What's new

prism and nsa - how america spies on us

kamrananvaar

FULL MEMBER
Joined
Dec 2, 2011
Messages
698
Reaction score
1
Microsoft Waits to Fix Your Software Bugs So the NSA Can
Use Them First
By Rebecca Greenfield | The Atlantic Wire – 18 hrs ago
In a move as fiendishly clever as it is galling, Microsoft tells the U.S. government about bugs in its notoriously buggy software
before it fixes them so that intelligence agencies can use the vulnerabilities for the purposes of cyberspying. "That
information can be used to protect government computers and to access the computers of terrorists or military foes," sources
tell Bloomberg's Michael Riley. But still, the biggest software company on Earth is holding off on its blue-screen-of-death
problems to turn them into real-life spy features, an impressive feat that will no doubt frustrate consumers: We are, after all,
waiting for our computers to work so the nation's spy services — almost certainly including the National Security Agency,
given its massive espionage umbrella — can take advantage of the problems with them first. their mistakes first.
RELATED: Obama Administration Defends Its Right to Take All Your Phone Records
That's just one of the many ways the U.S. government and tech companies work together in fiendish ways to more easily
allow for complex surveillance, according to Bloomberg's in-depth report:
RELATED: CIA-Funded Startup Palantir Denies Link to NSA — but They Both Make a 'Prism'
In addition to handing over all U.S. phone-call metadata, telecoms give intelligence agencies access to facilities and data
"offshore" so that they don't have to go through a judge to get permission.
McAfee "regularly cooperates" with the U.S. government, handing over all the information on hackers that its firewalls
collect. The company, of course, insists that none of its data collection is personal: "We do not share any type of personal
information with our government agency partners," McAfee said in a statement.
"U.S telecommunications, Internet, power companies and others" — so, like, everyone — detail how they systems work to
U.S. intelligence officials so they can analyze potential vulnerabilities, both for safety and to use against foreign
governments.
Technically, none of this Silicon Valley-aided espionage takes place with "direct access" so much as through what
Bloomberg describes as a "committing officer" who has immunity from lawsuits.
If it hasn't become extremely clear over the last week, the U.S. government is buddy-buddy with private technology
companies. Not only do you have to give up your right to privacy; turns out, we don't even have the right to quick bug fixes.
 
. .
Web giants get broader surveillance revelations
Associated Press – 1 hr 55 mins ago
SAN FRANCISCO (AP) — Facebook and Microsoft Corp. representatives said that after negotiations with national security
officials their companies have been given permission to make new but still very limited revelations about government orders
to turn over user data.
The announcements Friday night come at the end of a week when Facebook, Microsoft and Google, normally rivals, had
jointly pressured the Obama administration to loosen their legal gag on national security orders.
Those actions came after Edward Snowden, a 29-year-old American who works as a contract employee at the National
Security Agency, revealed to The Guardian newspaper the existence of secret surveillance programs that gathered Americans'
phone records and other data. The companies did not link their actions to Snowden's leaks.
Ted Ullyot, Facebook's general counsel, said in a statement that Facebook is only allowed to talk about total numbers and
must give no specifics. But he said the permission it has received is still unprecedented, and the company was lobbying to
reveal more.
Using the new guidelines, Ullyot said Facebook received between 9,000 and 10,000 government requests from all
government entities from local to federal in the last six months of 2012, on topics including missing children investigations,
fugitive tracking and terrorist threats. The requests involved the accounts of between 18,000 and 19,000 Facebook users.
The companies were not allowed to make public how many orders they received from a particular agency or on a particular
subject. But the numbers do include all national security related requests including those submitted via national security
letters and under the Foreign Intelligence Surveillance Act, or FISA, which companies had not previously been allowed to
reveal.
The companies remain barred from revealing whether they've actually received FISA requests, and can only say that any
they've received are included in the total reported figures.
Microsoft released similar numbers for the same period, but downplayed how much they revealed.
"We continue to believe that what we are permitted to publish continues to fall short of what is needed to help the
community understand and debate these issues," John Frank, Microsoft's vice president and deputy general counsel said in a
statement.
Frank said Microsoft received between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders
affecting between 31,000 and 32,000 accounts.
Both attorneys emphasized in their statements that those affected by the orders represent a "tiny fraction" of their huge user
bases.
Google did not release its own numbers, saying late Friday that it was waiting to be able to reveal more specific and
meaningful information.
"We have always believed that it's important to differentiate between different types of government requests," Google said in
a statement. "We already publish criminal requests separately from national security letters. Lumping the two categories
together would be a step back for users. Our request to the government is clear: to be able to publish aggregate numbers of
national security requests, including FISA disclosures, separately."
Facebook repeated recent assurances that the company scrutinizes every government request, and works aggressively to
protect users' data. Facebook said it has a compliance rate of 79 percent on government requests.
"We frequently reject such requests outright, or require the government to substantially scale down its requests, or simply give the government much less data than it has requested," Ullyot said." And we respond only as required by law."
 
.
Secret to Prism program: Even bigger data seizure
What makes Prism work? National Security Agency's megadata collection from Internet pipeline
By Stephen Braun, Anne Flaherty, Jack Gillum and Matt Apuzzo, Associated Press | Associated Press – 29 mins ago
WASHINGTON (AP) -- In the months and early years after 9/11, FBI agents began showing up at Microsoft Corp. more
frequently than before, armed with court orders demanding information on customers.
Around the world, government spies and eavesdroppers were tracking the email and Internet addresses used by suspected
terrorists. Often, those trails led to the world's largest software company and, at the time, largest email provider.
The agents wanted email archives, account information, practically everything, and quickly. Engineers compiled the data,
sometimes by hand, and delivered it to the government.
Often there was no easy way to tell if the information belonged to foreigners or Americans. So much data was changing
hands that one former Microsoft employee recalls that the engineers were anxious about whether the company should
cooperate.
Inside Microsoft, some called it "Hoovering" — not after the vacuum cleaner, but after J. Edgar Hoover, the first FBI
director, who gathered dirt on countless Americans.
This frenetic, manual process was the forerunner to Prism, the recently revealed highly classified National Security Agency
program that seizes records from Internet companies. As laws changed and technology improved, the government and
industry moved toward a streamlined, electronic process, which required less time from the companies and provided the
government data in a more standard format.
The revelation of Prism this month by the Washington Post and Guardian newspapers has touched off the latest round in a
decade-long debate over what limits to impose on government eavesdropping, which the Obama administration says is
essential to keep the nation safe.
But interviews with more than a dozen current and former government and technology officials and outside experts show
that, while Prism has attracted the recent attention, the program actually is a relatively small part of a much more expansive
and intrusive eavesdropping effort.
Americans who disapprove of the government reading their emails have more to worry about from a different and larger NSA
effort that snatches data as it passes through the fiber optic cables that make up the Internet's backbone. That program,
which has been known for years, copies Internet traffic as it enters and leaves the United States, then routes it to the NSA for
analysis.
Whether by clever choice or coincidence, Prism appears to do what its name suggests. Like a triangular piece of glass, Prism
takes large beams of data and helps the government find discrete, manageable strands of information.
The fact that it is productive is not surprising; documents show it is one of the major sources for what ends up in the
president's daily briefing. Prism makes sense of the cacophony of the Internet's raw feed. It provides the government with
names, addresses, conversation histories and entire archives of email inboxes.
Many of the people interviewed for this report insisted on anonymity because they were not authorized to publicly discuss a
classified, continuing effort. But those interviews, along with public statements and the few public documents available,
show there are two vital components to Prism's success.
The first is how the government works closely with the companies that keep people perpetually connected to each other and
the world. That story line has attracted the most attention so far.
The second and far murkier one is how Prism fits into a larger U.S. wiretapping program in place for years.
___
Deep in the oceans, hundreds of cables carry much of the world's phone and Internet traffic. Since at least the early 1970s,
YAHOO! NEWS6/15/13 Secret toPrismprogram:Evenbigger dataseizure- Yahoo! News
news.yahoo.com/secret-prism-program-even-bigger-140403980.html# 2/5
the NSA has been tapping foreign cables. It doesn't need permission. That's its job.
But Internet data doesn't care about borders. Send an email from Pakistan to Afghanistan and it might pass through a mail
server in the United States, the same computer that handles messages to and from Americans. The NSA is prohibited from
spying on Americans or anyone inside the United States. That's the FBI's job and it requires a warrant.
Despite that prohibition, shortly after the Sept. 11 terrorist attacks, President George W. Bush secretly authorized the NSA to
plug into the fiber optic cables that enter and leave the United States, knowing it would give the government unprecedented,
warrantless access to Americans' private conversations.
Tapping into those cables allows the NSA access to monitor emails, telephone calls, video chats, websites, bank transactions
and more. It takes powerful computers to decrypt, store and analyze all this information, but the information is all there,
zipping by at the speed of light.
"You have to assume everything is being collected," said Bruce Schneier, who has been studying and writing about
cryptography and computer security for two decades.
The New York Times disclosed the existence of this effort in 2005. In 2006, former AT&T technician Mark Klein revealed
that the company had allowed the NSA to install a computer at its San Francisco switching center, a spot where fiber optic
cables enter the U.S.
What followed was the most significant debate over domestic surveillance since the 1975 Church Committee, a special Senate
committee led by Sen. Frank Church, D-Idaho, reined in the CIA and FBI for spying on Americans.
Unlike the recent debate over Prism, however, there were no visual aids, no easy-to-follow charts explaining that the
government was sweeping up millions of emails and listening to phone calls of people accused of no wrongdoing.
The Bush administration called it the "Terrorist Surveillance Program" and said it was keeping the United States safe.
"This program has produced intelligence for us that has been very valuable in the global war on terror, both in terms of
saving lives and breaking up plots directed at the United States," Vice President Dick Cheney said at the time.
The government has said it minimizes all conversations and emails involving Americans. Exactly what that means remains
classified. But former U.S. officials familiar with the process say it allows the government to keep the information as long as
it is labeled as belonging to an American and stored in a special, restricted part of a computer.
That means Americans' personal emails can live in government computers, but analysts can't access, read or listen to them
unless the emails become relevant to a national security investigation.
The government doesn't automatically delete the data, officials said, because an email or phone conversation that seems
innocuous today might be significant a year from now.
What's unclear to the public is how long the government keeps the data. That is significant because the U.S. someday will
have a new enemy. Two decades from now, the government could have a trove of American emails and phone records it can
tap to investigative whatever Congress declares a threat to national security.
The Bush administration shut down its warrantless wiretapping program in 2007 but endorsed a new law, the Protect
America Act, which allowed the wiretapping to continue with changes: The NSA generally would have to explain its
techniques and targets to a secret court in Washington, but individual warrants would not be required.
Congress approved it, with Sen. Barack Obama, D-Ill., in the midst of a campaign for president, voting against it.
"This administration also puts forward a false choice between the liberties we cherish and the security we provide," Obama
said in a speech two days before that vote. "I will provide our intelligence and law enforcement agencies with the tools they
need to track and take out the terrorists without undermining our Constitution and our freedom."
___
When the Protect America Act made warrantless wiretapping legal, lawyers and executives at major technology companies
knew what was about to happen.
One expert in national security law, who is directly familiar with how Internet companies dealt with the government during
that period, recalls conversations in which technology officials worried aloud that the government would trample on6/15/13 Secret toPrismprogram:Evenbigger dataseizure- Yahoo! News
news.yahoo.com/secret-prism-program-even-bigger-140403980.html# 3/5
Americans' constitutional right against unlawful searches, and that the companies would be called on to help.
The logistics were about to get daunting, too.
For years, the companies had been handling requests from the FBI. Now Congress had given the NSA the authority to take
information without warrants. Though the companies didn't know it, the passage of the Protect America Act gave birth to a
top-secret NSA program, officially called US-98XN.
It was known as Prism. Though many details are still unknown, it worked like this:
Every year, the attorney general and the director of national intelligence spell out in a classified document how the
government plans to gather intelligence on foreigners overseas.
By law, the certification can be broad. The government isn't required to identify specific targets or places.
A federal judge, in a secret order, approves the plan.
With that, the government can issue "directives" to Internet companies to turn over information.
While the court provides the government with broad authority to seize records, the directives themselves typically are
specific, said one former associate general counsel at a major Internet company. They identify a specific target or groups of
targets. Other company officials recall similar experiences.
All adamantly denied turning over the kind of broad swaths of data that many people believed when the Prism documents
were first released.
"We only ever comply with orders for requests about specific accounts or identifiers," Microsoft said in a statement.
Facebook said it received between 9,000 and 10,000 requests for data from all government agencies in the second half of last
year. The social media company said fewer than 19,000 users were targeted.
How many of those were related to national security is unclear, and likely classified. The numbers suggest each request
typically related to one or two people, not a vast range of users.
Tech company officials were unaware there was a program named Prism. Even former law enforcement and
counterterrorism officials who were on the job when the program went live and were aware of its capabilities said this past
week that they didn't know what it was called.
What the NSA called Prism, the companies knew as a streamlined system that automated and simplified the "Hoovering"
from years earlier, the former assistant general counsel said. The companies, he said, wanted to reduce their workload. The
government wanted the data in a structured, consistent format that was easy to search.
Any company in the communications business can expect a visit, said Mike Janke, CEO of Silent Circle, a company that
advertises software for secure, encrypted conversations. The government is eager to find easy ways around security.
"They do this every two to three years," said Janke, who said government agents have approached his company but left
empty-handed because his computer servers store little information. "They ask for the moon."
That often creates tension between the government and a technology industry with a reputation for having a civil libertarian
bent. Companies occasionally argue to limit what the government takes. Yahoo even went to court and lost in a classified
ruling in 2008, The New York Times reported Friday.
"The notion that Yahoo gives any federal agency vast or unfettered access to our users' records is categorically false," Ron
Bell, the company's general counsel, said recently.
Under Prism, the delivery process varied by company.
Google, for instance, says it makes secure file transfers. Others use contractors or have set up stand-alone systems. Some have
set up user interfaces making it easier for the government, according to a security expert familiar with the process.
Every company involved denied the most sensational assertion in the Prism documents: that the NSA pulled data "directly
from the servers" of Microsoft, Yahoo, Google, Facebook, AOL and more.
Technology experts and a former government official say that phrasing, taken from a PowerPoint slide describing the
program, was likely meant to differentiate Prism's neatly organized, company-provided data from the unstructured6/15/13 Secret toPrismprogram:Evenbigger dataseizure- Yahoo! News
news.yahoo.com/secret-prism-program-even-bigger-140403980.html# 4/5
information snatched out of the Internet's major pipelines.
In slide made public by the newspapers, NSA analysts were encouraged to use data coming from both Prism and from the
fiber-optic cables.
Prism, as its name suggests, helps narrow and focus the stream. If eavesdroppers spot a suspicious email among the torrent
of data pouring into the United States, analysts can use information from Internet companies to pinpoint the user.
With Prism, the government gets a user's entire email inbox. Every email, including contacts with American citizens,
becomes government property.
Once the NSA has an inbox, it can search its huge archives for information about everyone with whom the target
communicated. All those people can be investigated, too.
That's one example of how emails belonging to Americans can become swept up in the hunt.
In that way, Prism helps justify specific, potentially personal searches. But it's the broader operation on the Internet fiber
optics cables that actually captures the data, experts agree.
"I'm much more frightened and concerned about real-time monitoring on the Internet backbone," said Wolf Ruzicka, CEO
of EastBanc Technologies, a Washington software company. "I cannot think of anything, outside of a face-to-face
conversation, that they could not have access to."
One unanswered question, according to a former technology executive at one of the companies involved, is whether the
government can use the data from Prism to work backward.
For example, not every company archives instant message conversations, chat room exchanges or videoconferences. But if
Prism provided general details, known as metadata, about when a user began chatting, could the government "rewind" its
copy of the global Internet stream, find the conversation and replay it in full?
That would take enormous computing, storage and code-breaking power. It's possible the NSA could use supercomputers to
decrypt some transmissions, but it's unlikely it would have the ability to do that in volume. In other words, it would help to
know what messages to zero in on.
Whether the government has that power and whether it uses Prism this way remains a closely guarded secret.
___
A few months after Obama took office in 2009, the surveillance debate reignited in Congress because the NSA had crossed
the line. Eavesdroppers, it turned out, had been using their warrantless wiretap authority to intercept far more emails and
phone calls of Americans than they were supposed to.
Obama, no longer opposed to the wiretapping, made unspecified changes to the process. The government said the problems
were fixed.
"I came in with a healthy skepticism about these programs," Obama explained recently. "My team evaluated them. We
scrubbed them thoroughly. We actually expanded some of the oversight, increased some of the safeguards."
Years after decrying Bush for it, Obama said Americans did have to make tough choices in the name of safety.
"You can't have 100 percent security and also then have 100 percent privacy and zero inconvenience," the president said.
Obama's administration, echoing his predecessor's, credited the surveillance with disrupting several terrorist attacks.
Leading figures from the Bush administration who endured criticism during Obama's candidacy have applauded the
president for keeping the surveillance intact.
Jason Weinstein, who recently left the Justice Department as head of its cybercrime and intellectual property section, said
it's no surprise Obama continued the eavesdropping.
"You can't expect a president to not use a legal tool that Congress has given him to protect the country," he said. "So,
Congress has given him the tool. The president's using it. And the courts are saying 'The way you're using it is OK.' That's
checks and balances at work."
Schneier, the author and security expert, said it doesn't really matter how Prism works, technically. Just assume the6/15/13 Secret toPrismprogram:Evenbigger dataseizure- Yahoo! News
news.yahoo.com/secret-prism-program-even-bigger-140403980.html# 5/5
government collects everything, he said.
He said it doesn't matter what the government and the companies say, either. It's spycraft, after all.
"Everyone is playing word games," he said. "No one is telling the truth."
___

Secret to Prism program: Even bigger data seizure
What makes Prism work? National Security Agency's megadata collection from Internet pipeline
By Stephen Braun, Anne Flaherty, Jack Gillum and Matt Apuzzo, Associated Press | Associated Press – 29 mins ago
WASHINGTON (AP) -- In the months and early years after 9/11, FBI agents began showing up at Microsoft Corp. more
frequently than before, armed with court orders demanding information on customers.
Around the world, government spies and eavesdroppers were tracking the email and Internet addresses used by suspected
terrorists. Often, those trails led to the world's largest software company and, at the time, largest email provider.
The agents wanted email archives, account information, practically everything, and quickly. Engineers compiled the data,
sometimes by hand, and delivered it to the government.
Often there was no easy way to tell if the information belonged to foreigners or Americans. So much data was changing
hands that one former Microsoft employee recalls that the engineers were anxious about whether the company should
cooperate.
Inside Microsoft, some called it "Hoovering" — not after the vacuum cleaner, but after J. Edgar Hoover, the first FBI
director, who gathered dirt on countless Americans.
This frenetic, manual process was the forerunner to Prism, the recently revealed highly classified National Security Agency
program that seizes records from Internet companies. As laws changed and technology improved, the government and
industry moved toward a streamlined, electronic process, which required less time from the companies and provided the
government data in a more standard format.
The revelation of Prism this month by the Washington Post and Guardian newspapers has touched off the latest round in a
decade-long debate over what limits to impose on government eavesdropping, which the Obama administration says is
essential to keep the nation safe.
But interviews with more than a dozen current and former government and technology officials and outside experts show
that, while Prism has attracted the recent attention, the program actually is a relatively small part of a much more expansive
and intrusive eavesdropping effort.
Americans who disapprove of the government reading their emails have more to worry about from a different and larger NSA
effort that snatches data as it passes through the fiber optic cables that make up the Internet's backbone. That program,
which has been known for years, copies Internet traffic as it enters and leaves the United States, then routes it to the NSA for
analysis.
Whether by clever choice or coincidence, Prism appears to do what its name suggests. Like a triangular piece of glass, Prism
takes large beams of data and helps the government find discrete, manageable strands of information.
The fact that it is productive is not surprising; documents show it is one of the major sources for what ends up in the
president's daily briefing. Prism makes sense of the cacophony of the Internet's raw feed. It provides the government with
names, addresses, conversation histories and entire archives of email inboxes.
Many of the people interviewed for this report insisted on anonymity because they were not authorized to publicly discuss a
classified, continuing effort. But those interviews, along with public statements and the few public documents available,
show there are two vital components to Prism's success.
The first is how the government works closely with the companies that keep people perpetually connected to each other and
the world. That story line has attracted the most attention so far.
The second and far murkier one is how Prism fits into a larger U.S. wiretapping program in place for years.
___
Deep in the oceans, hundreds of cables carry much of the world's phone and Internet traffic. Since at least the early 1970s,
YAHOO! NEWS6/15/13 Secret toPrismprogram:Evenbigger dataseizure- Yahoo! News
news.yahoo.com/secret-prism-program-even-bigger-140403980.html# 2/5
the NSA has been tapping foreign cables. It doesn't need permission. That's its job.
But Internet data doesn't care about borders. Send an email from Pakistan to Afghanistan and it might pass through a mail
server in the United States, the same computer that handles messages to and from Americans. The NSA is prohibited from
spying on Americans or anyone inside the United States. That's the FBI's job and it requires a warrant.
Despite that prohibition, shortly after the Sept. 11 terrorist attacks, President George W. Bush secretly authorized the NSA to
plug into the fiber optic cables that enter and leave the United States, knowing it would give the government unprecedented,
warrantless access to Americans' private conversations.
Tapping into those cables allows the NSA access to monitor emails, telephone calls, video chats, websites, bank transactions
and more. It takes powerful computers to decrypt, store and analyze all this information, but the information is all there,
zipping by at the speed of light.
"You have to assume everything is being collected," said Bruce Schneier, who has been studying and writing about
cryptography and computer security for two decades.
The New York Times disclosed the existence of this effort in 2005. In 2006, former AT&T technician Mark Klein revealed
that the company had allowed the NSA to install a computer at its San Francisco switching center, a spot where fiber optic
cables enter the U.S.
What followed was the most significant debate over domestic surveillance since the 1975 Church Committee, a special Senate
committee led by Sen. Frank Church, D-Idaho, reined in the CIA and FBI for spying on Americans.
Unlike the recent debate over Prism, however, there were no visual aids, no easy-to-follow charts explaining that the
government was sweeping up millions of emails and listening to phone calls of people accused of no wrongdoing.
The Bush administration called it the "Terrorist Surveillance Program" and said it was keeping the United States safe.
"This program has produced intelligence for us that has been very valuable in the global war on terror, both in terms of
saving lives and breaking up plots directed at the United States," Vice President Dick Cheney said at the time.
The government has said it minimizes all conversations and emails involving Americans. Exactly what that means remains
classified. But former U.S. officials familiar with the process say it allows the government to keep the information as long as
it is labeled as belonging to an American and stored in a special, restricted part of a computer.
That means Americans' personal emails can live in government computers, but analysts can't access, read or listen to them
unless the emails become relevant to a national security investigation.
The government doesn't automatically delete the data, officials said, because an email or phone conversation that seems
innocuous today might be significant a year from now.
What's unclear to the public is how long the government keeps the data. That is significant because the U.S. someday will
have a new enemy. Two decades from now, the government could have a trove of American emails and phone records it can
tap to investigative whatever Congress declares a threat to national security.
The Bush administration shut down its warrantless wiretapping program in 2007 but endorsed a new law, the Protect
America Act, which allowed the wiretapping to continue with changes: The NSA generally would have to explain its
techniques and targets to a secret court in Washington, but individual warrants would not be required.
Congress approved it, with Sen. Barack Obama, D-Ill., in the midst of a campaign for president, voting against it.
"This administration also puts forward a false choice between the liberties we cherish and the security we provide," Obama
said in a speech two days before that vote. "I will provide our intelligence and law enforcement agencies with the tools they
need to track and take out the terrorists without undermining our Constitution and our freedom."
___
When the Protect America Act made warrantless wiretapping legal, lawyers and executives at major technology companies
knew what was about to happen.
One expert in national security law, who is directly familiar with how Internet companies dealt with the government during
that period, recalls conversations in which technology officials worried aloud that the government would trample on6/15/13 Secret toPrismprogram:Evenbigger dataseizure- Yahoo! News
news.yahoo.com/secret-prism-program-even-bigger-140403980.html# 3/5
Americans' constitutional right against unlawful searches, and that the companies would be called on to help.
The logistics were about to get daunting, too.
For years, the companies had been handling requests from the FBI. Now Congress had given the NSA the authority to take
information without warrants. Though the companies didn't know it, the passage of the Protect America Act gave birth to a
top-secret NSA program, officially called US-98XN.
It was known as Prism. Though many details are still unknown, it worked like this:
Every year, the attorney general and the director of national intelligence spell out in a classified document how the
government plans to gather intelligence on foreigners overseas.
By law, the certification can be broad. The government isn't required to identify specific targets or places.
A federal judge, in a secret order, approves the plan.
With that, the government can issue "directives" to Internet companies to turn over information.
While the court provides the government with broad authority to seize records, the directives themselves typically are
specific, said one former associate general counsel at a major Internet company. They identify a specific target or groups of
targets. Other company officials recall similar experiences.
All adamantly denied turning over the kind of broad swaths of data that many people believed when the Prism documents
were first released.
"We only ever comply with orders for requests about specific accounts or identifiers," Microsoft said in a statement.
Facebook said it received between 9,000 and 10,000 requests for data from all government agencies in the second half of last
year. The social media company said fewer than 19,000 users were targeted.
How many of those were related to national security is unclear, and likely classified. The numbers suggest each request
typically related to one or two people, not a vast range of users.
Tech company officials were unaware there was a program named Prism. Even former law enforcement and
counterterrorism officials who were on the job when the program went live and were aware of its capabilities said this past
week that they didn't know what it was called.
What the NSA called Prism, the companies knew as a streamlined system that automated and simplified the "Hoovering"
from years earlier, the former assistant general counsel said. The companies, he said, wanted to reduce their workload. The
government wanted the data in a structured, consistent format that was easy to search.
Any company in the communications business can expect a visit, said Mike Janke, CEO of Silent Circle, a company that
advertises software for secure, encrypted conversations. The government is eager to find easy ways around security.
"They do this every two to three years," said Janke, who said government agents have approached his company but left
empty-handed because his computer servers store little information. "They ask for the moon."
That often creates tension between the government and a technology industry with a reputation for having a civil libertarian
bent. Companies occasionally argue to limit what the government takes. Yahoo even went to court and lost in a classified
ruling in 2008, The New York Times reported Friday.
"The notion that Yahoo gives any federal agency vast or unfettered access to our users' records is categorically false," Ron
Bell, the company's general counsel, said recently.
Under Prism, the delivery process varied by company.
Google, for instance, says it makes secure file transfers. Others use contractors or have set up stand-alone systems. Some have
set up user interfaces making it easier for the government, according to a security expert familiar with the process.
Every company involved denied the most sensational assertion in the Prism documents: that the NSA pulled data "directly
from the servers" of Microsoft, Yahoo, Google, Facebook, AOL and more.
Technology experts and a former government official say that phrasing, taken from a PowerPoint slide describing the
program, was likely meant to differentiate Prism's neatly organized, company-provided data from the unstructured6/15/13 Secret toPrismprogram:Evenbigger dataseizure- Yahoo! News
news.yahoo.com/secret-prism-program-even-bigger-140403980.html# 4/5
information snatched out of the Internet's major pipelines.
In slide made public by the newspapers, NSA analysts were encouraged to use data coming from both Prism and from the
fiber-optic cables.
Prism, as its name suggests, helps narrow and focus the stream. If eavesdroppers spot a suspicious email among the torrent
of data pouring into the United States, analysts can use information from Internet companies to pinpoint the user.
With Prism, the government gets a user's entire email inbox. Every email, including contacts with American citizens,
becomes government property.
Once the NSA has an inbox, it can search its huge archives for information about everyone with whom the target
communicated. All those people can be investigated, too.
That's one example of how emails belonging to Americans can become swept up in the hunt.
In that way, Prism helps justify specific, potentially personal searches. But it's the broader operation on the Internet fiber
optics cables that actually captures the data, experts agree.
"I'm much more frightened and concerned about real-time monitoring on the Internet backbone," said Wolf Ruzicka, CEO
of EastBanc Technologies, a Washington software company. "I cannot think of anything, outside of a face-to-face
conversation, that they could not have access to."
One unanswered question, according to a former technology executive at one of the companies involved, is whether the
government can use the data from Prism to work backward.
For example, not every company archives instant message conversations, chat room exchanges or videoconferences. But if
Prism provided general details, known as metadata, about when a user began chatting, could the government "rewind" its
copy of the global Internet stream, find the conversation and replay it in full?
That would take enormous computing, storage and code-breaking power. It's possible the NSA could use supercomputers to
decrypt some transmissions, but it's unlikely it would have the ability to do that in volume. In other words, it would help to
know what messages to zero in on.
Whether the government has that power and whether it uses Prism this way remains a closely guarded secret.
___
A few months after Obama took office in 2009, the surveillance debate reignited in Congress because the NSA had crossed
the line. Eavesdroppers, it turned out, had been using their warrantless wiretap authority to intercept far more emails and
phone calls of Americans than they were supposed to.
Obama, no longer opposed to the wiretapping, made unspecified changes to the process. The government said the problems
were fixed.
"I came in with a healthy skepticism about these programs," Obama explained recently. "My team evaluated them. We
scrubbed them thoroughly. We actually expanded some of the oversight, increased some of the safeguards."
Years after decrying Bush for it, Obama said Americans did have to make tough choices in the name of safety.
"You can't have 100 percent security and also then have 100 percent privacy and zero inconvenience," the president said.
Obama's administration, echoing his predecessor's, credited the surveillance with disrupting several terrorist attacks.
Leading figures from the Bush administration who endured criticism during Obama's candidacy have applauded the
president for keeping the surveillance intact.
Jason Weinstein, who recently left the Justice Department as head of its cybercrime and intellectual property section, said
it's no surprise Obama continued the eavesdropping.
"You can't expect a president to not use a legal tool that Congress has given him to protect the country," he said. "So,
Congress has given him the tool. The president's using it. And the courts are saying 'The way you're using it is OK.' That's
checks and balances at work."
Schneier, the author and security expert, said it doesn't really matter how Prism works, technically. Just assume the6/15/13 Secret toPrismprogram:Evenbigger dataseizure- Yahoo! News
news.yahoo.com/secret-prism-program-even-bigger-140403980.html# 5/5
government collects everything, he said.
He said it doesn't matter what the government and the companies say, either. It's spycraft, after all.
"Everyone is playing word games," he said. "No one is telling the truth."
___
 
.
Apple Joins Facebook, Microsoft in Outlining Data Requests
By Tim Culpan and Adam Satariano - Jun 17, 2013
Apple Inc. (AAPL), the world’s most-valuable technology company, received as many as 5,000 requests for customer information from U.S. law enforcement authorities amid widening revelations of government data collection.

Between 9,000 and 10,000 accounts or devices were specified in the requests between Dec. 1 and May 31, the Cupertino, California-based company said in a statement. Facebook Inc. (FB) and Microsoft Corp. (MSFT) said they received thousands of warrants for data from government entities during the second half of 2012.

The role of technology companies has come under scrutiny since Edward Snowden, a computer technician who did work for the National Security Agency, disclosed this month that the NSA is collecting data under a U.S. government program code-named PRISM. The project traces its roots to warrantless domestic-surveillance efforts under former President George W. Bush.

“Like several other companies, we have asked the U.S. government for permission to report how many requests we receive related to national security and how we handle them,” Apple said in the statement. “We have been authorized to share some of that data, and we are providing it here in the interest of transparency.”

Apple said it hadn’t heard of PRISM until June 6 when news organizations asked it questions. Requests came from federal, state and local authorities and included both criminal and national security matters, it said. Police investigations into crimes such as robbery were the most-common form of request, it said.

E-mails, Videos

Apple sold 125 million iPhones and 58 million iPad tablet computers last financial year, according to data compiled by Bloomberg.

No government agency has direct access to Apple servers and it doesn’t store data related to customers’ location, map searches or Siri requests in any identifiable form, the company said.

Conversations over the iMessage and FaceTime functions are protected by end-to-end encryption, which means only the sender and receiver can see or read them, and Apple can’t decrypt the data, the company said.

PRISM gathers e-mails, videos and other private data of foreign surveillance targets through arrangements that vary by company, overseen by a secret panel of judges, according to slides provided by Snowden to the Guardian and Washington Post newspapers.

Facebook got 9,000 to 10,000 requests, while Microsoft got 6,000 to 7,000, their legal executives said in blog posts.

Telephone Records

Google Inc. (GOOG), Facebook and Microsoft asked the U.S. government for more leeway to report aggregate numbers of data requests, following reports that the NSA is collecting millions of residents’ telephone records and the Web communications of foreigners under court order.

Facebook, based in Menlo Park, California, said it complied with 79 percent of the requests. Inquiries sent to Facebook covered between 18,000 and 19,000 accounts and included everything from local governments to NSA requests, according to the company.

Microsoft said the data-security warrants affected 31,000 to 32,000 consumer accounts.

Google, in response to Facebook and Microsoft’s disclosures, said it’s pushing authorities to let it differentiate between varying types of government requests.

“Our request to the government is clear: to be able to publish aggregate numbers of national security requests, including FISA disclosures, separately,” the Mountain View, California-based company said in an e-mailed statement, referring to the Foreign Intelligence Surveillance Act.

The three-decade-old FISA law lets intelligence agencies monitor the communications of non-U.S. citizens reasonably believed to be located outside the U.S. and involved in terrorist activities or other crimes.
 
.
Google the worst, they track your whereabouts using the patten you searched.
 
.
Its just a search engine - there are so many to choose from- Use ASK.com if it means that much to you.
It's Microsoft that is the real big fish.
 
.
Pondering Life in a PRISM World
A A Text Size
Back to Online Version
E-Mail Article
By Katherine Noyes
LinuxInsider
06/17/13 5:00 AM PT

What will you do differently now that you know about PRISM? "I don't see any way that changing my use of technology would affect my situation," Google+ blogger Kevin O'Brien said. "The government has way more in the way of resources than I can bring to bear here. I am just going to nostalgically recall when the U.S. was a free country."


Keep IT systems secure & running at peak performance with GFI Cloud™, the easy-to-use IT management platform giving busy IT admins one place for patch management, antivirus, server & workstation monitoring, asset tracking and remote support. Free trial.

Not a single week goes by here in the Linux blogosphere without some assortment of news and events to keep life interesting.

It's not often, however, that something comes along with the magnitude of PRISM.

Linux Girl was comfortably ensconced on her favorite barstool when the news broke down at the Punchy Penguin Saloon, and it's been chaos ever since. More than a few Freedom Flip cocktails later, she's just now begun to write up her notes chronicling what will surely go down in history as one of the blogosphere's most somber conversations ever.

What will you do differently, Linux Girl asked bloggers, now that we know about PRISM?

'When the U.S. Was a Free Country'

"PRISM won't change my habits at all, because I have long assumed that every packet could be snooped upon, and if I had any incriminating data, I wouldn't be storing it online," Hyperlogos blogger Martin Espinoza offered.

"People who do not use encryption for sensitive communications have failed to learn lessons of history that go back at least to the ancient Romans," Espinoza added.

Similarly, "I don't see any way that changing my use of technology would affect my situation," Google+ blogger Kevin O'Brien agreed. "The government has way more in the way of resources than I can bring to bear here. I am just going to nostalgically recall when the U.S. was a free country."

PRISM "wasn't a big surprise," Linux Rants blogger Mike Stone agreed. "It's really just confirmation of something I already 'knew.'

'Why Freak Out Now?'

"Considering the existence of systems like ECHELON and legislation like the Patriot Act, PRISM is about as surprising as the sun rising in the East," Stone explained.

"There's a niggling little part of my brain that tells me to lock everything down: move to a Linux system where everything is compiled from source rather than trusting DEBs or RPMs and funnel all my internet traffic through an offshore VPN and a TOR network," he added. "Move as many services in-house as possible and encrypt everything."

Then again, "the rest of my brain just says that you already suspected this kind of thing, and you did nothing then, why freak out now?" Stone said.

"I don't like the violation that accompanies PRISM, and I disagree with the government's stance that the constant monitoring of its citizens is 'required' to keep them safe, but I'm not really going to change my habits," he concluded. "I'm going to contact my congressperson regarding the issue and I'm going to vote."

'There Is No Magic Bullet'

Anyone who was surprised by the revelation "hasn't been paying attention," Google+ blogger Brett Legree told Linux Girl.

In any case, "as a Canadian citizen, I will be sure to let family, friends and colleagues know that our country has various 'sharing agreements' in place with the United States, and I will remind them that we do have similar programs in place," he said. "I can't imagine that there are many countries on Earth that do not do this these days."

Legree will also "continue to remind people (as I have for many years) that whatever they share electronically MUST be treated as if it will be on the front page of every major news publication, paper and digital," he added. "I will remind them to keep their critical and confidential information on systems they trust, offline and backed up redundantly, and I will help them to do this if they do not know how to do it themselves."

It's important to remember, though, that "there is no 'magic bullet' solution," Legree warned. Even if you switch to Linux, use ownCloud, host your own email, encrypt all communications and use disposable SIM cards with your phone, for example, "how can you trust that everyone you know, and everyone they know, and so on out to six degrees of freedom, will do the same?

"You cannot," he concluded.

'Everyone Is Uncomfortable'

PRISM's surveillance has global implications, Google+ blogger Gonzalo Velasco C. told Linux Girl.

"Everyone is feeling very uncomfortable with this story," he said. "It doesn't matter if you are a good person, citizen, professional, a pacifist... you are being watched."

Personally, "my use of technology will remain almost the same," Gonzalo Velasco C. added. "Of course, I feel less comfortable with Google and try to use systems and software that are said to be less vulnerable or cooperative with 'Big Brother.'

"Why? Because I have the right to do so," he concluded.

'What Is the Point of Worrying?'

"If you had asked me two weeks ago how would I feel about a PRISM-like system conducting surveillance on my online activities, I probably would have been upset," began Robin Lim, a lawyer and blogger on Mobile Raptor. "PRISM actually targets me, since I am not a U.S. citizen or resident."

Now, however, "is there anything I would do differently? The answer is no, and I am not too worried about it," Lim said. "The reality is, there is little I can do about it, so what is the point of worrying?

"What this does underscore is we do need a Switzerland of the Internet and local companies in that country to offer email, messaging and cloud storage services," he concluded.

'It Is Necessary'

"I think PRISM is a necessary evil," Google+ Rodolfo Saenz suggested.

"It is necessary to scan Internet activities with advanced, intelligent, scanning algorithms taking advantage of human mistakes made by potential terrorists, especially those who are troubled, mentally speaking, and reveal their intentions through the use of social networks," he explained.

Of course, "the effectiveness of PRISM remains to be seen because of the rise of terrorist acts made recently," Saenz conceded.

'It Weakens Society'

"Terrorists can adapt to non-use of telephone/Internet just as Osama bin Laden did," countered blogger Robert Pogson. "Despite $billions spent, it took many years to hunt him down.

"PRISM and other such blunt instruments will not discourage alert terrorists," he opined. "Further, terrorists could use PRISM to set false alarms or to entrap responders."

In short, "no technology can solve the problem -- technology always has counter-measures," he explained.

"Compare terrorism with computer viruses," Pogson added. "We don't stop using computers because viruses exist. We cannot eliminate viruses, but we can harden our computers."

PRISM, however, "is not hardening our society," he concluded. "It weakens society by violating fundamentals of the constitution."

Two Key Pieces

The first key part of this story "is that the government can effectively deputize any U.S.-based business and compel them to spy on Americans and others," offered Chris Travers, a blogger who works on the LedgerSMB project..

"The second is the fact that so many American tech giants went out of their way to facilitate the NSA's surveillance measures through PRISM," Travers added.

"Whether or not this was a fairly automated way to get court-approved information or direct access to the backbone, such automation expands the amount of information available to the NSA and therefore make such requests more intrusive and more frequent," he explained.

'It's All There'

All in all, "it just goes to show that Bill Hicks was right when he did that joke, 'I think the puppet on the left shares MY beliefs. I think the puppet on the right is more to my liking. Hey wait a minute, there is one guy holding out both puppets!'" Slashdot blogger hairyfeet told Linux Girl.

"There is NO difference between left and right; all we have in this country is right-wing and ultra right-wing, nothing else," he explained.

"Whether we like it or not, we are going from a free to a nonfree society, and all the signs that followed previous shifts -- places where torture takes place where the rule of law doesn't exist, spying on citizens, checkpoints designed for intimidating the populace, a media that is in bed with and is often just the mouthpiece of the government, hyped threats -- it's ALL there," hairyfeet went on.

"You get the populace used to more and more abuse until an event (whether real and hyped or staged), and then the society is 'temporarily' locked down, only the threat is designed such as to be never-ending," he said.

"The people in Germany went from a free society in 1930 to a locked-down dictatorship by 1935, it was THAT quick," hairyfeet concluded. "The sad part? Merely writing that probably has put me on a list, if I wasn't already."

Katherine Noyes is always on duty in her role as Linux Girl, whose cape she has worn since 2007. A mild-mannered ECT News Editor by day, she spends her evenings haunting the seedy bars and watering holes of the Linux blogosphere in search of the latest gossip. You can also find her on Twitter and Google+
 
.
Google the worst, they track your whereabouts using the patten you searched.
Back in the late 20th century, I once dated a girl who started out as a bank window teller and over our time together she got up to the mortgage dept. Data collection and analyses of people's behaviors predated Google. Looooooooooooooooooong before Internet. She taught me that if you know a person's spending habits and pattern, you know that person, and that in many ways, the bank know a person just as good if not better than the person's friends or even relatives.

For example, if a person uses debit/credit cards a lot like I do, she showed me that based upon gas purchases alone, she can tell that I have a motorcycle without even knowing me. My gas purchases are usually greater than $30 per purchase from Nov to May, then dropped to less than $15 per purchase from Jun to Nov. Motorcycles have fuel tanks usually 4-5 gals, or 15-18 liters, of capacity. Year after year is this pattern of winter and summer gas purchases. She can tell that I am a reader based upon my weekly purchases at major book stores like Barnes And Noble and Borders. She can narrow down to a part of the city based upon my grocery purchases and if that part of the city have a large concentration of apartment buildings, odds are good that this single man lives in an apartment. If these apartment buildings are of the 'upscale' version that have several pools, gyms, and clubhouses, odds are good that this single man have an income higher than $55K/yr, and no need looking at direct deposits.

Google, like banks, is a commercial entity. No one forces you to use Google or banks. Even today, if I wanted to, I can have my employer literally mail my pay instead of direct deposit straight to the bank, leaving that information for any bank employee to see. I can cash that check, leaving one trace, then live off the cash, leaving no electronic traces.

Your bank have been 'evil' far longer than Google have been in existence.
 
.
The Government Is Spying on America with Drones, Too
By Elspeth Reeve | The Atlantic Wire – 5 hrs ago
FBI director Robert Mueller said the government has used surveillance drones in the U.S. — though "in a very, very minimal
way, very seldom" — at a Senate hearing on Wednesday. "It's very seldom used and generally used in a particular incident
when you need the capability," Mueller said before the judiciary committee. "It is very narrowly focused on particularized
cases and particularized needs." He said he did not know what happens to the images the drones capture.
RELATED: Zero Dark Verizon: Why D.C. Hates Leaks Until It Loves Hunting Them Down
Mueller's answer came following questioning from California Sen. Dianne Feinstein, who said drones were the "biggest
threat to privacy" in America today. This is funny, because Feinstein had just given a rousing defense of the National Security
Agency's program to collect the metadata on all phone calls made by all Americans. Feinstein is the chair of the Senate
Intelligence Committee, and since Edward Snowden leaked the NSA programs, has dismissed concerns that the government
is spying on Americans. At Wednesday's hearing, Feinstein said the NSA collects "not the names, but the data. Not the
content, but the data." A drone wouldn't collect the content of your conversation, either. It would only show exactly where
you are and when. Which is what your phone call metadata
 
.
Hey USA government , spies NSA , FBI and others.... watching me ? .. eat my sh*t ! ! !
 
.

Pakistan Defence Latest Posts

Country Latest Posts

Back
Top Bottom