NSA has direct access to tech giants' systems for user data, secret files reveal

Discussion in 'privacy general' started by Dermot7, Jun 6, 2013.

  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  2. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    I can't imagine how anyone "missed" Crimea.

    Russia has very few seaports, and it would never relinquish the Baltic port. Once Ukraine revolted, the fate of Crimea was sealed. In US terms, this would rather be like keeping Houston (and maybe Dallas) after Texas rejoined Mexico ;)
     
  3. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    I don't either. It just shows how low they will stoop when the opportunity arises to blame someone else for their incompetent policies, especially Snowden.
    How about a real world example, West Berlin after WWII.
     
  4. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,618
    • Beijing demands US explain Huawei spying •
    http://www.zdnet.com/cn/beijing-demands-us-explain-huawei-spying-7000027664/
     
  5. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  6. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,618
    Obama to Call for End to N.S.A.’s Bulk Data Collection
    http://www.nytimes.com/2014/03/25/us/obama-to-seek-nsa-curb-on-call-data.html
     
  7. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
  8. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    As long as we rely on ISPs, backbone services, and the rest of the commercial infrastructure, a spy proof internet is impossible. What we really need is a separate, decentralized service that doesn't provide locations for bulk data collection. A variation of end to end encryption and Tor combined with interconnected wireless routers comes to mind.
     
  9. Pinga

    Pinga Registered Member

    Joined:
    Aug 31, 2006
    Posts:
    1,420
    Location:
    Europe
  10. KeyPer4Life

    KeyPer4Life Registered Member

    Joined:
    Dec 18, 2013
    Posts:
    1,239
  11. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    I don't have any metdata (no telephone).

    There's just me and my machines, in my bunker on the beach.
     
  12. Nebulus

    Nebulus Registered Member

    Joined:
    Jan 20, 2007
    Posts:
    1,611
    Location:
    European Union
    IMO, totally irrelevant from a statistical point of view, hence of no use to NSA. :)
     
  13. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  14. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,405
    Location:
    Surrey, England.
    Exclusive: NSA infiltrated RSA security more deeply than thought - study
    (Reuters) -
     
  15. Justintime123

    Justintime123 Registered Member

    Joined:
    Jun 15, 2013
    Posts:
    99
    NSA performed warrantless searches on Americans' calls and emails – Clapper
    http://www.theguardian.com/world/2014/apr/01/nsa-surveillance-loophole-americans-data

    US intelligence chiefs have confirmed that the National Security Agency has used a "back door" in surveillance law to perform warrantless searches on Americans’ communications.

    The NSA's collection programs are ostensibly targeted at foreigners, but in August the Guardian revealed a secret rule change allowing NSA analysts to search for Americans' details within the databases.

    Now, in a letter to Senator Ron Wyden, an Oregon Democrat on the intelligence committee, the director of national intelligence, James Clapper, has confirmed for the first time the use of this legal authority to search for data related to “US persons”.
     
    Last edited: Apr 1, 2014
  16. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    Secure protocols for accountable warrant execution.

    -- Tom
     
  17. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  18. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    IMO, it is reasonable to assume that the NSA has subverted or has attempted to subvert every form of encryption that has been adopted as a standard.
     
  19. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  20. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  21. wtsinnc

    wtsinnc Registered Member

    Joined:
    Oct 3, 2008
    Posts:
    943
    I suppose there are ways to temporarily remain anonymous on the web, but not for very long.
    Not unless you are of absolutely no interest to domestic or foreign governments and are not in any way associated with anyone or any company, organization, or agency that is or someday will be deemed a threat.

    The thought occurred to me earlier today; how many software vendors are actually "in-league" with the intelligence community; funded by them, staffed by them, and in business to serve them ?
    How many are intentionally marketing applications with the stated purpose of enhancing security but, in truth, are marketing software with back-door access known only to those agencies that the software is supposedly designed to thwart ?

    Whatever the revelations and disclosures, I believe the intelligence community always has a backup plan and a backup plan for the backup plan.
    They are not going to stop spying on us because no agency director wants to accept the blame for allowing the next 9-11, and no politician wants to be recognized as the one who neutered the agencies who exist to protect our national interests. This holds true whether we are talking about The United States, China, Italy, Brazil, The Koreas, Israel, Great Britain, Pakistan, or any other nation.

    This is the world we live in and it's not going away.
     
  22. Baserk

    Baserk Registered Member

    Joined:
    Apr 14, 2008
    Posts:
    1,321
    Location:
    AmstelodamUM
    And from previously posted here
    Eric Rescorla is one of the big guys for Mozilla link.
    I don't expect him to comment but Mozilla's 'No comment', that I don't like.
     
  23. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    That opens up some very nasty possibilities. At the very least it's a major conflict of interest. At worst, the NSA used Rescorla to compromise the security of Mozilla products.
     
  24. Pinga

    Pinga Registered Member

    Joined:
    Aug 31, 2006
    Posts:
    1,420
    Location:
    Europe
  25. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.