Edward Snowden in an interview by The Intercept’s Jeremy Scahill at the South by Southwest Conference in Austin, Texas has advised the President Donald Trump to first fix the NSA Mass surveillance programs that gather information of each American and then inquire the government to fix his private communications.
Trump’s accusation to prove that President Obama has spied Trump tower was not proved.
Terrible! Just found out that Obama had my "wires tapped" in Trump Tower just before the victory. Nothing found. This is McCarthyism!
— Donald J. Trump (@realDonaldTrump) March 4, 2017
Snowden said, “If Donald Trump or anyone else wants us to take this seriously, they have to show evidence.”
He also said, “And the fact that they have not despite the severity of this allegation means that they’re trying to make political hay — I suspect — out of something that affects all of us, which is that mass surveillance is making all of us vulnerable.”
During an Upstream program conducted under section 702 of the Foreign Affairs Surveillance Act, Snowden described that how NSA’s surveillance has data about phones and IP addresses of everyone from common person to President. Also the information about the internet cables entering and exiting the US which apparently targets immigrants.
Snowden said, “If Donald Trump wants to take this seriously, he needs to fix the problem that everyone in America’s communications are being collected right now, without a warrant, and they’re going into the bucket, and they’re protected by very lax internal policy regulations, and this simply is not enough.”
Past this year, President Trump said to extend the NSA’s program which was to expire. Rather than trying to eradicate the NSA’s authorities under section 702. While in the meantime proceeding with President Obama’s refusal to give the administrative branch even a rough approximation of what extent of domestic communications they catch.
Share this article
About the Author
Waqas is a cybersecurity journalist and writer who has a knack for writing technology and online privacy-focused articles. He strives to help achieve a secure online environment and is skilled in writing topics related to cybersecurity, AI, DevOps, Cloud security, and a lot more. As seen in: Computer.org, Nordic APIs, Infosecinstitute.com, Tripwire.com, and VentureBeat.
More from Iam WaqasRelated Posts
Passengers’ Data Stored on User Devices, not on DigiYatra Storage, says India Govt
KEY TAKEAWAYS Unblocking streaming content from Amazon Prime is easy only if you know the reliable V...
NCSC Chief: Clear Rules Needed to Prevent Cyberspace Conflict and Struggle
A safe and secure digital world necessitates a clear definition and enforcement of international cyb...
‘Revive’ has been upgraded to a banking Trojan on Android
This month, Cleafy’s security researchers discovered a new Android Banking Trojan in the wild....
Asian Industrial Control Systems Targeted by Hackers Using the Shadowpad Backdoor
Unpatched Microsoft Exchange servers in various Asian countries were the target of an attack campaig...
Data Breaches Could Occur Due to Kubernetes Misconfigurations That Were Leaked.
Over 900,000 Kubernetes (K8s) have been discovered to be vulnerable to malicious scans and/or data-e...
Attacks by Cybercriminals Will Become the Main Threat in 2024. Privacy Issues Tendencies
Internet Privacy is the main Concern today Advertisers track your online activities and interf...