This topic has been closed due to inactivity. If you would like to discuss this topic further, please start a new post.
You can reference this topic in your post by adding this link:
F-Secure Weblog Ref:- http://www.f-secure.com/weblog/archives/00002578.html
According to what has happened, the NSA Prism Programme is base on facts.
I don't think Snowden is lying.
It seems that companies like Apple, Microsoft, Google, Yahoo and others are involve.
If you were to look at the NSA wikis, it all written there.
It can even stated in the NSA Wikis,
see the excerpt:-
NSA is reported to use its computing capability to analyze "transactional" data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic emails and Internet searches as well as bank transfers, credit-card transactions and travel and telephone records, according to current and former intelligence officials interviewed by The Wall Street Journal.
The NSA began the PRISM electronic surveillance and data mining program in 2007.PRISM gathers communications data on foreign targets and United States citizens from nine major U.S. internet-based communication service providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, voice-over-IP chats such as Skype, and file transfers. Another program, Boundless Informant, employs big data databases, cloud computing technology, and Free and Open Source Software (FOSS) to analyze data collected worldwide by the NSA, including that gathered by way of the PRISM program.
The Real Time Regional Gateway was a data collection program introduced in 2005 in Iraq by NSA during the Iraq War. It consisted of gathering all Iraqi electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques. Glenn Greenwald of The Guardian believes that the "collect it all" strategy introduced by NSA director Alexander shows that "the NSA's goal is to collect, monitor and store every telephone and internet communication" worldwide.[86
And you can even find infos here...
Companies that suspecting inviolve in the Prism programme.
Please read the excerpts here:-
Initial public statements
Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports.Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:
Remember the DigiNotar Case???
Bruce Sheiner did indicate of possible Backdoors on Microsoft products.
Remember Bruce Scheiner did indicate about NSAKEY on Windows.
The NSAKEY got nothing to do with 9/11. These things already happen way before 9/11!!!
It's been there all the time.
It happen to all OSes!
Regardless what OSes you are using, it happen to a Apple MAC OS X, Linux, BSD, Microsoft.
It''s already been there!
Selinux done by whom? Trusted BSD done by whom??
Apple is infact runs under BSD. So I believe it's still there.
All are done by the NSA.
It's a NSA technologies.
Well, I have nothing against them.
I still think that these things are REAL!
Even there is a FBI backdoor!!!!
Believe it or not.
It's their National Security Interest!
They gathering for intelligence. Information gathering to individuals.
They are the code breakers!
They are expert and well verse in Communications (Project Echelon) and Computers technologies.
They have cryptographers and mathematicians.
They can break codes and passwords very easily because they runs SuperComputers at their end.
Since the early ENIAC computers!
Everyone got freak out by it.
No matter what, the backdoor will always be there.
It's their National Security Interest!
Every Computer Security Experts, Cryptographers and Mathematicians knows about these subjects!
Remember they are run by "Enlightened" groupies!
I'm stunned that Snowden was a Certified Ethical Hacker! Maybe a CISSP!
I come to realise that all of them are computer security experts!
Most of them are trained in these fields.
Sounds like the movie "Enemy of the States"
I am worried about the 1.5 BILLION ROUNDS OF AMMUNITION THE DEPARTMENT OF HOMELAND SECURITY PURCHASED NOT MY COMPUTER! If I surf for porn I do not care who knows about it because I do not believe it is a matter of national security but that is enough Ammo to invade South Korea! Except this is the Department of HOMELAND meaning IN the UNITED STATES. Just how much Fire power do they think the terrorists have and how many terrorists do they think they have a million in the US? Either that or they are the worst shots in the history of mankind or they forsee a breakdown of civilization or something is coming and I do not understand why anyone would do something like that Rusli. When we were already fighting two wars. What war is next one against Veterans who are so messed up they can not sleep at night because they did all they asked them too and now have no normal life left?