background preloader

U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program

U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post. The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley. Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. PRISM was launched from the ashes of President George W. Sens. Roots in the ’70s A ‘directive’ “Yahoo!

http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html

Related:  The NSA Files: PRISM & Boundless InformationAnonymat, Profiling,Tracking, Alg RecommandationNSA | PRISMA Nation of CorruptionGrondrechten

Edward Snowden: the whistleblower behind the NSA surveillance revelations The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell. The Guardian, after several days of interviews, is revealing his identity at his request. From the moment he decided to disclose numerous top-secret documents to the public, he was determined not to opt for the protection of anonymity. "I have no intention of hiding who I am because I know I have done nothing wrong," he said. Snowden will go down in history as one of America's most consequential whistleblowers, alongside Daniel Ellsberg and Bradley Manning.

BitTorrent’s Future? DHT, PEX and Magnet Links Explained This week The Pirate Bay confirmed it would shut down its tracker for good, instead encouraging the use of DHT, PEX and magnet links. This move confounded many BitTorrent enthusiasts, who although wishing to adapt, were confronted with hard to grasp terminology and technology. Time for some explaining. NSA Prism program taps in to user data of Apple, Google and others The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian. The NSA access is part of a previously undisclosed program called Prism, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says. The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation – classified as top secret with no distribution to foreign allies – which was apparently used to train intelligence operatives on the capabilities of the program. The document claims "collection directly from the servers" of major US service providers.

PRISM (surveillance program) PRISM logo used in the slides PRISM is a clandestine mass electronic surveillance data mining program launched in 2007 by the National Security Agency (NSA), with participation from an unknown date by the British equivalent agency, GCHQ.[1][2][3] PRISM is a government code name for a data-collection effort known officially by the SIGAD US-984XN.[4][5] The Prism program collects stored Internet communications based on demands made to Internet companies such as Google Inc. under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms.[6] The NSA can use these Prism requests to target communications that were encrypted when they traveled across the Internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier,[7][8] and to get data that is easier to handle, among other things.[9] Slide showing that much of the world's communications flow through the U.S. Tasking, Points to Remember.

NSA surveillance: The US is behaving like China Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it's abusively using government powers to interfere in individuals' privacy. This is an important moment for international society to reconsider and protect individual rights. What the N.S.A. Wants in Brazil One of the more curious revelations from Edward Snowden’s trove of secret N.S.A. documents was a recent report that United States spy agencies have been vacuuming up communications in Brazil. Glenn Greenwald, who lives in Brazil, broke this story in O Globo, one of that country’s major newspapers, on July 6th. Greenwald, in an follow-up piece in the Guardian, pointed to a rough Google translation of his original July 6th report:

Magnet URI scheme The Magnet URI scheme, defines the format of magnet links, a de facto standard for identifying files by their content, via cryptographic hash value rather than by their location. Although magnet links can be used in a number of contexts, they are particularly useful in peer-to-peer file sharing networks because they allow resources to be referred to without the need for a continuously available host, and can be generated by anyone who already has the file, without the need for a central authority to issue them. This makes them popular for use as "guaranteed" search terms within the file sharing community where anyone can distribute a magnet link to ensure that the resource retrieved by that link is the one intended, regardless of how it is retrieved. History[edit] Technical description[edit]

How secure is the National Security Agency? Many are concerned about the National Security Agency (NSA) collection of data on US companies and individuals and the very real possibility that it has a way of directly accessing the servers of the world's largest computing platforms: Google, Facebook, Microsoft, etc. It's certainly a situation that deserves attention and concern. But what's missing in this discussion is this: how secure is the NSA's spying system? Terrorism Research Center The Current TRC Logo The Terrorism Research Center (TRC) is non-profit think tank focused on investigating and researching global terrorism issues through multi-disciplinary collaboration amongst a group of international experts. Terrorism Research Center (1996 to 2012)[edit] The Terrorism Research Center (TRC) was founded in 1996 by Matthew Devost, Brian Houghton, and Neal Pollard to establish an organization with a specific focus on terrorism and emerging international security issues like information warfare.

What, let gays get married? We must be bonkers - Comment - Voices Similarly, Hitler and Eva Braun’s marriage didn’t lessen the sanctity of heterosexual blessings, because whatever else, their ceremony in the bunker was healthy and natural and not all icky and weird. But now gays can get married, the offices at Relate will be bursting. Couples will have to be seen six at a time to fit them all in. “Our marriage seems pointless now,” they’ll whimper. “Now gays can get married, we spend every evening shooting each other with air rifles and we’ve put our kids into care.” This is the latest of a long line of things we can no longer enjoy because gays are allowed to do them as well. To hunt Osama bin Laden, satellites watched over Abbottabad, Pakistan, and Navy SEALs The disclosures about the hunt for the elusive founder of al-Qaeda are contained in classified documents that detail the fiscal 2013 “black budget” for U.S. intelligence agencies, including the NSA and the CIA. The documents, provided to The Washington Post by former NSA contractor Edward Snowden, make only brief references to the bin Laden operation. But the mission is portrayed as a singular example of counterterrorism cooperation among the U.S. government’s numerous intelligence agencies. Eight hours after the raid, according to the documents, a forensic intelligence laboratory run by the Defense Intelligence Agency in Afghanistan had analyzed DNA from bin Laden’s corpse and “provided a conclusive match” confirming his identity.

Flash Cookies: The Silent Privacy Killer For those people that want to see what is actually stored in these files, Gnash includes a utility program called "soldumper", which will do this for you to make sure your privacy isn't being invaded. -- rob Original link Flash Cookies: The Silent Privacy Killer October 9th, 2008 Tech Companies Concede to Surveillance Program Connie Zhou/Google, via Associated Press A Google data center in Council Bluffs, Iowa. Google says it scrutinizes each government request and notifies users if it is allowed.

Related:  faizabdelhafidNSA Snowden - mass 'surveillance'- spying