Counterintelligence Agency Shrugs Off Responsibility for OPM Breach
Sen. Ron Wyden blasted the National Counterintelligence and Security Center for its officious response.
Sen. Ron Wyden blasted the National Counterintelligence and Security Center for its officious response.
Congressional support “could turn in the event of a terrorist attack or criminal event where strong encryption can be shown to have hindered law enforcement,” Litt said in an email obtained by the <em>Washington Post</em>.
Federal law enforcement officials decrying the proliferation of strong encryption said that the only reason they lack actual examples of how often it shields criminals is that they've done a “bad job” of collecting them.
Such a gag order has not been lifted since the USA Patriot in 2001 expanded the FBI’s authority to unilaterally demand that certain businesses turn over records — and never tell anyone about it.
Tariq Ba Odah has been held at Guantánamo since 2002. He has never been charged with a crime. He began a peaceful hunger strike in 2007, and in 2009 he was cleared for release — as soon as Yemen became more stable or the government could find someplace else for him to go.
Ranking House Intelligence Committee member attributes the change partly to “less confidence or trust” in the government.
The decision did not declare the NSA’s program, which was revealed by NSA whistleblower Edward Snowden in 2013, to have been legal or constitutional. Rather, it focused on a technicality.
In its attempt to destroy information, GCHQ may not have realized it was creating other important information: exactly what it was doing and why.
“Many of the questions we are hoping that the documents will answer involve filling out the picture,” says Dror Ladin, a staff attorney with the ACLU.
Encryption makes it harder for law enforcement to track down “evildoers,” Bush said, joining the Obama administration’s call for Apple, Google and others to be "more cooperative."
This is not a paywall.
By signing up, I agree to receive emails from The Intercept and to the Privacy Policy and Terms of Use.