Tag Archives | PRISM

The NSA Has Built A Shadow Social Network With Your Profile On It

data_modelSatirical imaginings of the NSA creating its own online social network are actually a fairly accurate depiction of the reality, Techdirt reports:

The NY Times has an article by James Risen and Laura Poitras detailing how the NSA has basically built its own “shadow” social network in which it tries to create a “social graph” of pretty much everyone that everyone knows, foreign or American, and it all happens (of course) without a warrant.

The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners.

The policy change came in January of 2011, when the NSA was told it could start creating this massive “social graph” on Americans without having to make sure they weren’t Americans any more.

Read the rest
Continue Reading

How To Opt-Out of PRISM

With all the recent revelations about the NSA and all the companies that are working with them to give away our information, it seems impossible to have any kind of privacy on the internet. In actuality, while there might not be a way to 100% protect yourself all of the time, there are many other options out there that we can take to start to opt-out of Prism and put security barriers in between our personal information and the spying eyes of the government. Luke Rudkowski breaks down some of the programs and applications that we can use as alternatives to the ones we’re currently using like Microsoft Windows, Google, Facebook and more. To check out alternative programs to Prism go to http://www.prism-break.org

Via WeAreChange

Read the rest

Continue Reading

Former NSA Chief on Spy Program: It’s Real, and It’s Spectacular

o-NSA-PHONE-RECORD-COLLECTION-facebookJust in case the cognitive dissonance wasn’t already large enough on the story-and-counterstory around programs such as XKEYSCORE and PRISM, formed NSA head Michael Hayden jumps into the ring:

Last week, the Guardian published a series of leaked documents revealing new details about an NSA surveillance program called XKEYSCORE. The newspaper said that the program enabled the agency to “search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals,” and secret slides dated 2008 showed how people could be deemed a target for searching the Web for “suspicious stuff” or by using encryption.

Following the disclosures, Hayden appeared on CNN to discuss the agency’s surveillance programs. The general, who directed the NSA from 1999 through 2005, was remarkably candid in his responses to Erin Burnett’s questions about the Guardian’s XKEYSCORE report. Was there any truth to claims that the NSA is sifting through millions of browsing histories and able to collect virtually everything users do on the Internet?

Read the rest
Continue Reading

IRS ‘Training’ Agents With AR-15 Assault Rifles Congress Wanted To Ban

The NSA warrantless wiretapping program, PRISM, continues to outrage millions of Americans — but let’s not forget some other recent scandals emerging from our “public servants” in Washington, including serious allegations from the chairman of the House Homeland Security oversight subcommittee that IRS agents are now arming themselves with AR-15 “semi-automatic weapons.” Rep. Duncan claims to have seen this with his own eyes last month.

What is going on in this country? It is one thing to provide your nation’s tax agency with the legal tools necessary to collect debts owed, and another thing altogether to enforce those powers with the precise kinds of assault weapons some members of Congress had wanted to ban earlier this year.

It also recently came out that the IRS spent more than $50 million on conferences between 2010 and 2012. The frugality of these conferences has been called into question. See my take on this above.… Read the rest

Continue Reading

A PRISM of Uncertainty: My Story And I’m Sticking To It.

From Modern Mythology

As anyone that hasn’t been under a rock for the past week knows, this “PRISM thing” has blown up all over the internet. Which is a good thing — privacy is something that people should be concerned about, and discuss.

Take a look at some of the other information that came to light in the past few days:

The fictional journalistic “this may or may not be true”:

The following article should be treated as strictly hypothetical. It has been editorialized to simplify the content in certain areas, while maintaining as much technical detail as we can offer. Companies named in this article have been publicly disclosed, or used in example only. This piece should not be taken necessarily as fact but as a working theory that portrays only one possible implementation of the U.S. National Security Agency’s PRISM program as it may exist today.

Read the rest
Continue Reading

NSA’s PRISM Snoops On You Via Google, Facebook, Apple

PrismDo you use any online services like from the likes of Apple, Microsoft, Facebook, Google, Yahoo and AOL? The US Government is monitoring your actions via the NSA’s PRISM program according to the Guardian:

The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.

The NSA access is part of a previously undisclosed program called PRISM, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.

The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation – classified as top secret with no distribution to foreign allies – which was apparently used to train intelligence operatives on the capabilities of the program. The document claims “collection directly from the servers” of major US service providers.

Although the presentation claims the program is run with the assistance of the companies, all those who responded to a Guardian request for comment on Thursday denied knowledge of any such program.

Read the rest
Continue Reading