Anonymous ID: 3c28b8 May 26, 2018, 1:40 a.m. No.1546468   🗄️.is 🔗kun   >>6489 >>6540 >>6578

>>1546462

 

Everyone wants to know what the heck does fb4e568623b5f8cf7e932e6ba7eddc0db9f42a712718f488bdc0bf880dd3 mean?

In the latest cryptic tweet to come from Wikileaks's Julian Assange a 60 digit code now has the internet scratching it's head. The curious tweet also included the song "Paper Planes" by MIA which has led many to speculate about what the significance of this release may be…

 

In this video

Dan Dicks of Press For Truth encourages the viewer to not get their hopes up about a major truth bomb coming anytime soon as this appears to be yet again another limited hangout coming from Assange and wikileaks.

Anonymous ID: 3c28b8 May 26, 2018, 1:50 a.m. No.1546490   🗄️.is 🔗kun

“It Is About Bloody Time”: Harvey Weinstein Assault Survivor Reacts to Arrest in NYC on Rape Charges

 

https:// kpfa.org/player/?audio=286107

 

https:// kpfa.org/episode/democracy-now-may-25-2018/

Anonymous ID: 3c28b8 May 26, 2018, 2:01 a.m. No.1546528   🗄️.is 🔗kun   >>6547

>>1546494

>>1546494

Got that.

 

CBBE 4CF3 84B5 FCA7 3BAA F3D0 FF72 6BC2 1C1D A0C7

 

https:// twitter.com/astepanovich/status/977576205447761920

 

https://

www.nytimes.com/2018/03/24/us/politics/unlock-phones-encryption.html

Anonymous ID: 3c28b8 May 26, 2018, 2:05 a.m. No.1546547   🗄️.is 🔗kun

>>1546528

Going Dark

 

Law enforcement at all levels has the legal authority to intercept and access communications and information pursuant to court orders, but it often lacks the technical ability to carry out those orders because of a fundamental shift in communications services and technologies. This scenario is often called the “Going Dark” problem.

 

Law enforcement faces two distinct Going Dark challenges. The first concerns real-time court-ordered interception of data in motion, such as phone calls, e-mail, text messages, and chat sessions. The second challenge concerns “data at rest”—court-ordered access to data stored on devices, like e-mail, text messages, photos, and videos. Both real-time communications and stored data are increasingly difficult for law enforcement to obtain with a court order or warrant. This is eroding law enforcement’s ability to quickly obtain valuable information that may be used to identity and save victims, reveal evidence to convict perpetrators, or exonerate the innocent.

 

Make no mistake, the FBI supports strong encryption, and we know firsthand the damage that can be caused by vulnerable and insecure systems. As such, the Department of Justice, the FBI, and other law enforcement agencies are on the front lines of the fight against cyber crime. The government uses strong encryption to secure its own electronic information, and it encourages the private sector and members of the public to do the same.

 

However, the challenges faced by law enforcement to lawfully and quickly obtain valuable information are getting worse. The Communications Assistance for Law Enforcement Act (CALEA) was enacted in 1994 and applies only to traditional telecommunications carriers, providers of interconnected voice over internet protocol (VoIP) services, and providers of broadband access services. Currently thousands of companies provide some form of communication service, and most are not required by CALEA to develop lawful intercept capabilities for law enforcement. As a result, many of today’s communication services are developed and deployed without consideration of law enforcement’s lawful intercept and evidence collection needs.

 

When changes in technology hinder law enforcement’s ability to exercise investigative tools and follow critical leads, we may not be able to root out the child predators hiding in the shadows of the Internet, or find and arrest violent criminals who are targeting our neighborhoods. We may not be able to identify and stop terrorists who are using social media to recruit, plan, and execute an attack in our country. We may not be able to recover critical information from a device that belongs to a victim who cannot provide us with the password, especially when time is of the essence. These are not just theoretical concerns.

 

We continue to identify individuals who seek to join the ranks of foreign fighters traveling in support of the Islamic State of Iraq and the Levant, commonly known as ISIL, and also homegrown violent extremists who may aspire to attack the United States from within. These threats remain among the highest priorities for the FBI, and the United States government as a whole.

 

Of course, encryption is not the only technology terrorists and criminals use to further their ends. Terrorist groups, such as ISIL, use the Internet to great effect. With the widespread horizontal distribution of social media, terrorists can spot, assess, recruit, and radicalize vulnerable individuals of all ages in the United States either to travel or to conduct a homeland attack. As a result, foreign terrorist organizations now have direct access into the United States like never before. Some of these conversations occur in publicly accessed social networking sites, but others take place via private messaging platforms. These encrypted direct messaging platforms are tremendously problematic when used by terrorist plotters.

 

To help address the challenges posed by advancing communications services and technologies, the Department of Justice’s National Domestic Communications Assistance Center (NDCAC) leverages and shares the law enforcement community’s collective technical knowledge, solutions, and resources. NDCAC also works on behalf of federal, state, local, and tribal law enforcement agencies to strengthen law enforcement’s relationships with the communications industry.

 

 

https://

www.fbi.gov/services/operational-technology/going-dark