background preloader

PRISM

Facebook Twitter

New PRISM slides say the program allows NSA to eavesdrop on live conversations. As controversy continues to swirl around whistleblower Edward Snowden and his whereabouts, the Washington Post has published several more slides from the NSA presentation that the former CIA staffer leaked to both the Post and the Guardian — slides that provide further details about the surveillance program known as PRISM and how it functions. Among other things, the slides highlight the large discrepancies between the way the program is described and the strenuous denials from tech giants such as Google, Yahoo, Microsoft and Facebook about their participation in such a program. For example, according to annotations from the Post — based on what the newspaper says is its own reporting, as well as other slides that haven’t been published yet — PRISM involves “government equipment on private company property” that is used to retrieve information from “participating companies such as Microsoft or Yahoo” that is then passed on “without further review” to the NSA.

Attacks from America: NSA Spied on European Union Offices. Information obtained by SPIEGEL shows that America's National Security Agency (NSA) not only conducted online surveillance of European citizens, but also appears to have specifically targeted buildings housing European Union institutions. The information appears in secret documents obtained by whistleblower Edward Snowden that SPIEGEL has in part seen.

A "top secret" 2010 document describes how the secret service attacked the EU's diplomatic representation in Washington. The document suggests that in addition to installing bugs in the building in downtown Washington, DC, the European Union representation's computer network was also infiltrated. In this way, the Americans were able to access discussions in EU rooms as well as emails and internal documents on computers. The attacks on EU institutions show yet another level in the broad scope of the NSA's spying activities. Security officials managed to track the calls to NATO headquarters in the Brussels suburb of Evere.

Stop Watching Us | Stop Watching Us. The Meta Question. (AP Photo/File) Ever since we learned about PRISM, the NSA’s secret project to collect metadata on Americans by tapping into commercial online services, we’ve been confounded by a tangle of intangible clashing values. We are asked to balance “preventing terrorism” against “protecting privacy.”

It is hard to demonstrate what terrorism would have occurred without preventive measures, and privacy is as much a feeling as a circumstance. A hypothetical versus an emotion: the invisibles clash at the coliseum. There is a danger that this crucial controversy is being framed in so blurry a manner that it will blend into the wind and blow away. Maybe reflecting on the terms will bring the situation into focus. Metadata Metadata systems are said to gather only tags and skeletal information, but not “content.” Metadata is the aspect of data that programs can most reliably “understand.” Security What we mean these days when we talk about security is preventing terrorist attacks. Privacy. Leaked NSA Doc Says It Can Collect And Keep Your Encrypted Data As Long As It Takes To Crack It.

Digital Due Process :: About the Issue. Prism-Affäre: "Stoppen Sie das, Mister Obama!" | Kultur. Der große Wissenschaftler Noam Chomsky über den amerikanischen Überwachungsskandal und die Angst des Staates vor dem Bürger. Speichern Drucken Twitter Facebook Google + DIE ZEIT: Herr Professor Chomsky, was ging Ihnen durch den Kopf, als Sie zum ersten Mal vom amerikanischen Überwachungsskandal erfuhren? Waren Sie überrascht? Noam Chomsky: Nein, überrascht war ich nicht, warum auch. Anzeige ZEIT: Sinngemäß: "Wenn es etwas gibt, von dem Sie nicht wollen, dass es irgendjemand erfährt, sollten Sie es vielleicht gar nicht erst tun. " Chomsky: Genau, das hat er gesagt. ZEIT: Das klingt fast, als sei Überwachung auch in Demokratien völlig normal.

Chomsky: Gerade wurde bekannt, dass Mitarbeiter des militärischen Nachrichtendienstes NSA die Befugnis haben, auch auf E-Mails zuzugreifen. Noam Chomsky © Virginie Montet/AFP/Getty Images Er ist ein Titan der Theorie und hat mit seiner Doktorarbeit 1957 eine Revolution in der Sprachwissenschaft ausgelöst, die größte Umwälzung in der zweiten Jahrhunderthälfte. Aclarada la política de privacidad de Apple en respuesta al PRISM. Por medio de una publicación en su página web quieren dejar claro su compromiso con los usuarios en cuanto a privacidad se refiere, y así contestar a las noticias que hemos conocido estos días en relación con PRISM.

Por medio de una publicación en su página web, se reafirma la política de privacidad de Apple y su compromiso con proteger los datos de sus usuarios. Han revelado que, en el período comprendido entre Diciembre del 2012 y Mayo de 2013, han recibido de 4.000 a 5.000 peticiones de datos de los consumidores, por parte del gobierno. En respuesta a las noticias publicadas en la última semana, Apple afirma que la primera vez que tuvieron noticias sobre el programa "PRISM" fue el 6 de Junio. También aclaran que no proveen ningún acesso directo a sus servidores a ninguna agencia del gobierno, y que cualquier contenido relacionado con los consumidores debe ser precedido de una orden judicial. Con estas declaraciones, la política de privacidad de Apple busca seguir intacta. iPhone 5 - Loving it is easy. That’s why so many people do. Snowden Smuggled Documents From NSA on a Thumb Drive | Threat Level. Photo: Alex Washburn / Wired The dreaded thumb drive has struck the Defense Department again as word comes that NSA whistleblower Edward Snowden smuggled out thousands of classified documents on one of the portable devices, despite the military’s efforts to ban them.

Investigators also know how many documents Snowden downloaded from the NSA network and what server he took them from, according to The Los Angeles Times, quoting an unnamed official. Officials have not indicated how many documents Snowden swiped, but the Guardian reported this week that Snowden left Hawaii with four laptops that “enabled him to gain access to some of the US government’s most highly-classified secrets.”

Snowden was a systems administrator, contracted out to the NSA by Booz Allan Hamilton. The Defense Department first banned thumb drives after its systems were infected with a virus in 2008 , which was introduced to its network on one of the devices. In December 2010 Maj. But such bans are not easy to enforce. On PRISM, partisanship and propaganda | Glenn Greenwald. (updated below - Update II - Update III) I haven't been able to write this week here because I've been participating in the debate over the fallout from last week's NSA stories, and because we are very busy working on and writing the next series of stories that will begin appearing very shortly.

I did, though, want to note a few points, and particularly highlight what Democratic Rep. Loretta Sanchez said after Congress on Wednesday was given a classified briefing by NSA officials on the agency's previously secret surveillance activities: "What we learned in there is significantly more than what is out in the media today. . . . I can't speak to what we learned in there, and I don't know if there are other leaks, if there's more information somewhere, if somebody else is going to step up, but I will tell you that I believe it's the tip of the iceberg . . . .

I have a column in the Guardian's newspaper edition tomorrow examining the fallout from these stories. They are wrong. TrevorEFF comments on We are members of StopWatching.Us anti-surveillance coalition. Reps of Mozilla, EFF, Free Press, OpenMedia, Access, the Media Alliance, Center for Democracy and Technology, PCCC, and Demand Progress; Alexis Ohanian, Julian Sanchez (C. Alternatives per a esquivar el programa nord-americà d'espionatge global. Fa poc es va saber que un programa de l'Agència Nacional de Seguretat (NSA) dels EUA i l'FBI servia per a accedir als servidors de nou grans empreses d'internet i obtenir-ne informació de ciutadans per a la intel·ligència i seguretat del país.

Aquesta revelació va suscitar una enorme preocupació a tot el món. Per mirar d'esquivar el PRISM, nom del programa secret, una web s'ha afanyat a presentar tot de serveis alternatius als dels grans portals implicats. PRISM Break, doncs, aplega una llista de serveis de tota mena, basats en programari lliure, que no pertanyen a cap de les nous grans empreses presumptament implicades en el programa d'espionatge de l'NSA i l'FBI: AOL, Apple, Facebook, Google, Microsoft, PalTalk, Skype, Yahoo! I YouTube. Notícies relacionades: The Guardian descobreix la identitat de l'informador del cas de ciberespionatge dels EUA (10-6-2013) Els EUA espien a través dels servidors de nou grans empreses d'internet, segons el Washington Post (7-6-2013)

'Nineteen Eighty-Four' Sales Spike Amid Surveillance Disclosures - Law Blog. Ron Paul warns US government may assassinate NSA leaker Snowden. Former Rep. Ron Paul (R-Texas) said Tuesday he’s worried the U.S. government will assassinate Edward Snowden, the 29-year-old man who admitted to leaking information about two top-secret National Security Administration surveillance programs to the press. “I’m worried about somebody in our government might kill him with a cruise missile or a drone missile,” Paul said on the Fox Business Network. “I mean, we live in a bad time where American citizens don’t even have rights, and that they can be killed, but the gentlemen is trying to tell the truth about what’s going on.”

The Justice Department is investigating Snowden’s admission. “[Snowden’s] not defecting, there are no signs of that happening,” Ron Paul continued Tuesday. Paul’s son, Kentucky senator Rand Paul (R), led a high-profile filibuster last month against the Obama administration’s drone policies. La vida, una mina. Todo bajo control. Nada ocurre en el espacio público sin que una cámara obtenga una grabación. Pronto el cielo estará infestado de artefactos voladores teledirigidos que obtendrán imágenes y mandarán información y alarmas. Todo lo que hagamos en los ordenadores o móviles, desde llamadas hasta transmisión de textos, quedará registrado, como ya ocurre con cualquier operación con nuestra tarjeta de crédito, y tal como ya hace con centenares de millones de comunicaciones la NSA (Agencia Nacional de Seguridad) de Estados Unidos.

Hasta aquí, es el Gran Hermano, el ojo universal que todo lo vigila. Si todo queda en eso, ya será mucho, demasiado. En todos los casos desvelados estos días sobre el megaespionaje de la NSA surge enseguida, mitad explicación mitad excusa, la expresión metadatos. Snowden nos recuerda que los avances tecnológicos llegan al uso civil tras nacer y crecer bajo la disciplina militar ¿Aplicaciones prácticas? Solution to NSA overreach – put people in charge of their own data.

Edward Snowden, who leaked information about far-reaching US government surveillance programs to the media, calls these programs the “architecture of oppression.” He says it is the public, not the government, who should decide their use. Skip to next paragraph Subscribe Today to the Monitor Click Here for your FREE 30 DAYS ofThe Christian Science MonitorWeekly Digital Edition At the very least, the secret and massive government surveillance of phone records and Internet data disclosed by Mr.

One reason this debate must happen is that data gathering has evolved to include “metadata.” The multiple layers of the kinds of information that are gathered today, and the many uses of that information, are far more revealing than people generally realize. In recent years, however, the public has mostly yawned over the need for a privacy-data discussion. The institutions in America that control information collection also haven’t put the topic of change seriously on the table.

Prism: MEPs hit out at US surveillance of people's personal data. MEPs criticised a secret American programme to gather user data and questioned the implications for privacy, data protection and EU-US security collaboration. Parliament held a debate on the Prism programme on Tuesday morning after the Guardian and the Washington Post revealed its existence over the weekend.

Most speakers roundly condemned the programme and the US's assurances that only non-Americans were targeted, but insisted on the value for Europe of security cooperation with the US. The Commission Speaking on behalf of the Commission, Tonio Borg, the commissioner for health and consumer policy, said: "Programmes such as the so-called Prism and the laws on the basis of which such programmes are authorised potentially endanger the fundamental right to privacy and to data protection of EU citizens. " The Commission will raise the issue at the EU-US ministerial in Dublin on Friday, Mr Borg added, pointing out that in a democracy, law enforcement bodies should follow the rules. NSA leak fallout: LIVE UPDATES. Published time: June 10, 2013 15:49 Edited time: September 13, 2013 00:18 The logo of the National Security Agency (NSA) (AFP Photo) Former CIA employee Edward Snowden has carried out one of the biggest leaks in US history, exposing a top-secret NSA surveillance program to the media.

Leading tech companies were revealed to be involved in intelligence gathering through PRISM spy tool. RT has developed an interactive map showing the countries being spied on, those aiding the US in their surveillance operations. Thursday, September 12 GMT 23:58: Edward Snowden’s leaks revealing mass data collection by the National Security Agency “probably needed to happen,” Director of National Intelligence James Clapper said Thursday. Wednesday, September 11 GMT 23:52: Matthew Green, a cryptography professor at Johns Hopkins University, was asked to remove a blog post he wrote regarding the latest leak, which revealed that the NSA is capable to subverting internet encryption.

Tuesday, September 10. Booz Allen's Role in N.S.A. Case Puts Spotlight on Carlyle. For years, the Carlyle Group has tried to shed its former reputation as a second home for government officials and a specialist in buying defense companies. But the recent fracas over the National Security Agency‘s surveillance programs highlights the private equity giant’s remaining ties to government work: its majority stake in Booz Allen Hamilton, the employer of the whistle-blower, Edward J.

Snowden. Shares of Booz Allen were down about 4 percent in midmorning trading on Monday, at $17.24. That values the government consultancy at about $2.6 billion. (That’s still above $17, the price at which the firm went public two-and-a-half years ago.) Still, the controversy over Mr. The buyout firm bought Booz Allen’s government contracting arm for $2.5 billion in 2008, when the consultancy separated the business from its commercial arm.

Carlyle held a roughly 67 percent stake in Booz Allen as of March 31, and still holds three seats on the firm’s board. As The New York Times noted: Huffington Post. Since the revelations last week that the U.S. culls the phone records of millions of Americans every day and accesses the network of tech giants like Apple, Facebook and Google to trace citizens, questions have been popping up about whether Canadians are subject to similar surveillance. So far, experts could only say that Canada has the legal loopholes and the capability to do so if it wishes. But documents obtained by the Globe and Mail and The Canadian Press suggest that Canada is, indeed, engaged in mass warrantless surveillance. According to the Globe, Defence Minister Peter MacKay signed a ministerial directive in November, 2011, authorizing the re-start of “a secret electronic eavesdropping program that scours global telephone records and Internet data trails – including those of Canadians – for patterns of suspicious activity.”

The program evidently had been launched in 2005 by then-Defence Minister Bill Graham, in the Liberal government of Paul Martin. Loading Slideshow. Former C.I.A. Worker Says He Leaked Surveillance Data. We Asked For This - TechCrunch. Google, Facebook Founders Express Fears Over NSA Access to Verizon Data | MIT Technology Review. Boundless Informant: the NSA's secret tool to track global surveillance data. HootSuite. Boundless Informant: the NSA's secret tool to track global surveillance data. So Just Exactly What Is NSA’s Prism, More Than Reprehensibly Evil? NSA Phone-Record Tracking Troubles Privacy Scholars. NSA Phone-Record Tracking Troubles Privacy Scholars | MIT Technology Review. CIA's 'Facebook' Program Dramatically Cut Agency's Costs | Video. NSA's Prism surveillance program: how it works and what it can do. Designer tweaks PRISM PowerPoint so it won't hurt your brain.

Anonymous releases private NSA documents regarding spying. Tech Giants Built Segregated Systems For NSA Instead Of Firehoses To Protect Innocent Users From PRISM - TechCrunch. Google: There Is No PRISM Back Door To Our Servers, No Open-Ended Access To User Data - TechCrunch. NSA slides explain the PRISM data-collection program. NSA has direct access to tech giants' systems for user data, secret files reveal. EEUU 'espía' a través de los servidores de Apple, Google o Facebook | Estados Unidos.

EEUU 'espía' a través de los servidores de Apple, Google o Facebook | Estados Unidos.