kevin Bankston, the director of the Open Technology Institute at the liberal-leaning New America Foundation, in a statement.

Sen. Ron Wyden also attacked the rule change as overly broad. “Under the proposed rules, the government would now be able to obtain a single warrant to access and search thousands or millions of computers at once; and the vast majority of the affected computers would belong to the victims, not the perpetrators, of a cybercrime,” he said in a press release. Wyden has promised to introduce a bill that would reverse the Supreme Court’s ruling.

See original article: 

The Supreme Court Just Made Government Hacking Much Easier

Posted in Anchor, Casio, Cyber, FF, GE, LG, ONA, Radius, Uncategorized, Venta | Tagged , , , , , , , , , , | Comments Off on The Supreme Court Just Made Government Hacking Much Easier

The FBI Spent More Than $1 Million to Hack One Potentially Useless Phone

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

It turns out the FBI’s 11-hour solution to its huge public fight with Apple didn’t come cheap.

FBI director James Comey said on Thursday that the agency paid more than $1 million to unnamed private-sector hackers for help in unlocking the iPhone of one of the San Bernardino shooters. The FBI first attempted to make Apple write software that would allow law enforcement to unlock the phone quickly, but the company refused and said the request could unconstitutionally expand government authority. The case sparked an uproar over digital privacy as well as a major court battle, which stopped only when the FBI announced it had received the hackers’ help and withdrew its order to Apple.

Comey, speaking at the Aspen Security Forum, didn’t give a specific price for the hack, but said it cost the agency more than he would make in the next seven years of his term as director. The FBI director makes at least $181,500 a year by law, putting the cost of the hack at a minimum of $1.27 million, by Comey’s estimate. An FBI press officer could not confirm the accuracy of Comey’s estimate or provide a specific cost.

“It was worth it,” Comey told the audience in Aspen. But it’s not clear how much value the hacking method or the phone actually has. Comey has repeatedly said that the method used to break into the phone would work only on an iPhone 5C running iOS 9, like the San Bernardino phone, and that Apple could discover and fix the security flaw that allowed the hack to work. And on Tuesday, CNN reported that the phone “didn’t contain evidence of contacts with other ISIS supporters or the use of encrypted communications during the period the FBI was concerned about.” The FBI argues the lack of information is valuable evidence in and of itself.

Link to original: 

The FBI Spent More Than $1 Million to Hack One Potentially Useless Phone

Posted in Anchor, cannabis, Casio, Everyone, FF, G & F, GE, LAI, LG, ONA, Radius, Uncategorized, Venta | Tagged , , , , , , , , , , , | Comments Off on The FBI Spent More Than $1 Million to Hack One Potentially Useless Phone

John Oliver Explains Why It’s So Crucial Apple Is Refusing the FBI’s Encryption Demands

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

On Sunday, John Oliver took on the FBI’s continuing demands for Apple to unlock a cellphone used by one of the San Bernardino shooters. Speaking largely on Apple’s side of the debate, the Last Week Tonight host explained the importance of encryption and broke down what’s at stake in the high-profile battle:

“There is no easy side to be on in this debate,” Oliver said. “Strong encryption has its costs, from protecting terrorists to drug dealers to child pornographers. But I happen to feel that the risks of weakening encryption, even a little bit, even just for the government, are potentially much worse.”

Even Sen. Lindsey Graham, who first came out strongly against Apple for refusing to comply with the FBI’s orders, recently admitted that upon further research, he’s realized the government’s orders could pose an enormous risk to Americans’ security.

“It’s just not so simple,” Graham told Attorney General Loretta Lynch during a hearing on the subject last week. “I thought it was that simple—I was all with you until I actually started getting briefed by people in the intel community and I will say that I’m a person who’s been moved by the arguments that the precedent we set and the damage we may be doing to our own national security.”

As Oliver notes, it’s a “miracle” Graham has finally grasped the concept of nuance.

See the original post: 

John Oliver Explains Why It’s So Crucial Apple Is Refusing the FBI’s Encryption Demands

Posted in Anchor, Everyone, FF, G & F, GE, LAI, LG, ONA, Radius, Uncategorized, Venta | Tagged , , , , , , , , , | Comments Off on John Oliver Explains Why It’s So Crucial Apple Is Refusing the FBI’s Encryption Demands

Will This Bill End the War Between the Government and the Tech Community Over Encryption?

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

The chairman of the House Homeland Security Committee will introduce a bill on Monday afternoon aiming to help solve the long-running fight between the government and the tech and privacy communities over encryption, which has made headlines recently thanks to the FBI’s attempt to force Apple to help unlock an iPhone used by one of the San Bernardino shooters.

The bill, which will be introduced by Rep. Michael McCaul (R-Texas) and is backed strongly by Sen. Mark Warner (D-Va.), would create a commission of 16 experts with a range of backgrounds—from cryptographers and intelligence officials to privacy advocates and tech executives—to “examine the intersection of security and digital security and communications technology in a systematic, holistic way, and determine the implications for national security, public safety, data security, privacy, innovation, and American competitiveness in the global marketplace,” according to text of the legislation that was provided to Mother Jones.

It’s part of a larger push to have the government and private sector work together to create new ways to solve the impasse over encryption and other digital security issues. While the government wants to be able to access encrypted devices and messages when needed, tech companies and cryptographers have said there is simply no current way to create such a backdoor for the government without also potentially giving that same access to cybercriminals and hackers. Hillary Clinton has called for a “Manhattan-like project” to square that circle, with other presidential candidates calling for similar public-private cooperation.

McCaul and the commission’s backers hope the panel may find a new, previously undiscovered way to reconcile the legal and technical demands of the two sides, but there appears to be little idea of what that could be. In conversations with lawmakers, privacy advocates, national security lawyers, and technologists, none were able to offer Mother Jones any concrete notion of what a solution may look like. Many members of the technology and privacy communities also view calls for more cooperation and discussion as disingenuous. They argue the technical questions are settled, and that more talking won’t solve anything—but may produce bad legislation that harms security and privacy. “‘They say they can’t do it, but let’s pass the legislation to find out, and I bet they’ll figure out the solution after we’ve mandated it.’ That seems like a bad idea to me,” Julian Sanchez of the libertarian Cato Institute told Motherboard last year.

Each party would get to nominate eight members of the commission, with each nominee coming from a different one of eight fields. Six of the slots would go to law enforcement and intelligence community representatives, with the other 10 given to tech business and economics experts along with two cryptographers and two members of the civil liberties community. The group would have a year to draft a final report, which would require the approval of 11 of the 16 members.

You can read the full text of the bill below:

DV.load(“https://www.documentcloud.org/documents/2725649-McCaul-Commission.js”,
width: 630,
height: 800,
sidebar: false,
text: false,
container: “#DV-viewer-2725649-McCaul-Commission”
);

McCaul-Commission (PDF)

McCaul-Commission (Text)

See the original post – 

Will This Bill End the War Between the Government and the Tech Community Over Encryption?

Posted in alo, Anchor, Casio, Cyber, FF, Gandhi, GE, LAI, LG, ONA, Radius, Uncategorized, Venta | Tagged , , , , , , , , | Comments Off on Will This Bill End the War Between the Government and the Tech Community Over Encryption?

Apple Challenges "Dangerous" Request to Help FBI Break Into iPhone

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

Responding a federal judge’s order last week that Apple help the FBI unlock the iPhone belonging to one of the San Bernardino shooters, the company shot back on Thursday with a challenge that accused the government of seeking a fix that is “too dangerous to build.”

The judge’s order mandated that Apple write new code allowing the FBI to enter an unlimited number of passwords on the phone’s lock screen without triggering the phone’s auto-erase feature. That request sparked a firestorm among people who felt the needs of the government were superseding the privacy and security rights of citizens.

Apple CEO Tim Cook insisted from the start of the controversy that complying with the FBI’s request would set a dangerous precedent, allowing the government to order companies to provide essentially any service needed to aid an investigation. The company repeated that argument in its challenge to the court order:

This is not a case about one isolated iPhone. Rather, this case is about the Department of Justice and the FBI seeking through the courts a dangerous power that Congress and the American people have withheld: the ability to force companies like Apple to undermine the basic security and privacy interests of hundreds of millions of individuals around the globe. The government demands that Apple create a back door to defeat the encryption on the iPhone, making its users’ most confidential and personal information vulnerable to hackers, identity thieves, hostile foreign agents, and unwarranted government surveillance. The All Writs Act, first enacted in 1789 and on which the government bases its entire case, “does not give the district court a roving commission” to conscript and commandeer Apple in this manner.

Apple says the demand for new code, which it’s calling “GovOS,” violates its First Amendment right to free speech. Courts have previously ruled that computer code is free speech, and Apple executives told reporters on a conference call that the company views an order to rewrite its code as coercion to adopt the government’s views on privacy and security. The company is also challenging the court order on the basis of the Fifth Amendment right to due process.

You can read Apple’s complete challenge below:

DV.load(“https://www.documentcloud.org/documents/2722221-Apple-Motion-to-Vacate.js”,
width: 630,
height: 800,
sidebar: false,
text: false,
container: “#DV-viewer-2722221-Apple-Motion-to-Vacate”
);

Apple-Motion-to-Vacate (PDF)

Apple-Motion-to-Vacate (Text)

Original source – 

Apple Challenges "Dangerous" Request to Help FBI Break Into iPhone

Posted in Anchor, Casio, Citizen, Everyone, FF, GE, LG, ONA, Radius, Uncategorized, Venta | Tagged , , , , , , , , , | Comments Off on Apple Challenges "Dangerous" Request to Help FBI Break Into iPhone

A Court Ordered Apple to Hack the San Bernardino Shooter’s Phone. Read Tim Cook’s Defiant Response.

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

Apple, the global tech giant, has confirmed it won’t help US law enforcement officials gain access to a cell phone belonging to one of the shooters in the San Bernardino attack last year, defying Tuesday’s US District Court order.

The central Californian court ordered Apple to provide the FBI with software that would help it hack Syed Farook’s phone, something that has stumped the agency since the shooting on December 2, 2015. Farook and his wife, Tashfeen Malik, killed 14 people and seriously wounded over 20 others in a shooting spree at a holiday party. The subsequent manhunt ended in their deaths. Farook’s inaccessible cell phone has become central in trying to understand the shooters’ motivations, their other connections, and how they became inspired by global terrorism.

According to the Associated Press, which first reported the story, the ruling “requires Apple to supply highly specialized software the FBI can load onto the phone to cripple a security encryption feature that erases data after too many unsuccessful unlocking attempts.”

But in a letter posted overnight, Apple CEO Tim Cook says the company will not comply—threatening to pit Apple against the FBI during future legal action. Cook wrote: “Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.”

Read the full letter below:

A Message to Our Customers

The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.

This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake.

The Need for Encryption

Smartphones, led by iPhone, have become an essential part of our lives. People use them to store an incredible amount of personal information, from our private conversations to our photos, our music, our notes, our calendars and contacts, our financial information and health data, even where we have been and where we are going.

All that information needs to be protected from hackers and criminals who want to access it, steal it, and use it without our knowledge or permission. Customers expect Apple and other technology companies to do everything in our power to protect their personal information, and at Apple we are deeply committed to safeguarding their data.

Compromising the security of our personal information can ultimately put our personal safety at risk. That is why encryption has become so important to all of us.

For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe. We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business.

The San Bernardino Case

We were shocked and outraged by the deadly act of terrorism in San Bernardino last December. We mourn the loss of life and want justice for all those whose lives were affected. The FBI asked us for help in the days following the attack, and we have worked hard to support the government’s efforts to solve this horrible crime. We have no sympathy for terrorists.

When the FBI has requested data that’s in our possession, we have provided it. Apple complies with valid subpoenas and search warrants, as we have in the San Bernardino case. We have also made Apple engineers available to advise the FBI, and we’ve offered our best ideas on a number of investigative options at their disposal.

We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.

Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

The Threat to Data Security

Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.

In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.

We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data. Criminals and bad actors will still encrypt, using tools that are readily available to them.

A Dangerous Precedent

Rather than asking for legislative action through Congress, the FBI is proposing an unprecedented use of the All Writs Act of 1789 to justify an expansion of its authority.

The government would have us remove security features and add new capabilities to the operating system, allowing a passcode to be input electronically. This would make it easier to unlock an iPhone by “brute force,” trying thousands or millions of combinations with the speed of a modern computer.

The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data. The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.

Opposing this order is not something we take lightly. We feel we must speak up in the face of what we see as an overreach by the U.S. government.

We are challenging the FBI’s demands with the deepest respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications.

While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.

Tim Cook

View original: 

A Court Ordered Apple to Hack the San Bernardino Shooter’s Phone. Read Tim Cook’s Defiant Response.

Posted in Anchor, Citizen, Cyber, Everyone, FF, GE, LG, ONA, Radius, Ultima, Uncategorized, Venta | Tagged , , , , , , , , | Comments Off on A Court Ordered Apple to Hack the San Bernardino Shooter’s Phone. Read Tim Cook’s Defiant Response.

This New Film Will Change the Way You Think About the Black Panthers

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

Stanley Nelson had just returned from a screening of his new documentary “Black Panthers: Vanguard of a Revolution” at the Apollo Theatre, when he saw her—Beyoncé—backed by dancers adorned in jet black outfits, berets and blown out hair, dancing with authority before thousands of raucous fans at the centerpiece of mainstream American culture, the Super Bowl. “I was shocked and amazed by it,” Nelson recalled later. “But also, it was beautiful.”

The award-winning filmmaker had been swept up in a Black Panther moment. And in a way, so is the rest of the country. Much like during the late 1960s, protests over police brutality in the past year has given rise to the Black Lives Matter movement. The film serves as a reminder that the issues the Black Panthers combated—poverty, economic disparity, tensions between law enforcement and the black community—remain relevant today.

The film, told mainly through the voices of the Panthers’ rank and file, captures the group’s rise and long, steady fall as a cultural and political force, from its infamous gun-touting demonstration at the California statehouse to then-FBI director J. Edgar Hoover’s efforts to disrupt and destroy the Panthers’ national influence. Nelson’s doc also gets at the internal struggles as women rising through the Panther ranks pushed for gender equality.

The film, which premiered at the Sundance Film Festival last year, has largely been praised, although some insiders have taken issue with Nelson’s portrayal. Former Panther leader Elaine Brown dismissed the film as a “two-dimensional palliative for white people and Negroes who are comfortable in America’s oppressive status quo.” Nelson chose not to respond directly, saying simply, “I don’t think there’s anything about the Panthers that anybody can agree on. But I think in some ways, this film comes really close.”

Continue Reading »

Read the article – 

This New Film Will Change the Way You Think About the Black Panthers

Posted in Anchor, Casio, FF, GE, LAI, LG, ONA, Oster, Radius, Uncategorized, Venta | Tagged , , , , , , , , , , | Comments Off on This New Film Will Change the Way You Think About the Black Panthers