Clinton’s comments ‘terrifying’
In response to Clinton’s debate comments about tech and national security:
I would hope that, given the extraordinary capacities that the tech community has and the legitimate needs and questions from law enforcement, that there could be a Manhattan-like project — something that would bring the government and the tech communities together to see they’re not adversaries, they’ve got to be partners…Maybe the backdoor is the wrong door, and I understand what Apple and others are saying about that. I know that law enforcement needs the tools to keep us safe.
Snowden says:
Aaaaaaaaand Hillary just terrified everyone with an internet connection. #DemDebate
— Edward Snowden (@Snowden) December 20, 2015
Would go to prison to return to US
In an interview with BBC’s Panorama Snowden says he has offered to return to the United States and go to jail for leaking details of NSA programs, but had not received a formal plea-deal offer.
[I’ve] volunteered to go to prison with the government many times… So far they’ve said they won’t torture me, which is a start, I think. But we haven’t gotten much further than that…The question is, if I was a traitor, who did I betray? I gave all of my information to American journalists and free society generally. I have paid a price but I feel comfortable with the decisions I’ve made. If I’m gone tomorrow, I’m happy with what I had. I feel blessed.
Joins Twitter
Snowden joins Twitter. He only follows a single account, the NSA.
Can you hear me now?
— Edward Snowden (@Snowden) September 29, 2015
Details warrantless hacker targeting
Snowden releases National Security Agency documents showing that in 2012 the Justice Department authorized the NSA to search Internet cables on American soil without a warrant for evidence of computer hacking schemes originating abroad, as well as targeting hackers even when it could not establish any links to foreign powers. The secret memos from 2012 say the NSA could watch Internet traffic flowing to suspicious addresses or containing malware, as well as monitor addresses and cyber signatures.