48
48
Mar 15, 2017
03/17
by
KQED
tv
eye 48
favorite 0
quote 0
the c.i.a.'s taking the authority since they got it from mr. trump. >> glor: but there has long been a feisty turf war between the c.i.a. and the pentagon over drone strikes. >> right. there's always been this bureaucratic squabbling over thissish uh shoe. under pressure from human rights groups and others, mr. obama settled on getting the hybrid solution where the c.i.a. and the dod work together to mount a strike. so it was basically the c.i.a. working, providing the intelligence, the analysis and then, at the last minute, allowing the dod to essentially pull the trigger, but thus allowing that mission to be largely publicly accountable and transparent, and that was a place where mr. obama had pushed to have that happen. so now this is the beginning of what could be a reversal of that policy under mr. trump, who has clearly signaled he wants to accelerate the fight against islamic state and other groups. >> glor: and, greg, how easy or complicated is it going to be to change the drone rules? >>
the c.i.a.'s taking the authority since they got it from mr. trump. >> glor: but there has long been a feisty turf war between the c.i.a. and the pentagon over drone strikes. >> right. there's always been this bureaucratic squabbling over thissish uh shoe. under pressure from human rights groups and others, mr. obama settled on getting the hybrid solution where the c.i.a. and the dod work together to mount a strike. so it was basically the c.i.a. working, providing the intelligence,...
41
41
Mar 9, 2017
03/17
by
BLOOMBERG
tv
eye 41
favorite 0
quote 0
i think the c.i.a. far is declining to comment on this, the white house is declining to comment on this. we are monitoring closely to see what sort of investigation takes shape now, like it's clear the c.i.a. will have to mount a really big counter intelligence probe to figure out what happened here and probably will have to relay a crimes report to the f.b.i., which will also have to investigate. but i think right now i have to say, my impression is that they are still in the sorting-out mode, what just happened. roger: will the c.i.a. have to change its methods? greg: undoubtedly, i think that's clear. although experts i've talked to have said that that is weirdly manageable. you would expect a revelation like this to be such a catastrophic setback that they would send them back to square one but the reality is that these exploits for things like the iphone are developed on this basis over and over again. every time there's a new software update that patches a security flaw, there's a counter effort b
i think the c.i.a. far is declining to comment on this, the white house is declining to comment on this. we are monitoring closely to see what sort of investigation takes shape now, like it's clear the c.i.a. will have to mount a really big counter intelligence probe to figure out what happened here and probably will have to relay a crimes report to the f.b.i., which will also have to investigate. but i think right now i have to say, my impression is that they are still in the sorting-out...
101
101
Mar 9, 2017
03/17
by
FOXNEWSW
tv
eye 101
favorite 0
quote 0
now it's getting known that the c.i.a. has access to such fingerprints and use them. >> and the chinese with a military hacking head quarter that was behind the theft of more than 20 million reports from the u.s. government security database accused washington today of stealing secrets, shep. >> shepard: what are you getting from capitol hill after this? >> the bottom line in these sessions is you have to look at who benefits from the leaks. in this case, a lot of the threats lead to russia. russia benefits from the chaos and the loss of confidence in u.s. government agencies. wikileaks also posted former nsa contractor edward snowden's stolen records that exposed government surveillance and russia recently extended snowden's asylum. on capitol hill, the republican chairman of the house armed services committee told fox news that he believes wikileaks is being used by moscow. >> we have never seen wikileaks release information by russia or the chinese. they only disclose information about ours. it's another form of attack d
now it's getting known that the c.i.a. has access to such fingerprints and use them. >> and the chinese with a military hacking head quarter that was behind the theft of more than 20 million reports from the u.s. government security database accused washington today of stealing secrets, shep. >> shepard: what are you getting from capitol hill after this? >> the bottom line in these sessions is you have to look at who benefits from the leaks. in this case, a lot of the threats...
193
193
Mar 10, 2017
03/17
by
KQED
tv
eye 193
favorite 0
quote 0
there is nothing in the c.i.a. leaks to indicate that they had any access to an amazon echo or a google home for instance, but these devices have microphones and listen to you. the internet, almost everything has some sort of internet connection, which isn't to say your internet-connected dishwasher is going to be spying on you, but maybe it gets enlisted in a botnet. the most important takeaway is every time you let a device into your house, you're creating new entry points for hackers. that's not to be alarmist and it is a trade-off, one that most people are happy with and one that most people went run into a problem work but it is something to be aware of. >> sreenivasan: brian barrett from "wired," thank you so much. >> thank you. >> sreenivasan: the house republican plan moved a step forward today. in a moment william brangham talks to the head of an insurance company. but first, judy woodruff zeroes in on some of the basics about key changes in the republican bill. >> woodruff: tonight we look at medicaid and
there is nothing in the c.i.a. leaks to indicate that they had any access to an amazon echo or a google home for instance, but these devices have microphones and listen to you. the internet, almost everything has some sort of internet connection, which isn't to say your internet-connected dishwasher is going to be spying on you, but maybe it gets enlisted in a botnet. the most important takeaway is every time you let a device into your house, you're creating new entry points for hackers. that's...
75
75
Mar 8, 2017
03/17
by
KTVU
tv
eye 75
favorite 0
quote 0
. >> wikileaks released documents that suggest the c.i.a. has developed smart ways to hack smart phones and cars. the documents have not been verified and the c.i.a. declined comment but as rob roth reports. others are talking. >> wikileaks released more than 8000 documents it claims from the c.i.a. the documents indicate that espionage agency appears to create one thousand hacking systems and trojans to by pass encryptions and messaging services. that would allow the c.i.a. to collect audio and written information from almost any device. the question is hose information is the c.i.a. gathering and that is still unclear. larry maggen is a bay area technology analyst. >> it would be unethical if it was being used against citizens without proper legal authority. >> the documents say some of the hacking methods can turn a samsung tv into a listening device turned off and when it exceeds the c.i.a.'s authority. >> the theory is that those of us using our phones or sitting in front of the television sets and we have an amazon echo or devices that
. >> wikileaks released documents that suggest the c.i.a. has developed smart ways to hack smart phones and cars. the documents have not been verified and the c.i.a. declined comment but as rob roth reports. others are talking. >> wikileaks released more than 8000 documents it claims from the c.i.a. the documents indicate that espionage agency appears to create one thousand hacking systems and trojans to by pass encryptions and messaging services. that would allow the c.i.a. to...
49
49
Mar 8, 2017
03/17
by
BLOOMBERG
tv
eye 49
favorite 0
quote 0
this reveals how the c.i.a. information ons a lot of legitimate adversaries, including a terrorist group like state whose members use cell phones, cameras, video equipment, computers. these documents can help you sort out how the agency might go about penetrating those networks and getting intelligence. roger: this could be useful to enemies, right? beg: right, this could highly useful to enemies thatding snippets of code amount to signatures that russia could use to search its system see if there are embedded devices.heir roger: who do you think the source may be? and do you think the president after the source? greg: wikileaks said that its source is a current or former intelligence contractor who obtained these files through some sort of unauthorized disclosure. there was a lot of suspicion among u.s. officials, of course, russia may be involved here. u.s. intelligence officials believe that russia and work hand inen hand. although there is a counter argument here. sensitivitye -- the of these files as such th
this reveals how the c.i.a. information ons a lot of legitimate adversaries, including a terrorist group like state whose members use cell phones, cameras, video equipment, computers. these documents can help you sort out how the agency might go about penetrating those networks and getting intelligence. roger: this could be useful to enemies, right? beg: right, this could highly useful to enemies thatding snippets of code amount to signatures that russia could use to search its system see if...
193
193
Mar 9, 2017
03/17
by
KQED
tv
eye 193
favorite 0
quote 0
and for that reason, the c.i.a. to develop the capabilities that it has developed in order to be able to track those that are known suspects of terrorism. you know, we went through 9/11. there was a national commission that was established to find out why we were attacked on 9/11. and the result of that is that the c.i.a. and other inlligence agencies develop better capabilityes and to go after terrorists and to try to locate them. there is a reason we have not had another 9/11 attack in this country, and a lot of that is because our intelligence agencies, our law enforcement agencies have sharing information and gathering information that makes sure we protect the united states. >> sreenivasan: speak of sharing information, back in 2010, when you were still c.i.a. director, the obama administration said they would share zero-day vulnerabilities, those hacks that are core in pieces of software, like in an apple iphone or an android operating system with the technology companies. but here, we have evidence that the c.
and for that reason, the c.i.a. to develop the capabilities that it has developed in order to be able to track those that are known suspects of terrorism. you know, we went through 9/11. there was a national commission that was established to find out why we were attacked on 9/11. and the result of that is that the c.i.a. and other inlligence agencies develop better capabilityes and to go after terrorists and to try to locate them. there is a reason we have not had another 9/11 attack in this...
265
265
Mar 8, 2017
03/17
by
KQED
tv
eye 265
favorite 0
quote 0
so the c.i.a. hasn't said much so far. what do we been the authenticity the the documents and where they came from? >> well, we're still trying to confirm the authenticity. we have several people we've speaken to today who say they believe they're authentic. we've heard nothing thus far from the government indicating that they are not. some people we have spoken to have said that some of the code names that were cited in the documents are, indeed, legitimate, so it does appear and i moment-- and i should say at the moment-- that they are legitimate. >> brown: well, when you look at the totality, mark, of all of these cyber tools that being descrierkd help us understand what are they aimed at? what is this program about? >> well, they're a series of-- and we're talking about thousands of documents that are laying out some of the tools the c.i.a. allegedly has to carry out hack of any number of different devices-- as you you said, cars -- against foreign adversaries or people overseas. i should stress that there is, unlike th
so the c.i.a. hasn't said much so far. what do we been the authenticity the the documents and where they came from? >> well, we're still trying to confirm the authenticity. we have several people we've speaken to today who say they believe they're authentic. we've heard nothing thus far from the government indicating that they are not. some people we have spoken to have said that some of the code names that were cited in the documents are, indeed, legitimate, so it does appear and i...
99
99
Mar 8, 2017
03/17
by
KTVU
tv
eye 99
favorite 0
quote 0
wicky leaks released 8000 documents from the c.i.a. they indicate that the espionage agency appears to created more than one thousand hacking seasons and trojans and viruses to bypass encryption on iphones andandroids. allowing to collect information from any device. the question is whose information is the c.i.a. gathering. >> none of that surprises me. who are they targets, are they using it against targets that we know the c.i.a., that is what they are supposed to do or are they abusing it. >> the documents say some of the hacking methods can turn a san sung tv into a listening device and will any of this exceed the c.i.a.'s authority. >> the fear is that those of us using our phones or sitting in our living room and we have an amazon echo that what we are doing is being recorded. the question is, is that happening? >> wicky leaks says the source of the leaks wishes to initiate a public debate about the security debate and proliferation of democrat control of cyber weapons. >> the c.i.a. does not comment on the authenticity of report
wicky leaks released 8000 documents from the c.i.a. they indicate that the espionage agency appears to created more than one thousand hacking seasons and trojans and viruses to bypass encryption on iphones andandroids. allowing to collect information from any device. the question is whose information is the c.i.a. gathering. >> none of that surprises me. who are they targets, are they using it against targets that we know the c.i.a., that is what they are supposed to do or are they...
119
119
Mar 6, 2017
03/17
by
CSPAN3
tv
eye 119
favorite 0
quote 1
if the c.i.a. only had one country they had to pay attention to, we would be good at what we are doing. we are good, but we have to look at everybody. the cubans only needed to focus on the united states and they were very good at doing it. as many of these refugees passed over into miami, estimates vary. there are numbers that say as high as one out of every 10 refugees was a member of cuban intelligence. when the cuban refugee of miami was planning this operation, there were cuban intelligence assets inside the planning and operation passing information back to cuba. to the point that a week before it -- actually, five days before the bay of pigs invasion, radio moscow broadcast a message saying, cuban exiles are about to invade cuba and get castro out. you would think that the united states government would say we cannot do this. they obviously know we are coming. this is a problem. what they don't. they just kind of ignore the warning signs. "the miami herald" was ready to publish a piece weeks
if the c.i.a. only had one country they had to pay attention to, we would be good at what we are doing. we are good, but we have to look at everybody. the cubans only needed to focus on the united states and they were very good at doing it. as many of these refugees passed over into miami, estimates vary. there are numbers that say as high as one out of every 10 refugees was a member of cuban intelligence. when the cuban refugee of miami was planning this operation, there were cuban...
158
158
Mar 8, 2017
03/17
by
WUSA
tv
eye 158
favorite 0
quote 0
the c.i.a. of anything, except keeping a secret. ( laughter ) and you know who i want to talk to about this? general michael hayden who will be on here later in the show. he was in the c.i.a. and n.s.a. he'll have a thing or two to say the trump thing, too. there are some crazy revelation in addition this wikileaks dump. the c.i.a. apparentlhas a program code named "weeping angel," which uses samsung smart televisions as covert listening devices. even when they appear to be turned off, the tv could be recording conversations in the room and sending them to a c.i.a. server. oh, my god. this is true-- i have all samsung tvs in my house. and that means the cia has hundreds of hours of me looking for the remote. where is it? what is-- where is it? where is it! who took it? who took it! who took it to the kitchen! i also watch nude, so they're getting a great shot here. who took-- >> jon: the moon. >> stephen: that joke is based on a true story. and don't think just because you victim antivirus or pr
the c.i.a. of anything, except keeping a secret. ( laughter ) and you know who i want to talk to about this? general michael hayden who will be on here later in the show. he was in the c.i.a. and n.s.a. he'll have a thing or two to say the trump thing, too. there are some crazy revelation in addition this wikileaks dump. the c.i.a. apparentlhas a program code named "weeping angel," which uses samsung smart televisions as covert listening devices. even when they appear to be turned...
96
96
Mar 8, 2017
03/17
by
FOXNEWSW
tv
eye 96
favorite 0
quote 1
the c.i.a. been hacked and all of these materials stolen and published. they can't keep their own secrets and they can't even keep their own methods and tools. >> neil: mr. comey has indicated he's not going anywhere the next 6, 6 1/2 years. what did you think of that? >> that's a shame. i do think that comey -- in my colon today, i talk about j. edgar comey. he's very much like j. edgar hoover, that he's untouchable, too big to fire. hoover -- five president s wanted to fire hoover. he died in 1972. he did many great things but horrible things as well. harry truman acted him of running blackmail investigations. he said everybody in washington is afraid of you. comey is becoming something like that. we saw it in the election. didn't realize it at the time, but it's obvious that the fbi was investigating both candidates, hillary clinton and donald trump. >> neil: you think donald trump is afraid of him? >> well, i don't know. it remains to be seen. he's trump's problem now. if we continue to let c
the c.i.a. been hacked and all of these materials stolen and published. they can't keep their own secrets and they can't even keep their own methods and tools. >> neil: mr. comey has indicated he's not going anywhere the next 6, 6 1/2 years. what did you think of that? >> that's a shame. i do think that comey -- in my colon today, i talk about j. edgar comey. he's very much like j. edgar hoover, that he's untouchable, too big to fire. hoover -- five president s wanted to fire...
55
55
Mar 25, 2017
03/17
by
BLOOMBERG
tv
eye 55
favorite 0
quote 0
the c.i.a. ticular. that is what happened. he should not have done that, but that is what he did. that caused a big morale problem. since becoming president, and by the way, during that transition, he was not interacting much with his daily briefer. he was not taking many daily briefings. he did not seem to be paying attention. things are different today. my understanding is he is not receiving it every day, but he is receiving it regularly, up to three times a week. that he is putting considerable time into it. the c.i.a. director is in the room, along with a briefer, that the president is listening and asking questions. i think things are getting better. charlie: is there general, in terms of national security respect for the cia director because of outstanding academic performance at west point and because of what they know about his positions in congress and because of the way he has handled the c.i.a.? or is that going to far? michael: i think when mike pompeo came to c.i.a., i think the peo
the c.i.a. ticular. that is what happened. he should not have done that, but that is what he did. that caused a big morale problem. since becoming president, and by the way, during that transition, he was not interacting much with his daily briefer. he was not taking many daily briefings. he did not seem to be paying attention. things are different today. my understanding is he is not receiving it every day, but he is receiving it regularly, up to three times a week. that he is putting...
136
136
Mar 31, 2017
03/17
by
FOXNEWSW
tv
eye 136
favorite 0
quote 0
it's claimed the c.i.a. y out hacks and make it look like somebody else did it, like something else in china or russia. details coming up as we approach the bottom of the hours. llo!? a meeting? it's a big one. too bad. we are double booked: diarrhea and abdominal pain. why don't you start without me? oh. yeah. if you're living with frequent, unpredictable diarrhea and abdominal pain, you may have irritable bowel syndrome with diarrhea, or ibs-d. a condition that can be really frustrating. talk to your doctor about viberzi, a different way to treat ibs-d. viberzi is a prescription medication you take every day that helps proactively manage both diarrhea and abdominal pain at the same time. so you stay ahead of your symptoms. viberzi can cause new or worsening abdominal pain. do not take viberzi if you have or may have had: pancreas or severe liver problems, problems with alcohol abuse, long-lasting or severe constipation, or a blockage of your bowel or gallbladder. if you are taking viberzi, you should not ta
it's claimed the c.i.a. y out hacks and make it look like somebody else did it, like something else in china or russia. details coming up as we approach the bottom of the hours. llo!? a meeting? it's a big one. too bad. we are double booked: diarrhea and abdominal pain. why don't you start without me? oh. yeah. if you're living with frequent, unpredictable diarrhea and abdominal pain, you may have irritable bowel syndrome with diarrhea, or ibs-d. a condition that can be really frustrating. talk...
101
101
Mar 8, 2017
03/17
by
FOXNEWSW
tv
eye 101
favorite 0
quote 0
the c.i.a.'s hacking techniques. the c.i.a. has the ability now to hack your smart phone no matter what kind of it is, hack your computer, hack into your television set, the one you're watching right now potentially and even hack into your vehicle. wikileaks claims this is just the beginning of what they call the largest publication of c.i.a. documents ever and analysts are comparing it to edward snowden's release of the national security agencies files in 2013. james comey spoke out about the effect of that leak in a cyber security conference today. >> what has happened to us since snowden, since the summer of 2013, is that more and more of that room has gotten dark. enprescription has become the default. it's a feature of the work of the less sophisticated. of drug dealers. of armed robbers. of terrorists. of pedophiles, of pad bad people of all sorts. >> the fbi is trying to track down whoever leaked this information. catherine herridge is live in washington. >> fox news confirmed the fbi has
the c.i.a.'s hacking techniques. the c.i.a. has the ability now to hack your smart phone no matter what kind of it is, hack your computer, hack into your television set, the one you're watching right now potentially and even hack into your vehicle. wikileaks claims this is just the beginning of what they call the largest publication of c.i.a. documents ever and analysts are comparing it to edward snowden's release of the national security agencies files in 2013. james comey spoke out about the...
165
165
Mar 10, 2017
03/17
by
KPIX
tv
eye 165
favorite 0
quote 0
the c.i.a. aware weeks before tuesday's disclosure that valuable information may have been stolen. the f.b.i. is now working with the c.i.a. to determine not only who stole the information but whether another country like russia was involved. jim lewis consults with the u.s. government and military about cyber-security. >> there's good data that suggests ties between assange and the russian security services. and there's very strong data that wikileaks has a powerful anti-american agenda. >> reporter: wikileaks says it is reaching out to companies like microsoft, apple, and google so they can fix the hacking vulnerabilities. scott, they all say they are working on close loopholes they already know about. >> pelley: jeff pegues, thanks. today, president trump said "despite what you hear in the press, health care is coming along great." well, what you've heard in the press is that a.a.r.p., and the american medical association are against the republican replacement for obamacare, and so are conserv
the c.i.a. aware weeks before tuesday's disclosure that valuable information may have been stolen. the f.b.i. is now working with the c.i.a. to determine not only who stole the information but whether another country like russia was involved. jim lewis consults with the u.s. government and military about cyber-security. >> there's good data that suggests ties between assange and the russian security services. and there's very strong data that wikileaks has a powerful anti-american agenda....
130
130
tv
eye 130
favorite 0
quote 0
the c.i.a. is prohibited by law from operating in the united states, but jeff pegues reports the breech has seriously damaged the agency's work overseas. >> reporter: wikileaks claims the stolen data came from a former u.s. government hacker or contractor code named vault 7. the disclosures reveal cyber espionage tools that can take over internet connected or smart tvs and record audio. the documents also cite the ability to hack iphone or google android smartphones. those hacks allow the c.i.a. to then monitor the communications of terrorist groups like isis, which have been using encrypted apps to communicate. critics have wondered why apps like what's app or telegram haven't been disabled, but the documents suggest analysts have the ability to exploit them. earlier this year u.s. intelligence officials accused wikileaks of being a propaganda arm of the russian government after it released damaging democratic party e-mails stolen through russian cyber attacks. when the e-mails were published du
the c.i.a. is prohibited by law from operating in the united states, but jeff pegues reports the breech has seriously damaged the agency's work overseas. >> reporter: wikileaks claims the stolen data came from a former u.s. government hacker or contractor code named vault 7. the disclosures reveal cyber espionage tools that can take over internet connected or smart tvs and record audio. the documents also cite the ability to hack iphone or google android smartphones. those hacks allow the...
132
132
tv
eye 132
favorite 0
quote 0
these are all real names that the c.i.a. uses for the operations. you've got cotton candy. lder surfer. swamp monkey. ( laughter ) dr. boom. magical mutt, ricky bobby, and eggs mayhem. these are real code names. i love that there's a c.i.a. agent whose job it is to come up with the code names, like the other spies with like, "i'm going to jump out of a helicopter, land on an airplane, and assassinate the ugandan foreign minister using a pencil laced with v.x." and the one guy goes, and we're going to call it eggs mayhem. i'm a spy, too." ( laughter ) but, guys, there's no need to get paranoid. your tv is not spying on you. except for you, kevin. ( laughter ) yeah, i see ow the couch, buddy. you got some sriracha on your mustache. ( laughter ) by the way, sriracha moustache is also a new sex position. ( laughter ) i'll just leave you with that. but let's move on, ladies and gentlemen, to the one thing paul ryan spends more time on than his biaccepts, obamacare. since its very inception, paul ryan has had one goal: >> we really have a problem with the direction of these bills
these are all real names that the c.i.a. uses for the operations. you've got cotton candy. lder surfer. swamp monkey. ( laughter ) dr. boom. magical mutt, ricky bobby, and eggs mayhem. these are real code names. i love that there's a c.i.a. agent whose job it is to come up with the code names, like the other spies with like, "i'm going to jump out of a helicopter, land on an airplane, and assassinate the ugandan foreign minister using a pencil laced with v.x." and the one guy goes,...
89
89
Mar 8, 2017
03/17
by
KTVU
tv
eye 89
favorite 0
quote 0
>> wikileaks released 8000 documents it claims is from the c.i.a. the documents indicate that espionage agency appears to create more than one thousand hacks systems trojans and by passes on iphones and androids and to collect audio information and written information and who is gathering this. this is a technical analyst. >> this is illegal against citizens. >>> some of these could be turned into a listening device on samsung tvs. >> those of us using our phones or sitting in front of our smart television sets and we have an amazon act ko that what we are saying and doing is being recorded and the question is, is that happening? >> but are people concerned that the government may be listening? >> and it makes me want to do less technology. that's what -- less computers and less phone. all of that. >> because of your privacy? >> yes. exactly. >> i'm not too worried about it. >> what? >> if i'm will she like whatever i am doing they can look away. >> wikileaks says the source of the leaks wish to initiate a public debate about the pro livation and dem
>> wikileaks released 8000 documents it claims is from the c.i.a. the documents indicate that espionage agency appears to create more than one thousand hacks systems trojans and by passes on iphones and androids and to collect audio information and written information and who is gathering this. this is a technical analyst. >> this is illegal against citizens. >>> some of these could be turned into a listening device on samsung tvs. >> those of us using our phones or...
119
119
Mar 9, 2017
03/17
by
WJLA
tv
eye 119
favorite 0
quote 0
the c.i.a. tools. julian assange to facebook live explaining it wasn't hard for wikileaks to get ahold of the information. >> this is an his forrick act of devastating incompetence. to have created such an arsenal and stored it all in one place. jonathan: he went on to say wikileaks got ahold of the material because it was passed around in what he called unauthorized fashion. the c.i.a. has not commented on the leak that apparently revealed how it turns the smart device, the tv, tablet and phones and the car into listening devices. alison: meanwhile, on the hill, when it comes to the planned border wall, senate majority leader mcconnell did not express optimism to get mexico to pay for it. today he literally laughed off the notion. >> do you believe mexico will pay for it? >> oh, no. alison: one of trump's staples in the campaign included the promise to build that wall and have mexico pay for it. >> this is the closest we will ever get to repealing and replacing obamacare. >> that, of course, hou
the c.i.a. tools. julian assange to facebook live explaining it wasn't hard for wikileaks to get ahold of the information. >> this is an his forrick act of devastating incompetence. to have created such an arsenal and stored it all in one place. jonathan: he went on to say wikileaks got ahold of the material because it was passed around in what he called unauthorized fashion. the c.i.a. has not commented on the leak that apparently revealed how it turns the smart device, the tv, tablet...
267
267
Mar 25, 2017
03/17
by
KQED
tv
eye 267
favorite 0
quote 0
or whether it be the c.i.a. ack to the relevant agency and say, i was given these, how do i think about these? are there any more like these? help me understand these. that should have been step one with. step two should have been to take the answer and share it with the entire committee before taking any action of briefing the president, let alone the media. >> rose: you said in the beginning this has nothing to do with whether president obama's administration bugged trump tower. >> this collection, based on the chairman's own words, was not targeted at any u.s. person. it was targeted at a foreign national, and there was u.s. person information incidentally collected. that's why that incidentally collected is so important. >> rose: the impact of this in terms of how people characterized it raised questions about the independence of the house intelligence committee and john mccain said, for example, that the committee of congress no longer has credibility and needs a select commity. >> i think the chairman has d
or whether it be the c.i.a. ack to the relevant agency and say, i was given these, how do i think about these? are there any more like these? help me understand these. that should have been step one with. step two should have been to take the answer and share it with the entire committee before taking any action of briefing the president, let alone the media. >> rose: you said in the beginning this has nothing to do with whether president obama's administration bugged trump tower....
148
148
tv
eye 148
favorite 0
quote 0
the tools to do america harm. yesterday wikileaks published top-secret c.i.a. documents and computer code that describe how the agency can hack into phones, read encrypted messages, and use tvs for eavesdropping. the f.b.i. is investigating who leaked the files. at the white house tonight, president trump returned to deal making as he tried the persuade leaders to support the republican replacement for obamacare. nancy cordes tells us that the bill is meeting more opposition than expected. >> reporter: republicans began pushing their obamacare replacement bill through two house committees today, trying to outpace mounting criticism. >> what this bill needs is some extreme vetting. >> reporter: first the american medical association came out against it, then the a.a.r.p., which warned, "this bill would dramatically increase health care costs for americans aged 50 to 64 in the individual market." that age group would be the -- would see the largest cuts to obamacare tax credits, in some case by more than $5,000 a year. at the same time, insurers would be allowed t
the tools to do america harm. yesterday wikileaks published top-secret c.i.a. documents and computer code that describe how the agency can hack into phones, read encrypted messages, and use tvs for eavesdropping. the f.b.i. is investigating who leaked the files. at the white house tonight, president trump returned to deal making as he tried the persuade leaders to support the republican replacement for obamacare. nancy cordes tells us that the bill is meeting more opposition than expected....
83
83
Mar 8, 2017
03/17
by
WJLA
tv
eye 83
favorite 0
quote 0
just a trove of hacking information stolen right from the c.i.a. it's not clear how wikileaks got the information but we know now that 8,700 weeping angel is the program that remotely turns a samsung smart tv to a secret listening device. c.i.a. is apparently able to tap into encrypted messages from smartphones and tablets before they are encrypted. coming up at 5:00, we talk to a cyber security expert on how to protect your information. jonathan: virginia senator's tim kaine's son arrested last weekend in minnesota. linwood kaine was attempting to disrupt a pro president trump rally. according to police it took three officers to take him in. he was released without being charged but -- but charges could come in the future. alison: a horrific fire at an orphanage in guatemala. two dozen people was rushed to the hospital. the orphanage had been cited for overcrowding in the past for abuse an well. also new today, the ntsb is in biloxi, mississippi, investigating the crash that killed four people yesterday. amy aubert has been following the story toda
just a trove of hacking information stolen right from the c.i.a. it's not clear how wikileaks got the information but we know now that 8,700 weeping angel is the program that remotely turns a samsung smart tv to a secret listening device. c.i.a. is apparently able to tap into encrypted messages from smartphones and tablets before they are encrypted. coming up at 5:00, we talk to a cyber security expert on how to protect your information. jonathan: virginia senator's tim kaine's son arrested...
97
97
Mar 9, 2017
03/17
by
KTVU
tv
eye 97
favorite 0
quote 0
he said some companies have asked for more details about the c.i.a. cyber spying. wikileaks has decided to work with the tech companies to give them access to the hacking so they can fix their product. >> the technology is designed to hide itself. it's designed to remove traces of its activity. >> in the 9,000 documents released by wikileaks the c.i.a. was reported hacking into mobile phones and computers. >>> while the one committee vote is welcomed news for the gop some say there is still cause for concern. >> a small victory for the newly unveiled gop offered american health care act. after a gruelling 18 hour mark up concession the house to take a new swing at the measure passed a bill. >> but in the second committee with overlapping authority the debate continues to highlight the deep divisions between republican and democratic members. >> there's been a lot of revisionist history from my democrat colleagues last night who almost wanted to act like obamacare's done a lot of wonderful thing for families. >> but even republicans are split on the bill. yesterday,
he said some companies have asked for more details about the c.i.a. cyber spying. wikileaks has decided to work with the tech companies to give them access to the hacking so they can fix their product. >> the technology is designed to hide itself. it's designed to remove traces of its activity. >> in the 9,000 documents released by wikileaks the c.i.a. was reported hacking into mobile phones and computers. >>> while the one committee vote is welcomed news for the gop some...
112
112
Mar 11, 2017
03/17
by
KQED
tv
eye 112
favorite 0
quote 0
wikileaks publisher julian assange called the c.i.a.'s failure to secure top-secret information devastating incompetence. what about the timing of this, peter? julian assange has been linked to russian officials though he denies that link. peter: interesting. in some ways almost as interesting as the substance of what was released is the timing, the fact that it came up now. we're talking about wiretapping and the whole russia investigation. what is going on here? somebody somewhere has a plan. we just don't quite understand it. it doesn't necessarily mean it has anything to do with russia. it is very possible it is a c.i.a. disgruntled contractor or whistle blower to use a phrase much like edward snowden with the n.s.a. we don't really know the answer to that. but it does raise these questions again. what's going on here? who's, you know, what is the purpose of it? who was trying to accomplish what? i don't know the answer to that. robert: there are a lot of unanswered questions. another question somewhat related to wikileaks in the tru
wikileaks publisher julian assange called the c.i.a.'s failure to secure top-secret information devastating incompetence. what about the timing of this, peter? julian assange has been linked to russian officials though he denies that link. peter: interesting. in some ways almost as interesting as the substance of what was released is the timing, the fact that it came up now. we're talking about wiretapping and the whole russia investigation. what is going on here? somebody somewhere has a plan....
112
112
Mar 22, 2017
03/17
by
FOXNEWSW
tv
eye 112
favorite 0
quote 0
i had to brief the speaker first and then i had to talk to the c.i.a. director, the nsa director and i'm waiting to talk to the fbi director because he has not told us how he's going to get us this information. i talked to all of you. not you yourselves but those of you that exist at congress and then i voted and i said i was coming here to brief the president and i'll be glad -- >> can you clarify, mr. trump's communications that were in the report -- >> you're concerned about it but -- >> we're investigating it. >> you said no -- >> no, no. incidental -- because we're already investigating. we're not opening -- >> you said it has nothing to do with russia -- >> because it has to deal with the unmasking of names and whether or not this was gathered properly. >> so an ongoing investigation, you thought it was important enough -- >> remember, we've had an ongoing investigation into russia for a long time and their activities. we have the scoping document of the russian investigation and we will continue to investigation anything and anything and anything
i had to brief the speaker first and then i had to talk to the c.i.a. director, the nsa director and i'm waiting to talk to the fbi director because he has not told us how he's going to get us this information. i talked to all of you. not you yourselves but those of you that exist at congress and then i voted and i said i was coming here to brief the president and i'll be glad -- >> can you clarify, mr. trump's communications that were in the report -- >> you're concerned about it...
209
209
Mar 15, 2017
03/17
by
CSPAN2
tv
eye 209
favorite 0
quote 1
nor the c.i.a. reports on the number of searches for americans it conducts using metadata collected under section 702. now, the authority to conduct searches for americans' communications in section 702 data is new. before 2011, the fisa court prohibited, prohibited queries for u.s. persons. i'm going to repeat that. under the bush administration and the first two years of the obama administration, it was not possible to conduct these back-door, warrantless searches of law-abiding americans. then the obama administration sought to change the rules and obtained authority to conduct them. in april, 2014, the director of national intelligence in response to questions from myself and senator mark udall publicly acknowledged these warrantless searches, and my june, the house voted overwhelmingly to prohibit them. that prohibition didn't become law, but i can tell you it's sure going to be considered in the context of this reauthorization, and the house voted overwhelmingly, overwhelmingly to prohibit thes
nor the c.i.a. reports on the number of searches for americans it conducts using metadata collected under section 702. now, the authority to conduct searches for americans' communications in section 702 data is new. before 2011, the fisa court prohibited, prohibited queries for u.s. persons. i'm going to repeat that. under the bush administration and the first two years of the obama administration, it was not possible to conduct these back-door, warrantless searches of law-abiding americans....
177
177
Mar 16, 2017
03/17
by
KYW
tv
eye 177
favorite 0
quote 0
but the craziest accusation i ever had was they accused me of being recruited by the c.i.a.hen: they said that jon stewart-- >> was a recruit gr who recruited you to work for the c.i.a. >> to bring down the country through satire. >> stephen: and you and i both know-- you and i both know, that's not true. >> of course. >> stephen: because that would mean i'm probably an agent, too, because i've known jon longer than you have. >> yeah. >> stephen: and the idea that jon is recruiting us is a terrible idea. >> do you think he's actually in an "animal farm?" ( laughter ). >> stephen: i'll tell you what i love. my favorite thing about you being arrested-- if you'll pardon me having a favorite thing. >> please gr i'. >> stephen: i'm a hewn fan of you being arrested. when you were arrested you turned yourself in, and a crowd of people went with you and this is, again, after you wore this hat, mocking the president. you were arrested and you showed up... ( laughter ) wearing the hat. ( cheers and applause ) that's the real deal. >> thank you. >> stephen: that's a comedian. >> thank
but the craziest accusation i ever had was they accused me of being recruited by the c.i.a.hen: they said that jon stewart-- >> was a recruit gr who recruited you to work for the c.i.a. >> to bring down the country through satire. >> stephen: and you and i both know-- you and i both know, that's not true. >> of course. >> stephen: because that would mean i'm probably an agent, too, because i've known jon longer than you have. >> yeah. >> stephen: and...
462
462
Mar 18, 2017
03/17
by
CNNW
tv
eye 462
favorite 0
quote 1
. >> fees watching right now at mar-a-lago, he could pick up the phone at this minute and call the c.i.a., the nsa and ask the question, was trump tower surveilled and he would get an answer, right? >> michael all he needed to do two weeks ago was to roll over, punch that button on the red switch and say get these guys down here for lunch and he would have been satisfied and we would have been done with this. >> now as the former nsa director michael hayden, so alice, why didn't president trump end this wiretap controversy, instead of citing news reports to try to back up his claims? all he had to do was make a phone call, why didn't he do it in. >> i don't think the question is why didn't he end it. the question is why did he start it in the first place? to michael hayden's point, before he even tweeted this out first thing two weeks ago he should have come out with the information that he has. but look, here we are two weeks later, we're still talking about this. and we have house and senate republicans and democrats, we have foreign officials, all saying that they have no evidence to
. >> fees watching right now at mar-a-lago, he could pick up the phone at this minute and call the c.i.a., the nsa and ask the question, was trump tower surveilled and he would get an answer, right? >> michael all he needed to do two weeks ago was to roll over, punch that button on the red switch and say get these guys down here for lunch and he would have been satisfied and we would have been done with this. >> now as the former nsa director michael hayden, so alice, why...
40
40
Mar 15, 2017
03/17
by
CSPAN
tv
eye 40
favorite 0
quote 0
us have the proper computer technology that we need to go through the evidence that exists out at the c.i.a., out at langley. and we are trying to work through that. but i can tell you that it has become a bit of a stumbling block for our investigators to actually be able to compile and go through the information. so those are the three issues that i have for you today. and i'd like to ask mr. schiff if he'd like to say a couple of comments. mr. schiff: thank you, chairman. i want to join in saying that to date i see no evidence that supports the claim that president trump made that his predecessor had wiretapped he and his associates of trump tower. so far we've seen no basis for that whatever soffer -- whatsoever. we still want the justice department to respond to our letter. we've given them until march 20. we're both willing to use compulsory process if that's necessary. though neither of us, i think, believe that will be necessary. certainly at the open hearing that we have on march 20, we'll be asking the director if he has seen any evidence that substantiates the president's claim. i
us have the proper computer technology that we need to go through the evidence that exists out at the c.i.a., out at langley. and we are trying to work through that. but i can tell you that it has become a bit of a stumbling block for our investigators to actually be able to compile and go through the information. so those are the three issues that i have for you today. and i'd like to ask mr. schiff if he'd like to say a couple of comments. mr. schiff: thank you, chairman. i want to join in...
178
178
Mar 9, 2017
03/17
by
FOXNEWSW
tv
eye 178
favorite 0
quote 0
in moscow where new reports are surfacing that russia's fingerprints may be all over the wikileaks c.i.a the center of it all, julian assange giving a news conference. >> the c.i.a. lost control of its entire cyber weapons arsenal. >> now the c.i.a. is responding. even as julian assange said he will share the hacking tools with tech company. house republicans score a big victory in their fight to replace obamacare. they're still facing a fierce fight from doctors, hospitals and some within their own party,
in moscow where new reports are surfacing that russia's fingerprints may be all over the wikileaks c.i.a the center of it all, julian assange giving a news conference. >> the c.i.a. lost control of its entire cyber weapons arsenal. >> now the c.i.a. is responding. even as julian assange said he will share the hacking tools with tech company. house republicans score a big victory in their fight to replace obamacare. they're still facing a fierce fight from doctors, hospitals and some...
30
30
Mar 26, 2017
03/17
by
BLOOMBERG
tv
eye 30
favorite 0
quote 0
the cia? michael: c.i.a. on rare occasions. arlie: the other complaint, and john mccain has made this point as well, is rather then bring it to the house intelligence committee, he went right to the white house. michael: so i think, i think he took it to the white house and media. i think he had a responsibility, but i think he acted inappropriately. i think what he should have done and what practice says he should have done is number one, he should have gone back to the relevant agency, whether the fbi or cia or nsa, to go back to the relevant agency and said, i was given these. how do i think about these? are there any more like these? help me understand these. that should have been step one. step two should have been to take that answer and share it with the entire committee before taking any action of briefing the president, let alone the media. charlie: you said in the beginning this has nothing to do with whether president obama's administration bugged trump tower. michael: so what the president said was that he and his as
the cia? michael: c.i.a. on rare occasions. arlie: the other complaint, and john mccain has made this point as well, is rather then bring it to the house intelligence committee, he went right to the white house. michael: so i think, i think he took it to the white house and media. i think he had a responsibility, but i think he acted inappropriately. i think what he should have done and what practice says he should have done is number one, he should have gone back to the relevant agency,...