Tag Archive: AOL


Eight Tech Giants Call For Reform To Surveillance Law

 

” Today, there are full-page advertisements running in the New York Times, Washington Post, Politico, Roll Call, and The Hill. They all have the same message: big tech companies are calling on Congress to rein in the mass surveillance. You can read the full message on the newly-launched Reform Government Surveillance site.

  This is a victory for users—with the companies taking a giant step forward in supporting their customers’ rights. The five basic principles they announced today include:

  1. Limiting Governments’ Authority to Collect Users’ Information
  2. Oversight and Accountability
  3. Transparency About Government Demands
  4. Respecting the Free Flow of Information
  5. Avoiding Conflicts Among Governments

  While these are all valuable, the first one particularly heartened us: “Governments should limit surveillance to specific, known users for lawful purposes, and should not undertake bulk data collection of Internet communications.” With these principles, the companies are joining digital citizens worldwide in demanding a stop to the unrestrained, mass surveillance of our digital lives.”

 

 

    It’s about time . Don’t forget that these companies were very quick to roll over and give the government everything that it demanded as far as access to our personal data and while we commend them for their newfound love of privacy one can only wonder if this letter would have ever come about without the revelations from Edward Snowden being made public . For now color us cautiously optimistic regarding these corporations recently acquired respect for the fourth amendment . 

   It is also worth noting that there are no cell phone carriers/providers among the companies clamoring for renewed privacy laws and therein lies a major drawback to the entire effort to re-establish our right to protection from illegal search and seizure .

 

” But notably absent from the coalition are telecom companies, like Verizon and AT&T. These companies have long been considered the weak link when it comes to government access request. AT&T just announced that it would not respond to shareholder requests to be transparent about its relationship with the NSA.”

 

Just sayin’ …

 

 

 

 

 

 

 

 

U.S., British Intelligence Mining Data From Nine U.S. Internet Companies In Broad Secret Program

 

 

 

 

” The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley.

Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.”

London’s Guardian newspaper reported Friday that GCHQ, Britain’s equivalent of the NSA, also has been secretly gathering intelligence from the same internet companies through an operation set up by the NSA.

According to documents obtained by The Guardian, PRISM would appear to allow GCHQ to circumvent the formal legal process required in Britain to seek personal material such as emails, photos and videos from an internet company based outside of the country.”

 

 

Despite the spate of corporate denials it would appear that they are all willing participants … shame .

 

 

In exchange for immunity from lawsuits, companies such as Yahoo and AOL are obliged to accept a “directive” from the attorney general and the director of national intelligence to open their servers to the FBI’s Data Intercept Technology Unit, which handles liaison to U.S. companies from the NSA. In 2008, Congress gave the Justice Department authority for a secret order from the Foreign Surveillance Intelligence Court to compel a reluctant company “to comply.”

In practice, there is room for a company to maneuver, delay or resist. When a clandestine intelligence program meets a highly regulated industry, said a lawyer with experience in bridging the gaps, neither side wants to risk a public fight. The engineering problems are so immense, in systems of such complexity and frequent change, that the FBI and NSA would be hard pressed to build in back doors without active help from each company.

 

The money quote …

 

As it is written, there is nothing to prohibit the intelligence community from searching through a pile of communications, which may have been incidentally or accidentally been collected without a warrant, to deliberately search for the phone calls or e-mails of specific Americans,” Udall said.

 

 

 

Related:

Google CEO Larry Page On PRISM: ‘What The…?’

Apple: ‘We Have Never Heard Of PRISM’

Dissecting Big Tech’s Denial of Involvement in NSA’s PRISM …

Google and Facebook Double Down on Prism Denials

PRISM’s NSA fallout: Apple, Google, Facebook issue denials …

Evolution Of The PRISM Denials: This May Be Why They Seem …

Apple, Google, Facebook, Yahoo, Microsoft, Paltalk, AOL issue …

Liberal England: PRISM: Should we believe the internet companies …

 

 

 

 

 

 

 

 

—-

 

Government Spying: 1st Verizon, Now The Internet

 

 

Internet_Spying

 

” Washington Post reports U.S. government able to tap the servers of nine Internet companies.”

 

 

Here is the Washington Post article: Documents: U.S. mining data from 9 leading Internet firms; companies deny knowledge

 

An Excerpt :

 

” The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.

The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley.

If document requiring company to submit phone records for millions of Americans is authentic, it would be the broadest surveillance order known to date

Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” “

 

 

 

 

 

 

 

 

—-

Bush Family Emails, Photos Hacked

 

 

 

” Bush spokesman Jim McGrath told the Chronicle the matter is “under criminal investigation.” McGrath did not immediately respond to messages seeking comment by the Associated Press early Friday.

The Smoking Gun says the hacker went by the online moniker “Guccifer,” a word plastered across the leaked photos in translucent, neon blue print.”

 

 

More From Time …The Lesson of the Bush Family Email Hack: Be Worried

 

” A hacker by the name of Guccifer has apparently hacked into several Bush family AOL accounts, pilfered private photos and messages and posted them online. The Smoking Gun, pursuient to their mission, republished it all. The stolen goods include a private letter from George W. Bush to his family about planning the funeral of his father. They include private correspondence from the Fox News journalist Brit Hume on the “silver linings” in the 2012 election. They include a Jeb Bush email about how how George H.W. Bush “helped restore” Bill Clinton’s “sordid reputation.” There is more. You can read about it off site. You can also look at the PG-rated pictures that George W. Bush apparently painted of himself bathing.

There is a criminal investigation. This guy may get caught, just like the guy who hacked Scarlett Johansson’s cell phone got caught. But that will be little consolation. (And it was little consolation to all those members of Congress in recent years who found their private R-rated photos trending on Google.) The fact is that the digital age makes us all unduly vulnerable. As Katy Steinmetz recently wrote for TIME your digital records will outlive you, and may cause your family problems. The permanence of online utterances–a delight to prosecutors, Facebook and snoops–is a bane for the rest of us.”

 

And The Politico : Report: Bush family emails hacked

 

” A computer hacker has broken into the email accounts of some Bush family members, according to the Smoking Gun.

The website reports that “In e-mail exchanges with the person who claimed responsibility for the hack, the individual claimed to have swiped ‘a lot of stuff,’ including ‘interesting mails’ about George H.W. Bush’s recent hospitalization, ‘Bush 43,’ and other Bush family members.” The hacker also claimed to have addresses and contact information for Bush family members, including both former presidents and their children.”

 

 

All the more reason for the development of Silent Circle