Ας δούμε τα βασικά στοιχεία όπως δημοσιεύτηκαν στην Guardian. Κάπου αναφέρεται και το 3 days storage and 30 days metadata storage που γίνεται με direct probing από τις οπτικές ίνες πλέον και όχι μέσω ενδιάμεσων server. Mην ξεχνάμε ότι δεν έχει υπάρξει ούτε ένα έγγραφο από τα αρχεία Snowden που να έχει διαψευσθεί. Η ίδια η Μέρκελ έμαθε για την παρακολούθηση του κινητού της από αυτά τα αρχεία, το πρόγραμμα Prism έχει επιβεβαιωθεί και από άλλες πηγές. Στην ουσία ούτε ένα έγγραφο δεν έχει αναφερθεί ότι είναι ψευδές μέχρι τώρα. Bρισκόμαστε σε μια νέα εποχή:
http://www.infoplease.com/news/2013/edward-snowden-leaks.html
Major Revelations about the Surveillance Program
Here's a look at some of the controversial aspects of the NSA's surveillance program made public by Snowden.
The NSA monitors the credit card transactions and customer records of three major phone service providers: Verizon, AT&T, and Sprint Nextel.
Since 2010, the NSA has been analyzing meta data from phone and email logs and supplementing that information with data from other sources, such as GPS locators, bank codes, passenger manifests from airlines and other transportation databases, Facebook, and voter registration logs, to create graphs of the social connections of individuals. The graphs can show who people communicate and travel with, their location, and other information.
Through a program called PRISM, companies, such as Facebook and Google, have cooperated with the U.S. government in surveillance operations.
Britain's Government Communications Headquarters (GCHQ) had access to data gleaned through PRISM.
Snowden told the South China Morning Post that the NSA has been collecting information about individuals and institutions in Hong Kong and China since 2009 using PRISM.
The Foreign Intelligence Surveillance Court ruled that correspondence involving a U.S. citizen gleaned when the NSA was targeting non-U.S. citizens can be analyzed and kept if it was "inadvertently" acquired without a warrant.
Through a program called Bullrun, the NSA has cracked internet encryption programs used by many companies to protect customers' privacy.
Microsoft cooperated with the NSA, helping the agency to override the company's encryption mechanisms that protect the privacy of customers. The collaboration gave the government access to correspondence sent via Outlook.com, Hotmail, and Skype.
Britain's GCHQ created the Tempora program in which the government monitored internet, email, IM, and phone activity using probes that were placed on fiber-optic cables. Internet content collected via the probes could be stored for three days and meta data for up to 30 days. Analysts at the NSA had access to this information.
The Boundless Informant program enabled the NSA to analyze the metadata it collected. The tool has a mapping feature that allows data to be analyzed by country. The program seemingly contradicts claims by NSA officials that it does not have the ability to track the information it collects.
The NSA shares raw intelligence data with Israel, passing it on before determining if it contained information about U.S. citizens.
The NSA spied on Brazilian president Dilma Rousseff as well as Petrobras, Brazil's national oil company.
The NSA conducted surveillance on the European Union embassy in Washington, D.C., France’s Ministry of Foreign Affairs, and the European Council headquarters in Brussels.
In one 30-day period between Dec. 2012 and Jan. 2013, the NSA collected information on some 70 million digital communications in France and 60 million in Spain.
The NSA hacked into the email domain of Mexican president Felipe Calderon. Cabinet members also used the same email domain.
According to several news reports, the NSA tapped the cellphone of German chancellor Angela Merkel for about ten years, beginning in 2002.
U.S. and British spies monitored and played massive multiplayer online games, such as World of Warcraft and Second Life, trying to track down terrorists who might use the games to communicate, plan attacks, or send messages. The spies also collected data obtained from smartphone apps, such as Google maps, the game Angry Birds, Facebook, Twitter, and others. These apps can provide agents with a user's location, age, gender, address book, and other data.
Read more: The NSA, Edward Snowden, and Surveillance | Infoplease.com http://www.infoplease.com/news/2013/edward-snowden-leaks.html#ixzz3AYWnkc3J
http://www.infoplease.com/news/2013/edward-snowden-leaks.html
Major Revelations about the Surveillance Program
Here's a look at some of the controversial aspects of the NSA's surveillance program made public by Snowden.
The NSA monitors the credit card transactions and customer records of three major phone service providers: Verizon, AT&T, and Sprint Nextel.
Since 2010, the NSA has been analyzing meta data from phone and email logs and supplementing that information with data from other sources, such as GPS locators, bank codes, passenger manifests from airlines and other transportation databases, Facebook, and voter registration logs, to create graphs of the social connections of individuals. The graphs can show who people communicate and travel with, their location, and other information.
Through a program called PRISM, companies, such as Facebook and Google, have cooperated with the U.S. government in surveillance operations.
Britain's Government Communications Headquarters (GCHQ) had access to data gleaned through PRISM.
Snowden told the South China Morning Post that the NSA has been collecting information about individuals and institutions in Hong Kong and China since 2009 using PRISM.
The Foreign Intelligence Surveillance Court ruled that correspondence involving a U.S. citizen gleaned when the NSA was targeting non-U.S. citizens can be analyzed and kept if it was "inadvertently" acquired without a warrant.
Through a program called Bullrun, the NSA has cracked internet encryption programs used by many companies to protect customers' privacy.
Microsoft cooperated with the NSA, helping the agency to override the company's encryption mechanisms that protect the privacy of customers. The collaboration gave the government access to correspondence sent via Outlook.com, Hotmail, and Skype.
Britain's GCHQ created the Tempora program in which the government monitored internet, email, IM, and phone activity using probes that were placed on fiber-optic cables. Internet content collected via the probes could be stored for three days and meta data for up to 30 days. Analysts at the NSA had access to this information.
The Boundless Informant program enabled the NSA to analyze the metadata it collected. The tool has a mapping feature that allows data to be analyzed by country. The program seemingly contradicts claims by NSA officials that it does not have the ability to track the information it collects.
The NSA shares raw intelligence data with Israel, passing it on before determining if it contained information about U.S. citizens.
The NSA spied on Brazilian president Dilma Rousseff as well as Petrobras, Brazil's national oil company.
The NSA conducted surveillance on the European Union embassy in Washington, D.C., France’s Ministry of Foreign Affairs, and the European Council headquarters in Brussels.
In one 30-day period between Dec. 2012 and Jan. 2013, the NSA collected information on some 70 million digital communications in France and 60 million in Spain.
The NSA hacked into the email domain of Mexican president Felipe Calderon. Cabinet members also used the same email domain.
According to several news reports, the NSA tapped the cellphone of German chancellor Angela Merkel for about ten years, beginning in 2002.
U.S. and British spies monitored and played massive multiplayer online games, such as World of Warcraft and Second Life, trying to track down terrorists who might use the games to communicate, plan attacks, or send messages. The spies also collected data obtained from smartphone apps, such as Google maps, the game Angry Birds, Facebook, Twitter, and others. These apps can provide agents with a user's location, age, gender, address book, and other data.
Read more: The NSA, Edward Snowden, and Surveillance | Infoplease.com http://www.infoplease.com/news/2013/edward-snowden-leaks.html#ixzz3AYWnkc3J