Edward Snowden was wanted after he had exposed the information about surveillance programs made by U.S. secretive agencies all over the world. His exposure opened the question about privacy. In U.S. where PRISM is used overall anonymity becomes a rarity. Someone accepted it, someone is angry, but everybody agrees that there is no easy way to avoid NSA curious eye.
“5 years ago, I would say that mobile phone is a small informer in your pocket and that you should get rid of it and should not carry. It doesn't matter now. There are automatic license plate readers which allow watching you.Read more
Deutsche Telecom Company staff cooperates with American secret services for more than 10 years. According to Focus the representatives of the company provided information to FBI from 2000. There occurred a document in edition of Focus magazine that points the German company representatives cooperate with FBI very close from 2000.
This cooperation began when German company had bought American company Voice Stream Wireless (now known as T-Mobile). After purchasing American company Germans had to sign a special agreement with American secret services that requires the disclosure of information.Read more
Katherine Losse claims social network's customer support could access any user's account with a master password. Facebook employees at one time had access to a “master password” that granted them access to every one of the accounts on the social network, according to a former employee.
And while “more secure forms of logging in to repair accounts” were later put into operation, Katherine Losse, who joined Facebook in 2005 as its 51st employee, told The Guardian Wednesday that members of the site should avoid sharing personal information, especially now that the scope of surveillance by the U.S. government has come to light.Read more
About a year after Facebook reportedly joined PRISM, Max Kelly, the social network's chief security officer left for a job at the National Security Agency, either a curious career move or one that makes complete sense.
The Chief Security Officer at a tech company is primarily concerned with keeping its information inside the company. Now working for an agency that tries to gather as much information as it can, Kelly's new job is sort of a complete reversal. Facebook, among other tech companies, has distanced itself from the government, claiming it only cooperates when it is legally required to.Read more
According to the documents, leaked by Edward Snowden to the Guardian, the UK’s Government Communications Headquarters (GCHQ) collects vast amounts of data from fibre-optic systems. The scale of the operation is massive, and the use of the data, also shared with the NSA is a big concern.
The project called Tempora aims to attach probes on 90% of the cables running through the UK. In the last 5 heart Tempora is half way - it has access to 200 fibre-optic cables (including the transatlantic traffic), collecting and analysing data from 46 of them. This adds up to 600 million “communication events” daily when full content of transmissions is preserved for 3 days and metadata for 30.Read more
There's been plenty of commentary concerning the latest NSA leak concerning its FISA court-approved "rules" for when it can keep data, and when it needs to delete it. As many of you pointed out in the comments to that piece – and many others are now exploring – the rules seem to clearly say that if your data is encrypted, the NSA can keep it.
As part of this, the rules note: In the context of a cryptanalytic effort, maintenance of technical data bases requires retention of all communications that are enciphered or reasonably believed to contain secret meaning, and sufficient duration may consist of any period of time.Read more
Agency surveillance programs, and disputing the notion that he is following in the footsteps of George W. Bush and Dick Cheney. In a PBS interview with Charlie Rose, Obama said efforts to track terrorists through phone and Internet surveillance have safeguards to prevent abusing the civil liberties of innocent Americans.
Obama cited both congressional and judicial oversight. When Rose asked, "should this be transparent in some way?" Obama responded: "It is transparent. That's why we set up the FISA court."Read more
WikiLeaks founder Julian Assange has slammed a recently exposed NSA mass-surveillance scheme as a "calamitous collapse in the rule of law." Google, Facebook and other tech giants apparently involved have denied giving the NSA access to their servers.
Assange accused the US government of trying to "launder" its activities concerning the large-scale spying program PRISM. The system was made public after a leaked classified National Security Agency (NSA) document was revealed earlier this week.
"The US administration has the phone records of everyone in the United States and is receiving them daily from carriers to the National Security Agency under secret agreements. That's what's come out," he said.Read more
Google was sentenced to disclose to the FBI users' data without a court warrant first. The decision on the case of Google, which tried to challenge the demands of the deadly Bureau, was issued by an American federal court. The hearing was held behind the closed doors.Google officials tried to challenge the FBI's demands.
The court considered 19 requests from the FBI which contradict the American constitution. However, the court decided Google must execute 17 demands and demands for additional information on two more users. The court left for Google to challenge individual queries if the company finds formal infringements. The lawsuit does not end there: Google intends to appeal the decision, and the FBI threatened to proceed against the company for failure to cooperate with investigations.Read more
Practically right after message sendings in Skype in which the link on certain https a resource contained, the given resource has been visited with IP, belonging Microsoft HQ in Redmond, the USA. It has been noticed that after transfer to a body of the message of the link, the traffic unusual to it distinguished by the server as potential attack of repeated reproduction is generated. In too time IP the address from which "malefactor" tries to get access under the link, belongs Microsoft.