Σελ. 22 από 22 ΠρώτηΠρώτη ... 21217202122
Εμφάνιση 316-329 από 329
  1. #316
    Εγγραφή
    31-07-2006
    Περιοχή
    Berlin, Deutschland
    Μηνύματα
    4.560
    Downloads
    20
    Uploads
    0
    Τύπος
    VDSL2
    Ταχύτητα
    51200/10240
    ISP
    1&1
    Router
    FRITZ!Box 7362 SL
    Path Level
    Interleaved
    Παράθεση Αρχικό μήνυμα από MNP-10 Εμφάνιση μηνυμάτων
    http://nation.foxnews.com/2014/01/03...ul-suing-obama

    Sen. Rand Paul (R-KY) is leading a class-action lawsuit with hundreds of thousands of Americans against President Barack Obama’s National Security Agency (NSA) over its spying on the American people, Breitbart News has learned.

    Sen. Paul will be discussing the lawsuit in an exclusive appearance on Fox News with host Eric Bolling at 10 PM ET on Friday. Breitbart News has learned that Paul will file the class action lawsuit soon in the D.C. District Court and that he will be filing it as an individual, not as a U.S. Senator. For a U.S. Senator to file a such a class action lawsuit against the President of the United States would be extremely rare.

    With regard to NSA spying, this is the first class action lawsuit against such activity. This allows the American people to join together in a grassroots manner against President Obama’s NSA for the first time in the legal system, as all other lawsuits have been individuals suing against the agency.
    Όχι ότι ο Obama είναι άγιος αλλά το τι επιδιώκεται είναι εμφανές.

    Ελπίζω τουλάχιστον να βγει και κάτι καλό από αυτή την ιστορία.

  2. #317
    Εγγραφή
    01-02-2008
    Ηλικία
    43
    Μηνύματα
    587
    Downloads
    1
    Uploads
    0
    Ταχύτητα
    6000/600
    ISP
    Wind
    DSLAM
    Wind - ΡΟΣΤΑΝ
    Router
    linux
    SNR / Attn
    11(dB) / 34(dB)
    Πάντως offtopic ότι κ να λέμε οι της nsa είναι πολυ μπροστά.Αρχές 2000 έκαναν ενα mac( role based access control) για το linux που ακόμα και σήμερα κάτι αντίστοιχο δεν έχει γίνει που έστω να το πλησιάζει. Αν κ φαίνεται λίγο αστείο το os-level kernel security μπροστα σε τουτο το firmware-based rootkit

  3. #318
    Εγγραφή
    29-06-2005
    Μηνύματα
    15.818
    Downloads
    4
    Uploads
    0
    ISP
    .
    Παράθεση Αρχικό μήνυμα από grayden Εμφάνιση μηνυμάτων
    Όχι ότι ο Obama είναι άγιος αλλά το τι επιδιώκεται είναι εμφανές.
    Ειναι πολιτικος προϊσταμενος και φερει ευθυνη. Απλα τα πραγματα. Αμα δεν φερει ευθυνη ας βγει να πει οτι η NSA ειναι beyond my control ωστε να αναλαβει το κογκρεσο να την ελεγξει.

    edit: Πολλοι αμερικανοι θεωρουν οτι η κινηση του paul ειναι υπερβολικα light και οτι ο obama κανονικα πρεπει να γινει impeach αφου τα συνταγματικα εγκληματα που εχει κανει ειναι πολλα και χοντρα. Λενε οτι ο νιξον ηταν αγιος μπροστα στον ομπαμα.
    Τελευταία επεξεργασία από το μέλος MNP-10 : 04-01-14 στις 20:28.

  4. #319
    Εγγραφή
    31-07-2006
    Περιοχή
    Berlin, Deutschland
    Μηνύματα
    4.560
    Downloads
    20
    Uploads
    0
    Τύπος
    VDSL2
    Ταχύτητα
    51200/10240
    ISP
    1&1
    Router
    FRITZ!Box 7362 SL
    Path Level
    Interleaved
    Παράθεση Αρχικό μήνυμα από MNP-10 Εμφάνιση μηνυμάτων
    Ειναι πολιτικος προϊσταμενος και φερει ευθυνη. Απλα τα πραγματα. Αμα δεν φερει ευθυνη ας βγει να πει οτι η NSA ειναι beyond my control ωστε να αναλαβει το κογκρεσο να την ελεγξει.
    Δεν χρειάζεται να κρυβόμαστε πίσω από το δάχτυλό μας. Πριν ήταν ο Bush, τώρα είναι ο Obama και αύριο θα είναι κάποιος άλλος. Η NSA δεν κάνει ό,τι κάνει εξαιτίας του Obama αλλά λόγω της πολιτικής των ΗΠΑ που ανεξαρτήτως τιμονιέρη είναι σταθερή.

    Η κίνηση του γερουσιαστή και ο τρόπος που πλασάρεται η είδηση από το Fox δείχνουν πολιτικές σκοπιμότητες και όχι προσπάθεια αλλαγής των πρακτικών της NSA. Άλλωστε λες και μόνος σου ότι η κίνηση είναι αρκετά light.

  5. #320
    Εγγραφή
    18-01-2009
    Ηλικία
    38
    Μηνύματα
    1.285
    Downloads
    1
    Uploads
    0
    Ταχύτητα
    1.020/16.075
    ISP
    Forthnet
    DSLAM
    Forthnet - ΑΘΗΝΑ
    Router
    Thompson TG585v7
    SNR / Attn
    6(dB) / 17,5(dB)
    Path Level
    Interleaved
    Παράθεση Αρχικό μήνυμα από MNP-10 Εμφάνιση μηνυμάτων
    Ειναι πολιτικος προϊσταμενος και φερει ευθυνη. Απλα τα πραγματα. Αμα δεν φερει ευθυνη ας βγει να πει οτι η NSA ειναι beyond my control ωστε να αναλαβει το κογκρεσο να την ελεγξει.

    edit: Πολλοι αμερικανοι θεωρουν οτι η κινηση του paul ειναι υπερβολικα light και οτι ο obama κανονικα πρεπει να γινει impeach αφου τα συνταγματικα εγκληματα που εχει κανει ειναι πολλα και χοντρα. Λενε οτι ο νιξον ηταν αγιος μπροστα στον ομπαμα.

    Πρέπει να ξεκαθαρίσεις τι εννοείς όταν λες πολλοί. Σίγουρα περισσότεροι από ένα χρόνο πριν αλλά στην πλειονότητα το έχουν πάρει όλοι χαλαρά, ακόμα και οι ρεπουμπλικάνοι που θα μπορούσαν να χτυπήσουν επικοινωνιακά σε αυτό, πέρα από τους πιο liberatrian τύπου Paul(που είναι μεγάλος καραγκιόζης γενικά) συμφωνούν και μάλιστα θέλουν πιο πολύ παρακολούθηση.
    “This is hell, this is not Wall Street. We have a little thing called integrity here” Crowley King of Hell
    A computer without windows is like a cake without mustard!!!

  6. #321
    Εγγραφή
    29-06-2005
    Μηνύματα
    15.818
    Downloads
    4
    Uploads
    0
    ISP
    .
    Παράθεση Αρχικό μήνυμα από grayden Εμφάνιση μηνυμάτων
    Δεν χρειάζεται να κρυβόμαστε πίσω από το δάχτυλό μας. Πριν ήταν ο Bush, τώρα είναι ο Obama και αύριο θα είναι κάποιος άλλος. Η NSA δεν κάνει ό,τι κάνει εξαιτίας του Obama αλλά λόγω της πολιτικής των ΗΠΑ που ανεξαρτήτως τιμονιέρη είναι σταθερή.
    Υποτιθεται ομως οτι υπαρχει πολιτικο accountability και οτι οι υπηρεσιες δεν ειναι rogue. Αν θελει ας το πει στο δικαστηριο οτι ειναι beyond his control.

    - - - Updated - - -

    Παράθεση Αρχικό μήνυμα από zoxir Εμφάνιση μηνυμάτων
    Πρέπει να ξεκαθαρίσεις τι εννοείς όταν λες πολλοί. Σίγουρα περισσότεροι από ένα χρόνο πριν αλλά στην πλειονότητα το έχουν πάρει όλοι χαλαρά, ακόμα και οι ρεπουμπλικάνοι που θα μπορούσαν να χτυπήσουν επικοινωνιακά σε αυτό, πέρα από τους πιο liberatrian τύπου Paul(που είναι μεγάλος καραγκιόζης γενικά) συμφωνούν και μάλιστα θέλουν πιο πολύ παρακολούθηση.
    Η πλειοψηφια στις ΗΠΑ κοιμαται, επομενως δεν εννοω τη πλειοψηφια. Εννοω οσους ειναι πολιτικοποιημενοι και αηδιασμενοι απ'τον Ομπαμα. Αν θες ακριβες νουμερο, δεν υπαρχει.

  7. #322
    Εγγραφή
    31-07-2006
    Περιοχή
    Berlin, Deutschland
    Μηνύματα
    4.560
    Downloads
    20
    Uploads
    0
    Τύπος
    VDSL2
    Ταχύτητα
    51200/10240
    ISP
    1&1
    Router
    FRITZ!Box 7362 SL
    Path Level
    Interleaved
    Παράθεση Αρχικό μήνυμα από MNP-10 Εμφάνιση μηνυμάτων
    Υποτιθεται ομως οτι υπαρχει πολιτικο accountability και οτι οι υπηρεσιες δεν ειναι rogue. Αν θελει ας το πει στο δικαστηριο οτι ειναι beyond his control.
    Σε έναν ιδανικό κόσμο ναι, σε αυτόν εδώ όχι (και ειδικά οι ΗΠΑ ή άλλες χώρες που έχουν σταθερή πολιτική ανεξαρτήτως ηγεσίας).

  8. #323
    Εγγραφή
    18-01-2009
    Ηλικία
    38
    Μηνύματα
    1.285
    Downloads
    1
    Uploads
    0
    Ταχύτητα
    1.020/16.075
    ISP
    Forthnet
    DSLAM
    Forthnet - ΑΘΗΝΑ
    Router
    Thompson TG585v7
    SNR / Attn
    6(dB) / 17,5(dB)
    Path Level
    Interleaved
    Παράθεση Αρχικό μήνυμα από MNP-10 Εμφάνιση μηνυμάτων

    Η πλειοψηφια στις ΗΠΑ κοιμαται, επομενως δεν εννοω τη πλειοψηφια. Εννοω οσους ειναι πολιτικοποιημενοι και αηδιασμενοι απ'τον Ομπαμα. Αν θες ακριβες νουμερο, δεν υπαρχει.
    Προφανώς δεν ζητάω νούμερα απλά δεν είμαι τόσο αισιόδοξος ως προς το πόσο μπορούν να αντιδράσουν οι λίγοι libertarians που όντως βλέπουν σε τι ακριβώς οδηγεί η πολιτική του Ομπάμα και οι ακόμα λιγότεροι στα αριστερά που δεν έχουν πιει το hope and change kool aid
    “This is hell, this is not Wall Street. We have a little thing called integrity here” Crowley King of Hell
    A computer without windows is like a cake without mustard!!!

  9. #324
    Το avatar του μέλους konenas
    Το μέλος konenas δεν είναι συνδεδεμένο Πρόβατα μην αυτοκτονείτε. Όλα στη σειρά. Ερχόμαστε
    Εγγραφή
    14-08-2007
    Περιοχή
    PIIGS
    Μηνύματα
    4.527
    Downloads
    4
    Uploads
    0
    Τύπος
    FTTH
    Ταχύτητα
    300 bps ή 300Mbps
    ISP
    Το άλλο Πάσχα
    Router
    OpenWrt
    Path Level
    Interleaved
    Οι ΗΠΑ ελέγχονται από τα λόμπι - τραπεζικά, ενεργειακά, βιομηχανικά κλπ.
    Δεν αλλάζουν πολιτική, απλά αλλάζουν κουστούμια από τον καιρό του Ρήγκαν.
    Η αναρρίχηση των λόμπι έγινε σιγά-σιγά μετά τον θάνατο του Ρούσβελτ. Κατάφεραν να έχουν στο χέρι όλο τον πολιτικό κόσμο και να ελέγχουν την χώρα, άρα όλο τον κόσμο.
    Πιστεύω πως ο τελευταίος πρόεδρος που είχε κάποιον έλεγχο ήταν ο Κάρτερ, τώρα πια όλοι είναι ανδρείκελα.
    Δείτε τις ομοιότητες που έχουν με τους εδώ πρωθυπουργούς.
    Μπους - Κωστάκης
    Ομπάμα - ΓΑΠ / Σαμ
    Όσοι το χάλκεον χέρι βαρύ του φόβου αισθάνονται,ζυγόν δουλείας ας έχωσι, θέλει αρετήν και τόλμην η ελευθερία. Ανδρέας Κάλβος
    There is some shit, I will not eat. e.e.cummings
    30 Hours per Week

  10. #325
    Εγγραφή
    01-11-2011
    Μηνύματα
    3.603
    Downloads
    0
    Uploads
    0
    ISP
    HOL

  11. #326
    Εγγραφή
    31-05-2006
    Περιοχή
    Στο σπίτι του Θόδωρα
    Ηλικία
    41
    Μηνύματα
    3.453
    Downloads
    0
    Uploads
    0
    Τύπος
    FTTH
    Ταχύτητα
    Χίλια/Χίλια
    ISP
    INALAN
    Router
    UniFi Express
    Άλλαξε ο Μανωλιός κι έβαλε τα ρούχα του αλλιώς.
    Από ότι φαίνεται όλα θα συνεχίσουν κανονικά όπως και πριν.

    The biggest change however will be in the handling of bulk telephone “metadata” stored by the NSA, the programme that has most outraged civil liberties groups in the US. Henceforth this information will no longer be held directly by the government. But where it will be kept is unclear, given that the phone companies themselves are not keen to keep it. And in any case, experts pointed out, one way or another this data will continue to be collected.
    You thought there would be a funny slogan here.
    You just fell for one of my classical pranks.
    Bazinga

  12. #327
    Εγγραφή
    29-12-2005
    Ηλικία
    45
    Μηνύματα
    4.542
    Downloads
    18
    Uploads
    0
    ISP
    Inalan
    γνωστές εφαρμογές των έξυπνων κινητών φέρεται να θέλησε να χρησιμοποιήσει ή χρησιμοποίησε η NSA για να συγκεντρώσει προσωπικά στοιχεία των χρηστών τους

    NSA and GCHQ target 'leaky' phone apps like Angry Birds to scoop user data


    Spoiler:


    NSA and GCHQ target 'leaky' phone apps like Angry Birds to scoop user data

    • US and UK spy agencies piggyback on commercial data
    • Details can include age, location and sexual orientation
    • Documents also reveal targeted tools against individual phones



    James Ball
    theguardian.com, Monday 27 January 2014 17.30 GMT
    Jump to comments (…)

    Πατήστε στην εικόνα για να τη δείτε σε μεγέθυνση. 

Όνομα:  2b4d9543-8371-4345-8606-b519d6f2446d-460x276.jpeg 
Εμφανίσεις:  2 
Μέγεθος:  49,1 KB 
ID: 134453

    Angry Birds GCHQ documents use Angry Birds – reportedly downloaded more than 1.7bn times – as a case study for app data collection.

    The National Security Agency and its UK counterpart GCHQ have been developing capabilities to take advantage of "leaky" smartphone apps, such as the wildly popular Angry Birds game, that transmit users' private information across the internet, according to top secret documents.

    The data pouring onto communication networks from the new generation of iPhone and Android apps ranges from phone model and screen size to personal details such as age, gender and location. Some apps, the documents state, can share users' most sensitive information such as sexual orientation – and one app recorded in the material even sends specific sexual preferences such as whether or not the user may be a swinger.

    Many smartphone owners will be unaware of the full extent this information is being shared across the internet, and even the most sophisticated would be unlikely to realise that all of it is available for the spy agencies to collect.

    Dozens of classified documents, provided to the Guardian by whistleblower Edward Snowden and reported in partnership with the New York Times and ProPublica, detail the NSA and GCHQ efforts to piggyback on this commercial data collection for their own purposes.

    Scooping up information the apps are sending about their users allows the agencies to collect large quantities of mobile phone data from their existing mass surveillance tools – such as cable taps, or from international mobile networks – rather than solely from hacking into individual mobile handsets.

    Exploiting phone information and location is a high-priority effort for the intelligence agencies, as terrorists and other intelligence targets make substantial use of phones in planning and carrying out their activities, for example by using phones as triggering devices in conflict zones. The NSA has cumulatively spent more than $1bn in its phone targeting efforts.

    The disclosures also reveal how much the shift towards smartphone browsing could benefit spy agencies' collection efforts.
    golden nugget

    Πατήστε στην εικόνα για να τη δείτε σε μεγέθυνση. 

Όνομα:  8447c96e-0cbc-4b63-80aa-365efc82edb7-460x345.jpeg 
Εμφανίσεις:  2 
Μέγεθος:  50,2 KB 
ID: 134454
    A May 2010 NSA slide on the agency's 'perfect scenario' for obtaining data from mobile apps. Photograph: Guardian

    One slide from a May 2010 NSA presentation on getting data from smartphones – breathlessly titled "Golden Nugget!" – sets out the agency's "perfect scenario": "Target uploading photo to a social media site taken with a mobile device. What can we get?"

    The question is answered in the notes to the slide: from that event alone, the agency said it could obtain a "possible image", email selector, phone, buddy lists, and "a host of other social working data as well as location".

    In practice, most major social media sites, such as Facebook and Twitter, strip photos of identifying location metadata (known as EXIF data) before publication. However, depending on when this is done during upload, such data may still, briefly, be available for collection by the agencies as it travels across the networks.

    Depending on what profile information a user had supplied, the documents suggested, the agency would be able to collect almost every key detail of a user's life: including home country, current location (through geolocation), age, gender, zip code, martial status – options included "single", "married", "divorced", "swinger" and more – income, ethnicity, sexual orientation, education level, and number of children.

    The agencies also made use of their mobile interception capabilities to collect location information in bulk, from Google and other mapping apps. One basic effort by GCHQ and the NSA was to build a database geolocating every mobile phone mast in the world – meaning that just by taking tower ID from a handset, location information could be gleaned.

    A more sophisticated effort, though, relied on intercepting Google Maps queries made on smartphones, and using them to collect large volumes of location information.

    So successful was this effort that one 2008 document noted that "[i]t effectively means that anyone using Google Maps on a smartphone is working in support of a GCHQ system."

    The information generated by each app is chosen by its developers, or by the company that delivers an app's adverts. The documents do not detail whether the agencies actually collect the potentially sensitive details some apps are capable of storing or transmitting, but any such information would likely qualify as content, rather than metadata.

    Data collected from smartphone apps is subject to the same laws and minimisation procedures as all other NSA activity – procedures that the US president, Barack Obama, suggested may be subject to reform in a speech 10 days ago. But the president focused largely on the NSA's collection of the metadata from US phone calls and made no mention in his address of the large amounts of data the agency collects from smartphone apps.

    The latest disclosures could also add to mounting public concern about how the technology sector collects and uses information, especially for those outside the US, who enjoy fewer privacy protections than Americans. A January poll for the Washington Post showed 69% of US adults were already concerned about how tech companies such as Google used and stored their information.

    The documents do not make it clear how much of the information that can be taken from apps is routinely collected, stored or searched, nor how many users may be affected. The NSA says it does not target Americans and its capabilities are deployed only against "valid foreign intelligence targets".

    The documents do set out in great detail exactly how much information can be collected from widely popular apps. One document held on GCHQ's internal Wikipedia-style guide for staff details what can be collected from different apps. Though it uses Android apps for most of its examples, it suggests much of the same data could be taken from equivalent apps on iPhone or other platforms.

    The GCHQ documents set out examples of what information can be extracted from different ad platforms, using perhaps the most popular mobile phone game of all time, Angry Birds – which has reportedly been downloaded more than 1.7bn times – as a case study.

    From some app platforms, relatively limited, but identifying, information such as exact handset model, the unique ID of the handset, software version, and similar details are all that are transmitted.

    Other apps choose to transmit much more data, meaning the agency could potentially net far more. One mobile ad platform, Millennial Media, appeared to offer particularly rich information. Millennial Media's website states it has partnered with Rovio on a special edition of Angry Birds; with Farmville maker Zynga; with Call of Duty developer Activision, and many other major franchises.

    Rovio, the maker of Angry Birds, said it had no knowledge of any NSA or GCHQ programs looking to extract data from its apps users.

    "Rovio doesn't have any previous knowledge of this matter, and have not been aware of such activity in 3rd party advertising networks," said Saara Bergström, Rovio's VP of marketing and communications. "Nor do we have any involvement with the organizations you mentioned [NSA and GCHQ]."

    Millennial Media did not respond to a request for comment.

    In December, the Washington Post reported on how the NSA could make use of advertising tracking files generated through normal internet browsing – known as cookies – from Google and others to get information on potential targets.

    However, the richer personal data available to many apps, coupled with real-time geolocation, and the uniquely identifying handset information many apps transmit give the agencies a far richer data source than conventional web-tracking cookies.

    Almost every major website uses cookies to serve targeted advertising and content, as well as streamline the experience for the user, for example by managing logins. One GCHQ document from 2010 notes that cookie data – which generally qualifies as metadata – has become just as important to the spies. In fact, the agencies were sweeping it up in such high volumes that their were struggling to store it.

    "They are gathered in bulk, and are currently our single largest type of events," the document stated.

    The ability to obtain targeted intelligence by hacking individual handsets has been well documented, both through several years of hacker conferences and previous NSA disclosures in Der Spiegel, and both the NSA and GCHQ have extensive tools ready to deploy against iPhone, Android and other phone platforms.

    GCHQ's targeted tools against individual smartphones are named after characters in the TV series The Smurfs. An ability to make the phone's microphone 'hot', to listen in to conversations, is named "Nosey Smurf". High-precision geolocation is called "Tracker Smurf", power management – an ability to stealthily activate an a phone that is apparently turned off – is "Dreamy Smurf", while the spyware's self-hiding capabilities are codenamed "Paranoid Smurf".

    Those capability names are set out in a much broader 2010 presentation that sheds light on spy agencies' aspirations for mobile phone interception, and that less-documented mass-collection abilities.

    The cover sheet of the document sets out the team's aspirations:
    mobile theme

    Πατήστε στην εικόνα για να τη δείτε σε μεγέθυνση. 

Όνομα:  844b8af8-32dc-4ebe-8dd5-6f65962a50bd-460x345.jpeg 
Εμφανίσεις:  2 
Μέγεθος:  52,2 KB 
ID: 134455
    1 The cover slide for a May 2010 GCHQ presentation on mobile phone data interception. Photograph: Guardian

    Another slide details weak spots in where data flows from mobile phone network providers to the wider internet, where the agency attempts to intercept communications. These are locations either within a particular network, or international roaming exchanges (known as GRXs), where data from travellers roaming outside their home country is routed.
    mobile briefing

    Πατήστε στην εικόνα για να τη δείτε σε μεγέθυνση. 

Όνομα:  02b15d97-32b0-44aa-82e4-7f4d9776fb0d-460x345.jpeg 
Εμφανίσεις:  2 
Μέγεθος:  54,0 KB 
ID: 134456
    2 While GCHQ uses Android apps for most of its examples, it suggests much of the same data could be taken from iPhone apps. Photograph: Guardian
    mobile briefing



    Πατήστε στην εικόνα για να τη δείτε σε μεγέθυνση. 

Όνομα:  a52c2207-36f5-4b6f-8a78-609bd44db0fd-460x345.jpeg 
Εμφανίσεις:  2 
Μέγεθος:  59,9 KB 
ID: 134457
    3 GCHQ's targeted tools against individual smartphones are named after characters in the TV series The Smurfs. Photograph: Guardian

    These are particularly useful to the agency as data is often only weakly encrypted on such networks, and includes extra information such as handset ID or mobile number – much stronger target identifiers than usual IP addresses or similar information left behind when PCs and laptops browse the internet.

    The NSA said its phone interception techniques are only used against valid targets, and are subject to stringent legal safeguards.

    "The communications of people who are not valid foreign intelligence targets are not of interest to the National Security Agency," said a spokeswoman in a statement.

    "Any implication that NSA's foreign intelligence collection is focused on the smartphone or social media communications of everyday Americans is not true. Moreover, NSA does not profile everyday Americans as it carries out its foreign intelligence mission. We collect only those communications that we are authorized by law to collect for valid foreign intelligence and counterintelligence purposes – regardless of the technical means used by the targets.

    "Because some data of US persons may at times be incidentally collected in NSA's lawful foreign intelligence mission, privacy protections for US persons exist across the entire process concerning the use, handling, retention, and dissemination of data. In addition, NSA actively works to remove extraneous data, to include that of innocent foreign citizens, as early as possible in the process.

    "Continuous and selective publication of specific techniques and tools lawfully used by NSA to pursue legitimate foreign intelligence targets is detrimental to the security of the United States and our allies – and places at risk those we are sworn to protect."

    The NSA declined to respond to a series of queries on how routinely capabilities against apps were deployed, or on the specific minimisation procedures used to prevent US citizens' information being stored through such measures.

    GCHQ declined to comment on any of its specific programs, but stressed all of its activities were proportional and complied with UK law.

    "It is a longstanding policy that we do not comment on intelligence matters," said a spokesman.

    "Furthermore, all of GCHQ's work is carried out in accordance with a strict legal and policy framework that ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position."



    Κώδικας:
    http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data

  13. #328
    Το avatar του μέλους konenas
    Το μέλος konenas δεν είναι συνδεδεμένο Πρόβατα μην αυτοκτονείτε. Όλα στη σειρά. Ερχόμαστε
    Εγγραφή
    14-08-2007
    Περιοχή
    PIIGS
    Μηνύματα
    4.527
    Downloads
    4
    Uploads
    0
    Τύπος
    FTTH
    Ταχύτητα
    300 bps ή 300Mbps
    ISP
    Το άλλο Πάσχα
    Router
    OpenWrt
    Path Level
    Interleaved
    Παράθεση Αρχικό μήνυμα από 8anos Εμφάνιση μηνυμάτων
    γνωστές εφαρμογές των έξυπνων κινητών φέρεται να θέλησε να χρησιμοποιήσει ή χρησιμοποίησε η NSA για να συγκεντρώσει προσωπικά στοιχεία των χρηστών τους

    NSA and GCHQ target 'leaky' phone apps like Angry Birds to scoop user data


    Spoiler:


    NSA and GCHQ target 'leaky' phone apps like Angry Birds to scoop user data

    • US and UK spy agencies piggyback on commercial data
    • Details can include age, location and sexual orientation
    • Documents also reveal targeted tools against individual phones



    James Ball
    theguardian.com, Monday 27 January 2014 17.30 GMT
    Jump to comments (…)

    Πατήστε στην εικόνα για να τη δείτε σε μεγέθυνση. 

Όνομα:  2b4d9543-8371-4345-8606-b519d6f2446d-460x276.jpeg 
Εμφανίσεις:  2 
Μέγεθος:  49,1 KB 
ID: 134453

    Angry Birds GCHQ documents use Angry Birds – reportedly downloaded more than 1.7bn times – as a case study for app data collection.

    The National Security Agency and its UK counterpart GCHQ have been developing capabilities to take advantage of "leaky" smartphone apps, such as the wildly popular Angry Birds game, that transmit users' private information across the internet, according to top secret documents.

    The data pouring onto communication networks from the new generation of iPhone and Android apps ranges from phone model and screen size to personal details such as age, gender and location. Some apps, the documents state, can share users' most sensitive information such as sexual orientation – and one app recorded in the material even sends specific sexual preferences such as whether or not the user may be a swinger.

    Many smartphone owners will be unaware of the full extent this information is being shared across the internet, and even the most sophisticated would be unlikely to realise that all of it is available for the spy agencies to collect.

    Dozens of classified documents, provided to the Guardian by whistleblower Edward Snowden and reported in partnership with the New York Times and ProPublica, detail the NSA and GCHQ efforts to piggyback on this commercial data collection for their own purposes.

    Scooping up information the apps are sending about their users allows the agencies to collect large quantities of mobile phone data from their existing mass surveillance tools – such as cable taps, or from international mobile networks – rather than solely from hacking into individual mobile handsets.

    Exploiting phone information and location is a high-priority effort for the intelligence agencies, as terrorists and other intelligence targets make substantial use of phones in planning and carrying out their activities, for example by using phones as triggering devices in conflict zones. The NSA has cumulatively spent more than $1bn in its phone targeting efforts.

    The disclosures also reveal how much the shift towards smartphone browsing could benefit spy agencies' collection efforts.
    golden nugget

    Πατήστε στην εικόνα για να τη δείτε σε μεγέθυνση. 

Όνομα:  8447c96e-0cbc-4b63-80aa-365efc82edb7-460x345.jpeg 
Εμφανίσεις:  2 
Μέγεθος:  50,2 KB 
ID: 134454
    A May 2010 NSA slide on the agency's 'perfect scenario' for obtaining data from mobile apps. Photograph: Guardian

    One slide from a May 2010 NSA presentation on getting data from smartphones – breathlessly titled "Golden Nugget!" – sets out the agency's "perfect scenario": "Target uploading photo to a social media site taken with a mobile device. What can we get?"

    The question is answered in the notes to the slide: from that event alone, the agency said it could obtain a "possible image", email selector, phone, buddy lists, and "a host of other social working data as well as location".

    In practice, most major social media sites, such as Facebook and Twitter, strip photos of identifying location metadata (known as EXIF data) before publication. However, depending on when this is done during upload, such data may still, briefly, be available for collection by the agencies as it travels across the networks.

    Depending on what profile information a user had supplied, the documents suggested, the agency would be able to collect almost every key detail of a user's life: including home country, current location (through geolocation), age, gender, zip code, martial status – options included "single", "married", "divorced", "swinger" and more – income, ethnicity, sexual orientation, education level, and number of children.

    The agencies also made use of their mobile interception capabilities to collect location information in bulk, from Google and other mapping apps. One basic effort by GCHQ and the NSA was to build a database geolocating every mobile phone mast in the world – meaning that just by taking tower ID from a handset, location information could be gleaned.

    A more sophisticated effort, though, relied on intercepting Google Maps queries made on smartphones, and using them to collect large volumes of location information.

    So successful was this effort that one 2008 document noted that "[i]t effectively means that anyone using Google Maps on a smartphone is working in support of a GCHQ system."

    The information generated by each app is chosen by its developers, or by the company that delivers an app's adverts. The documents do not detail whether the agencies actually collect the potentially sensitive details some apps are capable of storing or transmitting, but any such information would likely qualify as content, rather than metadata.

    Data collected from smartphone apps is subject to the same laws and minimisation procedures as all other NSA activity – procedures that the US president, Barack Obama, suggested may be subject to reform in a speech 10 days ago. But the president focused largely on the NSA's collection of the metadata from US phone calls and made no mention in his address of the large amounts of data the agency collects from smartphone apps.

    The latest disclosures could also add to mounting public concern about how the technology sector collects and uses information, especially for those outside the US, who enjoy fewer privacy protections than Americans. A January poll for the Washington Post showed 69% of US adults were already concerned about how tech companies such as Google used and stored their information.

    The documents do not make it clear how much of the information that can be taken from apps is routinely collected, stored or searched, nor how many users may be affected. The NSA says it does not target Americans and its capabilities are deployed only against "valid foreign intelligence targets".

    The documents do set out in great detail exactly how much information can be collected from widely popular apps. One document held on GCHQ's internal Wikipedia-style guide for staff details what can be collected from different apps. Though it uses Android apps for most of its examples, it suggests much of the same data could be taken from equivalent apps on iPhone or other platforms.

    The GCHQ documents set out examples of what information can be extracted from different ad platforms, using perhaps the most popular mobile phone game of all time, Angry Birds – which has reportedly been downloaded more than 1.7bn times – as a case study.

    From some app platforms, relatively limited, but identifying, information such as exact handset model, the unique ID of the handset, software version, and similar details are all that are transmitted.

    Other apps choose to transmit much more data, meaning the agency could potentially net far more. One mobile ad platform, Millennial Media, appeared to offer particularly rich information. Millennial Media's website states it has partnered with Rovio on a special edition of Angry Birds; with Farmville maker Zynga; with Call of Duty developer Activision, and many other major franchises.

    Rovio, the maker of Angry Birds, said it had no knowledge of any NSA or GCHQ programs looking to extract data from its apps users.

    "Rovio doesn't have any previous knowledge of this matter, and have not been aware of such activity in 3rd party advertising networks," said Saara Bergström, Rovio's VP of marketing and communications. "Nor do we have any involvement with the organizations you mentioned [NSA and GCHQ]."

    Millennial Media did not respond to a request for comment.

    In December, the Washington Post reported on how the NSA could make use of advertising tracking files generated through normal internet browsing – known as cookies – from Google and others to get information on potential targets.

    However, the richer personal data available to many apps, coupled with real-time geolocation, and the uniquely identifying handset information many apps transmit give the agencies a far richer data source than conventional web-tracking cookies.

    Almost every major website uses cookies to serve targeted advertising and content, as well as streamline the experience for the user, for example by managing logins. One GCHQ document from 2010 notes that cookie data – which generally qualifies as metadata – has become just as important to the spies. In fact, the agencies were sweeping it up in such high volumes that their were struggling to store it.

    "They are gathered in bulk, and are currently our single largest type of events," the document stated.

    The ability to obtain targeted intelligence by hacking individual handsets has been well documented, both through several years of hacker conferences and previous NSA disclosures in Der Spiegel, and both the NSA and GCHQ have extensive tools ready to deploy against iPhone, Android and other phone platforms.

    GCHQ's targeted tools against individual smartphones are named after characters in the TV series The Smurfs. An ability to make the phone's microphone 'hot', to listen in to conversations, is named "Nosey Smurf". High-precision geolocation is called "Tracker Smurf", power management – an ability to stealthily activate an a phone that is apparently turned off – is "Dreamy Smurf", while the spyware's self-hiding capabilities are codenamed "Paranoid Smurf".

    Those capability names are set out in a much broader 2010 presentation that sheds light on spy agencies' aspirations for mobile phone interception, and that less-documented mass-collection abilities.

    The cover sheet of the document sets out the team's aspirations:
    mobile theme

    Πατήστε στην εικόνα για να τη δείτε σε μεγέθυνση. 

Όνομα:  844b8af8-32dc-4ebe-8dd5-6f65962a50bd-460x345.jpeg 
Εμφανίσεις:  2 
Μέγεθος:  52,2 KB 
ID: 134455
    1 The cover slide for a May 2010 GCHQ presentation on mobile phone data interception. Photograph: Guardian

    Another slide details weak spots in where data flows from mobile phone network providers to the wider internet, where the agency attempts to intercept communications. These are locations either within a particular network, or international roaming exchanges (known as GRXs), where data from travellers roaming outside their home country is routed.
    mobile briefing

    Πατήστε στην εικόνα για να τη δείτε σε μεγέθυνση. 

Όνομα:  02b15d97-32b0-44aa-82e4-7f4d9776fb0d-460x345.jpeg 
Εμφανίσεις:  2 
Μέγεθος:  54,0 KB 
ID: 134456
    2 While GCHQ uses Android apps for most of its examples, it suggests much of the same data could be taken from iPhone apps. Photograph: Guardian
    mobile briefing



    Πατήστε στην εικόνα για να τη δείτε σε μεγέθυνση. 

Όνομα:  a52c2207-36f5-4b6f-8a78-609bd44db0fd-460x345.jpeg 
Εμφανίσεις:  2 
Μέγεθος:  59,9 KB 
ID: 134457
    3 GCHQ's targeted tools against individual smartphones are named after characters in the TV series The Smurfs. Photograph: Guardian

    These are particularly useful to the agency as data is often only weakly encrypted on such networks, and includes extra information such as handset ID or mobile number – much stronger target identifiers than usual IP addresses or similar information left behind when PCs and laptops browse the internet.

    The NSA said its phone interception techniques are only used against valid targets, and are subject to stringent legal safeguards.

    "The communications of people who are not valid foreign intelligence targets are not of interest to the National Security Agency," said a spokeswoman in a statement.

    "Any implication that NSA's foreign intelligence collection is focused on the smartphone or social media communications of everyday Americans is not true. Moreover, NSA does not profile everyday Americans as it carries out its foreign intelligence mission. We collect only those communications that we are authorized by law to collect for valid foreign intelligence and counterintelligence purposes – regardless of the technical means used by the targets.

    "Because some data of US persons may at times be incidentally collected in NSA's lawful foreign intelligence mission, privacy protections for US persons exist across the entire process concerning the use, handling, retention, and dissemination of data. In addition, NSA actively works to remove extraneous data, to include that of innocent foreign citizens, as early as possible in the process.

    "Continuous and selective publication of specific techniques and tools lawfully used by NSA to pursue legitimate foreign intelligence targets is detrimental to the security of the United States and our allies – and places at risk those we are sworn to protect."

    The NSA declined to respond to a series of queries on how routinely capabilities against apps were deployed, or on the specific minimisation procedures used to prevent US citizens' information being stored through such measures.

    GCHQ declined to comment on any of its specific programs, but stressed all of its activities were proportional and complied with UK law.

    "It is a longstanding policy that we do not comment on intelligence matters," said a spokesman.

    "Furthermore, all of GCHQ's work is carried out in accordance with a strict legal and policy framework that ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position."



    Κώδικας:
    http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data
    εδώ και καιρό τα παιχνίδια λειτουργούν με ένα σύστημα μαφίας πίσω τους.
    Όποιος θέλει να το διαπιστώσει να γράψει άσχημο σχόλιο για ένα παιχνίδι πχ στην wikipedia.
    Όσοι το χάλκεον χέρι βαρύ του φόβου αισθάνονται,ζυγόν δουλείας ας έχωσι, θέλει αρετήν και τόλμην η ελευθερία. Ανδρέας Κάλβος
    There is some shit, I will not eat. e.e.cummings
    30 Hours per Week

  14. #329
    Εγγραφή
    10-08-2011
    Περιοχή
    Αθήνα
    Ηλικία
    43
    Μηνύματα
    4.218
    Downloads
    4
    Uploads
    0
    Τύπος
    ADSL
    Ταχύτητα
    13760/848
    ISP
    ΟΤΕ Conn-x
    DSLAM
    ΟΤΕ - ΠΙΚΕΡΜΙΟ
    Router
    Netgear DGN2200v4
    Έχει ανοίξει σχετικό θέμα εδώ:

    http://www.adslgr.com/forum/threads/...E%B1%CE%B9-MI6

Σελ. 22 από 22 ΠρώτηΠρώτη ... 21217202122

Παρόμοια Θέματα

  1. Μηνύματα: 3
    Τελευταίο Μήνυμα: 11-03-13, 14:25
  2. Πρόγραμμα παρακολούθησης δικτύου και pc
    Από Amphipolis στο φόρουμ Networking
    Μηνύματα: 6
    Τελευταίο Μήνυμα: 30-01-13, 16:54
  3. Μηνύματα: 12
    Τελευταίο Μήνυμα: 15-08-12, 18:47
  4. Το απόρρητο παρασκήνιο της δημιουργίας του ευρώ
    Από Φιλόσοφος_Στ@ρχίδας στο φόρουμ Πολιτική, Κοινωνικά Θέματα, Επιστήμες και Aθλητισμός
    Μηνύματα: 11
    Τελευταίο Μήνυμα: 28-06-12, 08:50
  5. Μηνύματα: 4
    Τελευταίο Μήνυμα: 27-06-12, 02:08

Tags για αυτό το Θέμα

Bookmarks

Bookmarks

Δικαιώματα - Επιλογές

  • Δεν μπορείτε να δημοσιεύσετε νέα θέματα
  • Δεν μπορείτε να δημοσιεύσετε νέα μηνύματα
  • Δεν μπορείτε να αναρτήσετε συνημμένα
  • Δεν μπορείτε να επεξεργαστείτε τα μηνύματα σας
  •  
  • Τα BB code είναι σε λειτουργία
  • Τα Smilies είναι σε λειτουργία
  • Το [IMG] είναι σε λειτουργία
  • Το [VIDEO] είναι σε λειτουργία
  • Το HTML είναι εκτός λειτουργίας