194
194
Jun 21, 2013
06/13
by
FBC
tv
eye 194
favorite 0
quote 0
redchip's document security systems reached a high of over $3.50, up from $2.10 just six weeks ago when it first appeared, here, at the redchip ney report.
redchip's document security systems reached a high of over $3.50, up from $2.10 just six weeks ago when it first appeared, here, at the redchip ney report.
160
160
tv
eye 160
favorite 0
quote 0
systems. they say it is not true. since the leak of the verizon court order for phone records the "washington post" citing more classified documents is reporting the national security agency or n.s.a. has also obtained direct access to the systems of nine u.s. internet giants, microsoft, yahoo, google, facebook, aol, skype, youtube, and apple. the n.s.a. can collect search history, e-mails, file transfers, and live chats. overnight, five of the companies deny any knowledge of this. those had deny a, microsoft, apple, facebook, and yahoo but the newly reveled dragnet is causing an uproar and privacy advocates are furious and legislations are defending the practice. >> in the last few years, there was a domestic case thwarted because of their ability to do this. >> it is sweeping. it is not what i would expect out of the united states. >> to ease american angst the director of national intelligence is declassifying details of the previously secret program code named "prism," starting under president bush in 2007. it provides the most important valuable foreign intelligence information collected and that the unauthorized disclosure of information is reprehensible and
systems. they say it is not true. since the leak of the verizon court order for phone records the "washington post" citing more classified documents is reporting the national security agency or n.s.a. has also obtained direct access to the systems of nine u.s. internet giants, microsoft, yahoo, google, facebook, aol, skype, youtube, and apple. the n.s.a. can collect search history, e-mails, file transfers, and live chats. overnight, five of the companies deny any knowledge of this....
126
126
Jun 17, 2013
06/13
by
LINKTV
tv
eye 126
favorite 0
quote 0
system has been effective in preventing atags. they've been careful spying on innocent americans. unclaude fide documents shows that the national security phone and surveillance program identified the ring leader and a co-conspirator and a secret bottom to plan the subway system in 2009. others were broken up. the agencies also said that last year they monitored actual calls from more than 300 phone numbers out of millions that were collected and tracked without identifying the subscribers. >> his chief of staff would offer more assurances this twheek america's policy was not being missed. >> the president is not saying truss me. he's saying i want every member of congress on who's authority to run the program, to understand it, to be breach about it. and to be comfortable. the dragnet needed to be reigned in. >> i don't think collecting millions and millions of american phone calls -- now this is the metta data, this is time, place who whom you are directing the call. i think it's a violation of the fourth amendment. >> meanwhile dick cheney called for former n.s.a. contractor, edward snowden a traitor for leaking the documents. he's t
system has been effective in preventing atags. they've been careful spying on innocent americans. unclaude fide documents shows that the national security phone and surveillance program identified the ring leader and a co-conspirator and a secret bottom to plan the subway system in 2009. others were broken up. the agencies also said that last year they monitored actual calls from more than 300 phone numbers out of millions that were collected and tracked without identifying the subscribers....
231
231
tv
eye 231
favorite 0
quote 0
the "washington post" citing classified documents reports that the national security agency has direct access to the system of nine internet giants including microsoft, yahoo, google, facebook, pal talk, aol, skype, youtube, and at people. the n.s.a. can collect search history, e-mails, file transfers and chats but in statements, five of the companies deny any willing of this, microsoft, apple, facebook, google, and yahoo. the director of national intelligence says it is part of a classified program called prism started under president bush and renewed by congress. a whistleblower leaked the information because he felt it was a massive invasion of privacy. >> this guy feels very strongly the powers of the surveillance state have grown too great. >> the obama administration says this is legal and the government is targeting non-u.s. citizens outside of the united states. also, the director of national intelligence says there are numerous inaccuracies about prism in the newspaper report. >> moments ago the labor department released the latest jobs report and the unemployment rate increased to 7.6 percent las
the "washington post" citing classified documents reports that the national security agency has direct access to the system of nine internet giants including microsoft, yahoo, google, facebook, pal talk, aol, skype, youtube, and at people. the n.s.a. can collect search history, e-mails, file transfers and chats but in statements, five of the companies deny any willing of this, microsoft, apple, facebook, google, and yahoo. the director of national intelligence says it is part of a...
37
37
tv
eye 37
favorite 0
quote 0
whistleblower edward snowden set up a secure encrypted communication system back in february which snowden would later used to send the top secret documents belonging to the n.s.a.'s prism program the electronic frontier foundation has published an online guide indicating a significant amount of ways in which people. can opt out of. is also one of. four legislators. tale the n.s.a.'s programs civil rights advocates are encouraging individuals joined by. watching. website had garnered sixty thousand signatures reporting from new york. bound informant program which tracks information collected from all around the world has caused outrage across europe of a color coded map showed germany was among the most spied on nations with chancellor merkel exposed to discuss those revelations are with president obama in berlin that will be happening next week now a german member of the european parliament said that this surveillance reminds him of the infamous stars the secret police in east germany in fact his colleague from neighboring austria was appalled by these revelations saying that washington is basically doing whatever it wants italy's privac
whistleblower edward snowden set up a secure encrypted communication system back in february which snowden would later used to send the top secret documents belonging to the n.s.a.'s prism program the electronic frontier foundation has published an online guide indicating a significant amount of ways in which people. can opt out of. is also one of. four legislators. tale the n.s.a.'s programs civil rights advocates are encouraging individuals joined by. watching. website had garnered sixty...
37
37
tv
eye 37
favorite 0
quote 0
whistleblower edward snowden set up a secure encrypted communication system back in january which snowden would later use to send the top secret documents belonging to the n.s.a.'s prism program the electronic frontier foundation has published an online guide indicating a significant amount of ways in which. people can opt out of. organizations that are. legislators. tale the n.s.a.'s program civil rights advocates are encouraging individuals joined by. watching. website had garnered sixty thousand signatures reporting from new york. now the national security agency's boundless informant program which tracks information collected from around the world it's schools outrage across europe in fact this color coded map right here. but germany was among the most spied on nations chancellor merkel expected to discuss this with president obama when they meet in two weeks it might be a bit of an uncomfortable meeting to say the least. a member of the european parliament has said that this surveillance or reminds him of the infamous stasi secret police in east germany and his colleague from neighboring austria was appalled by these revelations sa
whistleblower edward snowden set up a secure encrypted communication system back in january which snowden would later use to send the top secret documents belonging to the n.s.a.'s prism program the electronic frontier foundation has published an online guide indicating a significant amount of ways in which. people can opt out of. organizations that are. legislators. tale the n.s.a.'s program civil rights advocates are encouraging individuals joined by. watching. website had garnered sixty...
24
24
tv
eye 24
favorite 0
quote 0
whistleblower edward snowden set up a secure encrypted communication system back in february which snowden would later used to send the top secret documents belonging to the n.s.a.'s prism program the electronic frontier foundation has published an online guide indicating a significant amount of ways in which people. can opt out of prison is also one of the six organizations that are demanding for legislators to move the n.s.a.'s programs civil rights advocates are encouraging individuals joined a call by signing stop watching. as of wednesday evening website had garnered sixty four thousand signatures reporting from new york. as always plenty more stories we're covering for you on our web site. for this hour with us including a. leftover from the war in libya capable of taking. also on the. devastated. west will not be getting much of the federal money it needs to deal with caused by a massive fertilizer plant that was two months ago. has the details behind the story. now iranians are preparing for a changing of the guard the country will be welcoming a new president for the first time in eight years now six candidates are vying for the
whistleblower edward snowden set up a secure encrypted communication system back in february which snowden would later used to send the top secret documents belonging to the n.s.a.'s prism program the electronic frontier foundation has published an online guide indicating a significant amount of ways in which people. can opt out of prison is also one of the six organizations that are demanding for legislators to move the n.s.a.'s programs civil rights advocates are encouraging individuals...
26
26
tv
eye 26
favorite 0
quote 0
whistleblower edward snowden set up a secure encrypted communication system back in february which snowden would later use to send the top secret documents belonging to the n.s.a.'s prism program the electronic frontier foundation has published an online guide indicating a significant amount of ways in which people. opt out of. our. program. joined. watching. website. sixty thousand signatures. boundless informant program which tracks information collected from around the world has caused. here showing that germany was among the most spied on nations with chancellor merkel expected to discuss all this with president obama that will be next week when they meet. now a german member of the european parliament quick to say this surveillance or reminds him of the infamous stasi secret police in east germany also his colleague from neighboring austria was appalled by these revelations ultimately saying that america is just doing whatever it wants to do and. expressed concern over these actions which he said would ultimately be illegal in his country and gyptian freedom activist was shocked at how much as country was targeted for information an
whistleblower edward snowden set up a secure encrypted communication system back in february which snowden would later use to send the top secret documents belonging to the n.s.a.'s prism program the electronic frontier foundation has published an online guide indicating a significant amount of ways in which people. opt out of. our. program. joined. watching. website. sixty thousand signatures. boundless informant program which tracks information collected from around the world has caused. here...
32
32
tv
eye 32
favorite 0
quote 0
whistleblower edward snowden set up a secure encrypted communication system back in february which snowden would later used to send the top secret documents belonging to the n.s.a.'s prism program the electronic frontier foundation has published an online guide indicating a significant amount of ways in which people can opt out of prison the f.f.a. is also one of eighty six organizations that are demanding for legislators to move to curtail the n.s.a.'s programs now civil rights advocates are encouraging individuals to join a call by signing up at stop watching dot us as of wednesday evening that web. sixty four thousand signatures reporting from new york marina forty nine r.t. . now the national security agency's boundless informant program which tracks information collected from around the world suddenly causing outrage across europe for the color coded map showed that germany was among the most spied on nations with chancellor angela merkel expected to discuss these revelations with president obama soon in berlin and that will be next week they get together a german member of the european parliament who said that this surveillance remi
whistleblower edward snowden set up a secure encrypted communication system back in february which snowden would later used to send the top secret documents belonging to the n.s.a.'s prism program the electronic frontier foundation has published an online guide indicating a significant amount of ways in which people can opt out of prison the f.f.a. is also one of eighty six organizations that are demanding for legislators to move to curtail the n.s.a.'s programs now civil rights advocates are...
SFGTV: San Francisco Government Television
49
49
Jun 8, 2013
06/13
by
SFGTV
tv
eye 49
favorite 0
quote 0
systems to provide minimum building ventilation. and article - this states that special rooms are required for safe storage for proposed ground floor storage are not securely anchored. lastly there is no documents from at&t on how it plans to make the proposed ground floor storage room fire resistant. and at&t should be wreaked by this commission. thank you >> good afternoon commissioners. i'm jeff you'll be happy to know my speak is short. this governs the ac district where the california street is located. the code defines public use and includes under that definition wireless transition facilities like at&t proposes for this location. however, section 703 b-1 of the code is clear that all permitted uses shall be used in closed building in neighborhoods commercial districts. at&ts proposal for this location calls for antennas on the rooftop. therefore at&ts project is impermissible under article 7 which pro includes antennas outside the building. i would ask that you correctly apply the planning code to this project and deny at&t a permit for this location. thank you very much >> good afternoon, commissioners. i'm dr. chris. i've been practicing at the 4216 for 40 years. you'll hear a lot of
systems to provide minimum building ventilation. and article - this states that special rooms are required for safe storage for proposed ground floor storage are not securely anchored. lastly there is no documents from at&t on how it plans to make the proposed ground floor storage room fire resistant. and at&t should be wreaked by this commission. thank you >> good afternoon commissioners. i'm jeff you'll be happy to know my speak is short. this governs the ac district where the...
1,893
1.9K
Jun 23, 2013
06/13
by
CNNW
tv
eye 1,893
favorite 0
quote 2
is to say we're all part of one country, but you have your system and we have ours, it's absolutely clear in that document that national securityolicy is run by beijing and that beijing trumps hong kong on any of those issues. so no question the decision came out of bay skrieijinbeijing. and if you were to reverse the role, you could understand what it looks like to them. they look at the guy thaun covered the fact that the united states has this vast intelligence apparatus. i would argue it's a legitimate thing and all these countries would do it, we just have greater capacities than others do. but they don't want to actively cooperate i suppose in that whole system. >> fareed, thanks for chiming in. when we come back, we will look into a reported meeting between ecuador's ambassador of russia and edward snowden. spokesman i have to look my so bbest on camera.sing whether i'm telling people about how they could save money on car insurance with geico... yeah, a little bit more of the lime green love yeah... or letting them know they can reach geico 24/7 using the latest technology. go on, slather it all over. don't hold back, g
is to say we're all part of one country, but you have your system and we have ours, it's absolutely clear in that document that national securityolicy is run by beijing and that beijing trumps hong kong on any of those issues. so no question the decision came out of bay skrieijinbeijing. and if you were to reverse the role, you could understand what it looks like to them. they look at the guy thaun covered the fact that the united states has this vast intelligence apparatus. i would argue it's...
200
200
Jun 13, 2013
06/13
by
FOXNEWSW
tv
eye 200
favorite 0
quote 0
documents he accessed and the systems. the "l.a. times" is reporting tonight that the 29-year-old used a thumb drive to store the classified documents. thumb drives are supposed to be banned on these secure networks, shep. then. >> shepard: there is some debate now, catherine it would seem how much this surveillance which many argue is unconstitutional on the face of it might have helped with. >> well, after the nsa director testified that, quote. dozens of terrorist events were disrupted, democratic senators ron why den and mark urdahl early critics of these programs saying quote: the house is backing up alexander who claims controversial data collection programs are providing primary investigative leads. >> these programs authorized by congress overseen by congress and federal judges, overseen with internal checks and balances within the executive branch, were found to be directly effective in thwarting terrorist attacks. >> but critics say the initial credit critical needs of the new york city subway killer zhizi and headlee came from oversea agency and programs were secondary. they confirmed the tips. also ahead the senate intelligence committee senator dianne feinstein says a list o
documents he accessed and the systems. the "l.a. times" is reporting tonight that the 29-year-old used a thumb drive to store the classified documents. thumb drives are supposed to be banned on these secure networks, shep. then. >> shepard: there is some debate now, catherine it would seem how much this surveillance which many argue is unconstitutional on the face of it might have helped with. >> well, after the nsa director testified that, quote. dozens of terrorist...
139
139
Jun 10, 2013
06/13
by
CSPAN2
tv
eye 139
favorite 0
quote 0
documents are lost or stolen." close quote. that's on the web site today of homeland security. and it's absolutely correct. but it didn't happen in 2000. in 2002, congress reiterated the demand for a biometric entry/exit system at all ports of entry requiring homeland security issue aliens -- quote -- "only machine readable, tamper resistant, visas and other travel and entry documents that use biometric identifiers close quote. that was what we passed in 2002. it also required that the government install biometric readers and scanners -- quote -- "at all ports of entry in the united states." also in 2002 the department of homeland security initiated the u.s. visit system which is really got great potential and it has done some good things but it hasn't been completed and that system was to develop this entire process. two years later, u.s. visit was collecting biometric data on all aliens entering the united states. so they'd take this data and they guilty it -- get it. in 2004, congress again demanded a biometric entry/exit system, in 2004, passing another law. the passage through -- through the passage of the intelligence reform and terrorist prevention act of 2004. and in that act congress said -- quote -
documents are lost or stolen." close quote. that's on the web site today of homeland security. and it's absolutely correct. but it didn't happen in 2000. in 2002, congress reiterated the demand for a biometric entry/exit system at all ports of entry requiring homeland security issue aliens -- quote -- "only machine readable, tamper resistant, visas and other travel and entry documents that use biometric identifiers close quote. that was what we passed in 2002. it also required that...
253
253
Jun 17, 2013
06/13
by
CNNW
tv
eye 253
favorite 0
quote 0
documents on snooding by the national security agency. snowden said e-mail surveillance could be thwarted telling one questioner this. encryption works. properly implemented strong krip toe systemsw things that you can rely on. unt fortunately, end point security is so terrifically weak. snowden, very cryptically himself, gave hints if anything happens to him the leaks will continue. quoting snowden now. all i can say right now is the u.s. government is not going to be able to cover this up by jailing or murdering me. truth is coming. and it cannot be stopped. nic robertson is in hong kong with more on snowden's live chat. listen, does that -- that kind of sounds like a threat. like either you don't do anything to me or you can't murder me. that sounds really odd, nic. >> it sounds like a guy who's really putting up a defense. you never quite know when it's going to be the last time that we're actually going to hear from him. i mean, look, he's taken into his confidence a few journalists. he has to figure that a lot of intelligence agencies, not least of all from the united states, would like to get their hands on these computers. he came out with four computers. would like to g
documents on snooding by the national security agency. snowden said e-mail surveillance could be thwarted telling one questioner this. encryption works. properly implemented strong krip toe systemsw things that you can rely on. unt fortunately, end point security is so terrifically weak. snowden, very cryptically himself, gave hints if anything happens to him the leaks will continue. quoting snowden now. all i can say right now is the u.s. government is not going to be able to cover this up by...
164
164
Jun 9, 2013
06/13
by
FOXNEWSW
tv
eye 164
favorite 0
quote 0
not the border's and you're and immigration reform, documenting the workers, making them part of the system, it only goes forward if the border is security here t. will be a big and bruising battle. they don't want to go through tbut that's the the only way to convince people like me that they are serious. >> shannon: do you have the support? >> we have rumblings of support, but i can't tell you an exact number. >> shannon: senator, thank you for your time. >> thank jew senator paul's been speaking out about the data collection by the national security agency. so it's your turn. we. tow know what you think, regardless of who is in the white houses, do you trust the government to balance privacy versus law enforcement? tweet us your answers. we will read some of those later on in the show. police in santa monica are trying to figure out why a gunman went on a rampage that started at his father a house and ended up in a college campus that left four people, plus the gunman dead. we have an exclusive interview with one of the victims. hellie, dominic? >> reporter: hey there. shannon. nine crime scenes, police are investigating in part of th
not the border's and you're and immigration reform, documenting the workers, making them part of the system, it only goes forward if the border is security here t. will be a big and bruising battle. they don't want to go through tbut that's the the only way to convince people like me that they are serious. >> shannon: do you have the support? >> we have rumblings of support, but i can't tell you an exact number. >> shannon: senator, thank you for your time. >> thank jew...
85
85
Jun 24, 2013
06/13
by
CSPAN2
tv
eye 85
favorite 0
quote 0
our amendment clarifies that the additional security measures must be integrated into the everify system for workers who present a document without a corresponding photo tool image. that the timing of their implementation is tied to the roll-out of mandatory everify and that failure to verify an identity with the additional security measures results in what's called a further action notice the everify process. allowing employees to appeal through the established appeals process where they have to prove that they're authorized to work. our amendment also specifies standards for design and operation of the additional security measures that are provided to include state-of-the-art technology, structure to provide prompt determinations and minimize employer and employee burdens. these specifications are designed to safeguard employee privacy and maximize the accuracy and efficiency of identity determinations. and the amendment permits employers to choose with advanced notice to d.h.s. to use the additional authentication measures on all new hires rather than only in cases where no digital image is available for a photo tool m
our amendment clarifies that the additional security measures must be integrated into the everify system for workers who present a document without a corresponding photo tool image. that the timing of their implementation is tied to the roll-out of mandatory everify and that failure to verify an identity with the additional security measures results in what's called a further action notice the everify process. allowing employees to appeal through the established appeals process where they have...
100
100
Jun 15, 2013
06/13
by
MSNBCW
tv
eye 100
favorite 0
quote 0
systems administrator for a national security agency contractor. we learned thursday he used a thumb drive to smuggle top secret documents out of the agency in hawaii where he worked. according to "l.a. times" they now say they know how many documents snowden took. he outed himself last sunday just after this show went off the air in an interview published by "the guardian." he was holed up in a hong kong hotel and sparked a government debate. snowden reportedly checked out of that hotel on monday and then resurfacing on wednesday in an interview with a hong kong newspaper "the south china morning post." that interview conducted at an undisclosed location. the u.s. has been hijacking computers in hong kong since 2009 and backed up that claim with what the paper verified as documents. in the same paper on thursday snowden said i'm neither traitor nor hero, i acted in good faith but only right that the public form its own opinion. political leaders and the american public are, indeed, forming their own opinions and they are scrambling party lines. >> for somebody to tell the american people the truth is a heroic effort. >> he's a traitor. the disclos
systems administrator for a national security agency contractor. we learned thursday he used a thumb drive to smuggle top secret documents out of the agency in hawaii where he worked. according to "l.a. times" they now say they know how many documents snowden took. he outed himself last sunday just after this show went off the air in an interview published by "the guardian." he was holed up in a hong kong hotel and sparked a government debate. snowden reportedly checked out...
73
73
Jun 12, 2013
06/13
by
CSPAN2
tv
eye 73
favorite 0
quote 0
is established for all employers, and electronic exit system based on machine-readable travel do i documents is in place at airports and securities and even then we added more during the judiciary committee's markup of this bill. we adopted an amendment offered by senator grassley that applied it not just to high-risk sectors. so those who say they want more security, what we've got here -- first of all, it is virtually impossible to have more security. are you saying you don't want any immigration bill? this is like debates we've had -- and i use the example of the work we did to bring about peace in northern ireland during the clinton administration. the former senator, former majority leader of this body, senator george mitchell, did heroic efforts, along with others, on both the product stan-- on both theprotestant ann northern impleted there arnorth. there were some who said we couldn't do anything until we did not a single act of violence? so you're going to let a disgrant led person on either side veto any peace agreement? let us not say that we'll have no immigration bill until not one person crosses our border illegally.
is established for all employers, and electronic exit system based on machine-readable travel do i documents is in place at airports and securities and even then we added more during the judiciary committee's markup of this bill. we adopted an amendment offered by senator grassley that applied it not just to high-risk sectors. so those who say they want more security, what we've got here -- first of all, it is virtually impossible to have more security. are you saying you don't want any...
95
95
Jun 18, 2013
06/13
by
CSPAN2
tv
eye 95
favorite 0
quote 0
security to implement an everify system nationwide. what this means is that the current situation where individuals who want to work may have fake documentsiming to be somebody they're not, maybe it's somebody else's social security number, in order to get hired. but the employer is not expected to be the police. they're not exb to be able to look behind -- expected to be able to look behind these documents. but we know that massive identity theft and document fraud occurring in such a way as to circumvent the efforts to enforce our system and to restore legality to the system when it comes to people who want to come and work here. so that's the third one. and the fourth one, in order to fill a gaping hole in the bill with respect to interior enforcement, the results amendment requires the department of homeland security to initiate removal proceedings for at least 90% of visa overstays. who collectively currently account for 40% of illegal immigration. now, i think that surprises a lot of people to learn that it's not just our porous borders, it's people who enter the country legally who simply overstay their visa and melt into the great
security to implement an everify system nationwide. what this means is that the current situation where individuals who want to work may have fake documentsiming to be somebody they're not, maybe it's somebody else's social security number, in order to get hired. but the employer is not expected to be the police. they're not exb to be able to look behind -- expected to be able to look behind these documents. but we know that massive identity theft and document fraud occurring in such a way as...