The cloud is affecting our lifes in a profound way. This presentation elaborates on three interconnected aspects: the loss of control of the citizen, the increasing censorship and the increasing surveillance. Given the recent disclosures, the presentation elaborates in particular on the NSA's PRISM surveillance program.
Presented by Klee Aiken and Maarten Van Horenbeeck at the 30th Annual FIRST Conference, in Kuala Lumpur, Malaysia.
https://www.first.org/conference/2018/program#pan-internet-of-governments-how-policymakers-became-interested-in-cyber
New information and communication technologies impact the way companies do corproate communication. Now, effective communication is a process, a never-endig story, not a fragmented activity.
The Internet of Things
Definition1
The Internet of Things refers to the use of sensors,
actuators, and data communications technology
built into physical objects - from roadways to
pacemakers - that enable those objects to be
tracked, coordinated, or controlled across a data
network or the Internet
There are three steps in Internet of Things
applications:
Capturing data from the object (for example,
simple location data or more complex
information),
Aggregating that information across a data
network, and
Acting on that information - taking immediate
action or collecting data over time to design
process improvements.
-“Facts” about NSA/Snowden/Prism
-data classification
-guideline to Safe use of “Cloud”:
-choosing and using Cloud
-open source, alternative cloud services
Presented by Klee Aiken and Maarten Van Horenbeeck at the 30th Annual FIRST Conference, in Kuala Lumpur, Malaysia.
https://www.first.org/conference/2018/program#pan-internet-of-governments-how-policymakers-became-interested-in-cyber
New information and communication technologies impact the way companies do corproate communication. Now, effective communication is a process, a never-endig story, not a fragmented activity.
The Internet of Things
Definition1
The Internet of Things refers to the use of sensors,
actuators, and data communications technology
built into physical objects - from roadways to
pacemakers - that enable those objects to be
tracked, coordinated, or controlled across a data
network or the Internet
There are three steps in Internet of Things
applications:
Capturing data from the object (for example,
simple location data or more complex
information),
Aggregating that information across a data
network, and
Acting on that information - taking immediate
action or collecting data over time to design
process improvements.
-“Facts” about NSA/Snowden/Prism
-data classification
-guideline to Safe use of “Cloud”:
-choosing and using Cloud
-open source, alternative cloud services
Future data security ‘will come from several sources’John Davis
The process of digitisation will become more all-encompassing, but will create new data security needs that can only be met by multiple suppliers, a report has said. - See more at: http://www.storetec.net/news-blog/future-data-security-will-come-from-several-sources
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By DesignJohn Eckman
At the start, the web was purely stateless – every request was the beginning (and every response the end) of a new conversation. Then we got cookies, so that servers could remember clients, and SSL so we could share information with servers that wasn't seen by all the servers it passed through en route. These two technologies enabled e-commerce and are so foundational now it is hard to imagine the web without them. The problem is the way we'e evolved the web has been down a path of increasingly aggressive data collection and reduced transparency for users.
We should have always been doing privacy by design, data portability, data transparency, and the right to be forgotten. We should not have become dependent on invasive ad tech and aggregated third-party data; we should not have handed over ownership of our own social graphs and connections so cheaply to private commercial interests.
While many (particularly in the US) may be uncomfortable with the legalistic and regulatory approach, preferring a more laissez-faire, self-governing model for virtually everything, the GDPR can be seen as an opportunity to start doing things right – applying the core principles of privacy by design not just where mandated by regulation but as a standard business practice.
How the Surveillance State Changes IT Security ForeverRichard Stiennon
The NSA's appetite for collecting all data has hurt the US tech industry. Trust has been broken on many fronts. Security spending set to explode by a factor of ten to counter the surveillance state.
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
(300-400 words)
1- Watch anyone of the following documentary/movie:
· The Corporation (2005)
· Food Inc. (2009)
· An Inconvenient Truth (2006)
Share your understanding around
Who
THE PEOPLE INVOLVED
What
THE PROBLEMS, THINGS, IDEAS
When
PAST, PRESENT, FUTURE OF THE TOPIC
Where
THE PLACE INVOLVED
Why
THE CAUSES, REASONS, RESULTS, CONDITIONS.
How
HISTORY OR FUNCTION (HOW IT BEGAN OR OPERATES).
………………………………………………………………………………………………………………………………………….
2-
(a) Find a news article about an economic topic that you find interesting.
(b) Make a short bullet-list summary of the article.
(c) Write and illustrate with appropriate graphs an economic analysis of the key points in the article.
Hint: Use 5Ws and 1H in your explanation.
1. Who was involved?
1. What happened?
1. When did it happen?
1. Where did it happen?
1. Why did it happen?
1. How did it happen?
Smartphones Have Privacy Risks.docx
Smartphones Have Privacy Risks
Smartphones, 2013
Top of Form
Bottom of Form
Around the turn of the century, the FBI [Federal Bureau of Investigation] was pursuing a case against a suspect—rumored to be Las Vegas strip-club tycoon Michael Galardi, though documents in the case are still sealed—when it hit upon a novel surveillance strategy.
The suspect owned a luxury car equipped with an OnStar-like system that allowed customers to "phone home" to the manufacturer for roadside assistance. The system included an eavesdropping mode designed to help the police recover the vehicle if it was stolen, but the FBI realized this same antitheft capability could also be used to spy on the vehicle's owner.
When the bureau asked the manufacturer for help, however, the firm (whose identity is still secret) objected. They said switching on the device's microphone would render its other functions—such as the ability to contact emergency personnel in case of an accident—inoperable. A federal appeals court sided with the company; ruling the company could not be compelled to transform its product into a surveillance device if doing so would interfere with a product's primary functionality.
The specifics of that 2003 ruling seem quaint today [in 2012]. The smartphones most of us now carry in our pockets can easily be turned into surveillance and tracking devices without impairing their primary functions. And that's not the only privacy risk created as we shift to a mobile, cloud-based computing world. The cloud services we use to synchronize data between our devices increase the risk of our private data falling prey to snooping by the government, by private hackers, or by the cloud service provider itself. And we're packing ever more private data onto our mobile devices, which can create big headaches if we leave a cell phone in a taxicab.
What to do about it? In this [viewpoint], we'll explore the new privacy threats being created as the world shifts to an increasingly mobile, multi-device computing paradigm. Luckily, there are steps both device makers and lawmakers can take to ...
People as sensors - mining social media for meaningful informationTom Raftery
The video of this talk is available at https://www.youtube.com/watch?v=4ZdknOPY_jQ
More and more we are all broadcasting information. Geolocation data, “this x sucks” data, weather data, etc.
More and more that data is being parsed and analysed in realtime, such that we have now become sensors.
How does this work, what does this mean, and what risks/benefits will it bring?
Once again, it’s time for Kaspersky to deliver our customary retrospective of the key events that have defined the threat landscape in 2013. Let’s start by looking back at the things we thought would shape the year ahead, based on the trends we observed in the previous year.
As our lives are more and more digital, more and more personal data travels. Consumers are becoming aware & worry, especially in a context of scandals around privacy on internet. Brands have to change their approach to big data to establish a real trusting relationship with their consumers.
Technical drivers of cloud centralization and megacorporate dominationAndrew Oram
Much hand-wringing appears in the press about the seemingly unstoppable ascendance of a few large corporations in computing. Everything seems to be increasingly centralized in such corporations. This presentation will explain why such centralization and the triumph of first movers is facilitated by three technological factors: the end of Moore's Law, compiling complex algorithms into hardware (which may reach its climax in quantum computing), and the value of aggregating large amounts of data. Remedies are also discussed.
The concept of online anonymity refers to keeping the identity of communicators hidden. Online privacy is more than just encrypting and decrypting data; it also includes the concealment of identity. The Dark Web is a section of the Internet that achieves the highest levels of anonymity and security. Dark Web, which, unlike the normal web, requires specialized access procedures, is regarded as the "Evil Twin of the Internet" since more than 57 percent of its area is occupied with unlawful content.
From the Cuckoo’s Egg to Global Surveillance Cyber EspionJeanmarieColbert3
From the Cuckoo’s Egg to Global Surveillance:
Cyber Espionage that Becomes Prohibited
Intervention
Nicolas Jupillat†
I. Introduction ........................................................................ 934
II. Misconceptions about the Regulation of State Conduct
in Cyberspace ..................................................................... 937
A. From “Code is Law” to “Law is Law” ......................... 937
B. International Law is the Law of Nations ....................... 938
C. International Law is Law .............................................. 939
D. Cyberspace and Normative Opportunism ..................... 940
III. Sovereignty ........................................................................ 940
A. Generally ....................................................................... 940
B. Sovereignty in Cyberspace ........................................... 942
C. Non-Intervention ........................................................... 945
1.
The Origin of the Coercion Concept ..................... 948
2.
The Meaning of Coercion ...................................... 949
IV. Espionage Generally .......................................................... 951
A. Wartime ........................................................................ 951
B. Peacetime ...................................................................... 953
1. Definition ................................................................ 953
2. Unsettled Law ......................................................... 954
3. Exceptions to the Case Law Gap ............................ 959
C. International Domains and Organizations .................... 961
1. Domains .................................................................. 962
2. Organizations .......................................................... 966
IV. Cyber Espionage ................................................................ 967
A. What Cyber Espionage is and how it Differs from
Traditional Espionage ................................................. 967
1. Computer Network Exploitation ............................. 968
2. Communications Intelligence ("COMINT") ........... 970
3. Secret Information-Sharing ..................................... 972
B. Why Should Cyber Espionage Be Deterred? ................ 974
† Visiting Professor, University of Detroit Mercy School of Law and Center for Cyber
Security and Intelligence Studies, Google Policy Fellow at the Canadian Internet Policy
and Public Interest Clinic, IEEE Global Initiative for Ethical Considerations in Artificial
Intelligence and Autonomous Systems Law Committee.
934 N.C. J. INT'L L. [Vol. XLII
C. How And When Cyber Espionage Becomes Illegal ..... 978
1. How ......................................................................... 978
2. When: Scale and Coercion ........................ ...
Future data security ‘will come from several sources’John Davis
The process of digitisation will become more all-encompassing, but will create new data security needs that can only be met by multiple suppliers, a report has said. - See more at: http://www.storetec.net/news-blog/future-data-security-will-come-from-several-sources
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By DesignJohn Eckman
At the start, the web was purely stateless – every request was the beginning (and every response the end) of a new conversation. Then we got cookies, so that servers could remember clients, and SSL so we could share information with servers that wasn't seen by all the servers it passed through en route. These two technologies enabled e-commerce and are so foundational now it is hard to imagine the web without them. The problem is the way we'e evolved the web has been down a path of increasingly aggressive data collection and reduced transparency for users.
We should have always been doing privacy by design, data portability, data transparency, and the right to be forgotten. We should not have become dependent on invasive ad tech and aggregated third-party data; we should not have handed over ownership of our own social graphs and connections so cheaply to private commercial interests.
While many (particularly in the US) may be uncomfortable with the legalistic and regulatory approach, preferring a more laissez-faire, self-governing model for virtually everything, the GDPR can be seen as an opportunity to start doing things right – applying the core principles of privacy by design not just where mandated by regulation but as a standard business practice.
How the Surveillance State Changes IT Security ForeverRichard Stiennon
The NSA's appetite for collecting all data has hurt the US tech industry. Trust has been broken on many fronts. Security spending set to explode by a factor of ten to counter the surveillance state.
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
(300-400 words)
1- Watch anyone of the following documentary/movie:
· The Corporation (2005)
· Food Inc. (2009)
· An Inconvenient Truth (2006)
Share your understanding around
Who
THE PEOPLE INVOLVED
What
THE PROBLEMS, THINGS, IDEAS
When
PAST, PRESENT, FUTURE OF THE TOPIC
Where
THE PLACE INVOLVED
Why
THE CAUSES, REASONS, RESULTS, CONDITIONS.
How
HISTORY OR FUNCTION (HOW IT BEGAN OR OPERATES).
………………………………………………………………………………………………………………………………………….
2-
(a) Find a news article about an economic topic that you find interesting.
(b) Make a short bullet-list summary of the article.
(c) Write and illustrate with appropriate graphs an economic analysis of the key points in the article.
Hint: Use 5Ws and 1H in your explanation.
1. Who was involved?
1. What happened?
1. When did it happen?
1. Where did it happen?
1. Why did it happen?
1. How did it happen?
Smartphones Have Privacy Risks.docx
Smartphones Have Privacy Risks
Smartphones, 2013
Top of Form
Bottom of Form
Around the turn of the century, the FBI [Federal Bureau of Investigation] was pursuing a case against a suspect—rumored to be Las Vegas strip-club tycoon Michael Galardi, though documents in the case are still sealed—when it hit upon a novel surveillance strategy.
The suspect owned a luxury car equipped with an OnStar-like system that allowed customers to "phone home" to the manufacturer for roadside assistance. The system included an eavesdropping mode designed to help the police recover the vehicle if it was stolen, but the FBI realized this same antitheft capability could also be used to spy on the vehicle's owner.
When the bureau asked the manufacturer for help, however, the firm (whose identity is still secret) objected. They said switching on the device's microphone would render its other functions—such as the ability to contact emergency personnel in case of an accident—inoperable. A federal appeals court sided with the company; ruling the company could not be compelled to transform its product into a surveillance device if doing so would interfere with a product's primary functionality.
The specifics of that 2003 ruling seem quaint today [in 2012]. The smartphones most of us now carry in our pockets can easily be turned into surveillance and tracking devices without impairing their primary functions. And that's not the only privacy risk created as we shift to a mobile, cloud-based computing world. The cloud services we use to synchronize data between our devices increase the risk of our private data falling prey to snooping by the government, by private hackers, or by the cloud service provider itself. And we're packing ever more private data onto our mobile devices, which can create big headaches if we leave a cell phone in a taxicab.
What to do about it? In this [viewpoint], we'll explore the new privacy threats being created as the world shifts to an increasingly mobile, multi-device computing paradigm. Luckily, there are steps both device makers and lawmakers can take to ...
People as sensors - mining social media for meaningful informationTom Raftery
The video of this talk is available at https://www.youtube.com/watch?v=4ZdknOPY_jQ
More and more we are all broadcasting information. Geolocation data, “this x sucks” data, weather data, etc.
More and more that data is being parsed and analysed in realtime, such that we have now become sensors.
How does this work, what does this mean, and what risks/benefits will it bring?
Once again, it’s time for Kaspersky to deliver our customary retrospective of the key events that have defined the threat landscape in 2013. Let’s start by looking back at the things we thought would shape the year ahead, based on the trends we observed in the previous year.
As our lives are more and more digital, more and more personal data travels. Consumers are becoming aware & worry, especially in a context of scandals around privacy on internet. Brands have to change their approach to big data to establish a real trusting relationship with their consumers.
Technical drivers of cloud centralization and megacorporate dominationAndrew Oram
Much hand-wringing appears in the press about the seemingly unstoppable ascendance of a few large corporations in computing. Everything seems to be increasingly centralized in such corporations. This presentation will explain why such centralization and the triumph of first movers is facilitated by three technological factors: the end of Moore's Law, compiling complex algorithms into hardware (which may reach its climax in quantum computing), and the value of aggregating large amounts of data. Remedies are also discussed.
The concept of online anonymity refers to keeping the identity of communicators hidden. Online privacy is more than just encrypting and decrypting data; it also includes the concealment of identity. The Dark Web is a section of the Internet that achieves the highest levels of anonymity and security. Dark Web, which, unlike the normal web, requires specialized access procedures, is regarded as the "Evil Twin of the Internet" since more than 57 percent of its area is occupied with unlawful content.
From the Cuckoo’s Egg to Global Surveillance Cyber EspionJeanmarieColbert3
From the Cuckoo’s Egg to Global Surveillance:
Cyber Espionage that Becomes Prohibited
Intervention
Nicolas Jupillat†
I. Introduction ........................................................................ 934
II. Misconceptions about the Regulation of State Conduct
in Cyberspace ..................................................................... 937
A. From “Code is Law” to “Law is Law” ......................... 937
B. International Law is the Law of Nations ....................... 938
C. International Law is Law .............................................. 939
D. Cyberspace and Normative Opportunism ..................... 940
III. Sovereignty ........................................................................ 940
A. Generally ....................................................................... 940
B. Sovereignty in Cyberspace ........................................... 942
C. Non-Intervention ........................................................... 945
1.
The Origin of the Coercion Concept ..................... 948
2.
The Meaning of Coercion ...................................... 949
IV. Espionage Generally .......................................................... 951
A. Wartime ........................................................................ 951
B. Peacetime ...................................................................... 953
1. Definition ................................................................ 953
2. Unsettled Law ......................................................... 954
3. Exceptions to the Case Law Gap ............................ 959
C. International Domains and Organizations .................... 961
1. Domains .................................................................. 962
2. Organizations .......................................................... 966
IV. Cyber Espionage ................................................................ 967
A. What Cyber Espionage is and how it Differs from
Traditional Espionage ................................................. 967
1. Computer Network Exploitation ............................. 968
2. Communications Intelligence ("COMINT") ........... 970
3. Secret Information-Sharing ..................................... 972
B. Why Should Cyber Espionage Be Deterred? ................ 974
† Visiting Professor, University of Detroit Mercy School of Law and Center for Cyber
Security and Intelligence Studies, Google Policy Fellow at the Canadian Internet Policy
and Public Interest Clinic, IEEE Global Initiative for Ethical Considerations in Artificial
Intelligence and Autonomous Systems Law Committee.
934 N.C. J. INT'L L. [Vol. XLII
C. How And When Cyber Espionage Becomes Illegal ..... 978
1. How ......................................................................... 978
2. When: Scale and Coercion ........................ ...
Similar to The Internet & The Cloud - Socio-economic Impact on Citizens (20)
03062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
El Puerto de Algeciras continúa un año más como el más eficiente del continente europeo y vuelve a situarse en el “top ten” mundial, según el informe The Container Port Performance Index 2023 (CPPI), elaborado por el Banco Mundial y la consultora S&P Global.
El informe CPPI utiliza dos enfoques metodológicos diferentes para calcular la clasificación del índice: uno administrativo o técnico y otro estadístico, basado en análisis factorial (FA). Según los autores, esta dualidad pretende asegurar una clasificación que refleje con precisión el rendimiento real del puerto, a la vez que sea estadísticamente sólida. En esta edición del informe CPPI 2023, se han empleado los mismos enfoques metodológicos y se ha aplicado un método de agregación de clasificaciones para combinar los resultados de ambos enfoques y obtener una clasificación agregada.
01062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
‘वोटर्स विल मस्ट प्रीवेल’ (मतदाताओं को जीतना होगा) अभियान द्वारा जारी हेल्पलाइन नंबर, 4 जून को सुबह 7 बजे से दोपहर 12 बजे तक मतगणना प्रक्रिया में कहीं भी किसी भी तरह के उल्लंघन की रिपोर्ट करने के लिए खुला रहेगा।
31052024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
An astonishing, first-of-its-kind, report by the NYT assessing damage in Ukraine. Even if the war ends tomorrow, in many places there will be nothing to go back to.
9. skimminglight.netThe Cloud
9/7824 June 2013
Ownership
● Digitalization of goods
● From product to service
– Subscription-based
● In particular
– Books, magazines,
– Movies, music, television
– Software
>> You own nothing <<
10. skimminglight.netThe Cloud
10/7824 June 2013
Terms of Use
● Arbitrariness
– Changes possible
– E.g. privacy policy Facebook
● Example: Linn Jordet Nygaard
– Amazon removed books
without prior warning
● Army of advocates
– SMEs cannot win
– Even if cloud provider did not meet SLAs
>> Take it or leave it <<
You
11. skimminglight.netThe Cloud
11/7824 June 2013
Privacy
● Enormous profiling
– Surfing behavior
– Social trail
● Targeted publicity
– Stimulate consumption
● Incertainty
– Deleted vs. Invisible
– What in case of leakage?
>> You are the product <<
12. skimminglight.netThe Cloud
12/7824 June 2013
Filter Bubble
● Priority to what might interest you
– Based on personal profile
● Protected from
– New ideas
– Potentially interesting info
>> They determine what you see <<
13. skimminglight.netThe Cloud
13/7824 June 2013
Summary (1/2)
>> You own nothing <<
>> Take it or leave it <<
>> You are the product <<
>> They determine what you see <<
16. skimminglight.netThe Cloud
16/7824 June 2013
The cloud is good for you
“The Internet and in particular free cloud
services such as Twitter, Youtube and
Facebook democratized media. Everyone
can become news producer and consume
the news he selects. The hegemony of
the large media corporations is finally
broken.”
I l l u s i o n
21. skimminglight.netThe Cloud
21/7824 June 2013
Turkish protests 2013
http://www.guardian.co.uk/technology/2013/jun/04/turkish-protestors-encryption-software-evade-censors
http://www.guardian.co.uk/world/2013/jun/02/turkish-protesters-control-istanbul-square
"There is now a menace which is called
Twitter. The best examples of lies can be
found there. To me, social media is the
worst menace to society."
Recep Tayyip Erdoğan
Prime minister of Turkey
22. skimminglight.netThe Cloud
22/7824 June 2013
In times of social stability, a high degree of
freedom is tolerated. However, when
tensions in society increase, governments
easily resort to Internet censorship.
(And we are not only talking about countries with a bad
reputation regarding freedom of the press)
28. skimminglight.netThe Cloud
28/7824 June 2013
Summary
● Censorship by
– Governments
● Undemocratic
– Cloud-providers
● Totally undemocratic
● Dominance cloud-providers → high impact
● Social instability → probability censorship
>> We cannot rely on the Internet
on crucial moments <<
31. skimminglight.netThe Cloud
31/7824 June 2013
Significantly reduced restrictions in law
enforcement agencies' gathering of intelligence
within the US (FBI, NSA, etc.)
Applies on US territory & US companies (Even
outside the US)
32. skimminglight.netThe Cloud
32/7824 June 2013
http://www.wcl.american.edu/hrbrief/09/1focus.cfm
http://en.wikipedia.org/wiki/Patriot_Act
Up to 7 days without charging suspects with
a crime.
Aliens charged with a crime: up to 6 month.
This can be prolonged (cfr. Guantanamo
Bay)
33. skimminglight.netThe Cloud
33/7824 June 2013
Legislation
● Anti-terror legislation in many countries
– France, Germany, UK, Belgium, …
– Especially since September 2001
>> Legislation being developed
which undermines
social achievements / democracy <<
35. skimminglight.netThe Cloud
35/7824 June 2013
9 November 2005
http://www.businessweek.com/stories/2005-11-09/the-patriot-act-business-balks
“Fearing a terrorist attack, the FBI descended on
casinos, car rental agencies, storage warehouses,
and other Las Vegas businesses with sheaves of
"national security letters" demanding financial records
covering about 1 million revelers. Startled business
owners who questioned the action were told they had
one choice: cough up their documents or wind up
in court.”
36. skimminglight.netThe Cloud
36/7824 June 2013http://www.nytimes.com/2006/06/23/washington/23intel.html
“Data from the Brussels-based banking
consortium, formally known as the Society for
Worldwide Interbank Financial Telecommunication,
has allowed officials from the C.I.A., the Federal
Bureau of Investigation and other agencies to
examine "tens of thousands" of financial
transactions, Mr. Levey said.”
37. skimminglight.netThe Cloud
37/7824 June 2013
http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order
“The National Security Agency is currently
collecting the telephone records of millions
of US customers of Verizon, one of
America's largest telecoms providers, under a
top secret court order issued in April.
The order, a copy of which has been obtained
by the Guardian, requires Verizon on an
"ongoing, daily basis" to give the NSA
information on all telephone calls in its
systems, both within the US and between the
US and other countries.”
6 June 2013
38. skimminglight.netThe Cloud
38/7824 June 2013
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-
program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html?hpid=z1
7 June 2013
Lets have a look at this case...
40. skimminglight.netThe Cloud
40/7824 June 2013
National Security Agency (NSA)
US Secret Service
Part of US army
Collection and analysis of electronic/digital
communications, both foreign an national
Founded in 1952 without consent of Congress
Existence long time denied
Staff: 35000 – 55000
Budget: 8 – 10 billion $
54. skimminglight.netThe Cloud
58/7824 June 2013
“Not only is Congress fully apprised of it, but what
is also true is that the Fisa court has to authorize
it.
What you have is two programs that were
originally authorized by Congress, have been
repeatedly authorized... Congress is
continuously briefed, there are whole layers of
safeguards involved.
We've also set up an audit process... after the
fact, making absolutely certain that all the
safeguards are being properly observed."
http://www.guardian.co.uk/world/2013/jun/07/obama-administration-nsa-prism-revelations-live
“[PRISM] does not apply to US citizens and does
not apply to people living in the United States."
55. skimminglight.netThe Cloud
59/7824 June 2013http://www.guardian.co.uk/world/2013/jun/20/fisa-court-nsa-without-warrant
“The broad scope of the court orders, and the nature
of the procedures set out in the documents, appear to
clash with assurances from President Obama and
senior intelligence officials that the NSA could not
access Americans' call or email information
without warrants.”
“In practice, much of the decision-making appears
to lie with NSA analysts, rather than the Fisa court
or senior officials.”
56. skimminglight.netThe Cloud
60/7824 June 2013http://www.guardian.co.uk/world/2013/jun/20/fisa-court-nsa-without-warrant
“But except when a US citizen is specifically targeted,
the court orders used by the NSA to obtain [online
communications] as part of Prism are these general
FAA orders, not individualized warrants specific to
any individual.
Once armed with these general orders, the NSA is
empowered to compel telephone and internet
companies to turn over to it the communications
of any individual identified by the NSA. ”
57. skimminglight.netThe Cloud
61/7824 June 2013
http://www.scmp.com/news/hong-kong/article/1266777/exclusive-snowden-safe-hong-kong-more-us-cyberspying-details-revealed
“US spies are hacking into Chinese mobile phone
companies to steal text messages and attacking
the servers at Tsinghua University, Edward
Snowden has told the Sunday Morning Post.”
58. skimminglight.netThe Cloud
62/7824 June 20131. www.guardian.co.uk/world/2013/jun/07/obama-administration-nsa-prism-revelations-live
When you actually
look at the details,
I think we've struck
the right balance.1
59. skimminglight.netThe Cloud
63/7824 June 2013
To Sum Up
● Acess to data
– In rest & in transit
● Scale
– Unclear
– Much power & freedom to NSA
● Clear direction
– Obama extends surveillance of predecessor
– Growing Capabilities (technology & legal)
● More revelations?
61. skimminglight.netThe Cloud
66/7824 June 2013http://reuters.tumblr.com/post/52817521108
81m
63m
63m
314m
80m
23m
1205m
199m
22m
61m
http://reuters.tumblr.com/post/52817521108
Proportionally, US is not on top
Data Accuracy?
Penetration of these services varies
population
63. skimminglight.netThe Cloud
68/7824 June 2013
“GCHQ has secretly gained access to the
network of cables which carry the world's
phone calls and internet traffic and has started
to process vast streams of sensitive personal
information which it is sharing with the NSA”
http://www.guardian.co.uk/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa
Snowden "They [GCHQ] are worse than the US."
64. skimminglight.netThe Cloud
69/7824 June 2013
“[The] ambition is reflected in the titles [...]:
Mastering the Internet and Global Telecoms
Exploitation, aimed at scooping up as much
online and telephone traffic as possible. This is all
being carried out without any form of public
acknowledgement or debate.”
http://www.guardian.co.uk/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa
65. skimminglight.netThe Cloud
70/7824 June 2013
“[Storage] of data drawn from fibre-optic
cables for up to 30 days so that it can be
sifted and analysed. That operation,
codenamed Tempora, has been running for
some 18 months.”
http://www.guardian.co.uk/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa
“This includes recordings of phone calls,
the content of email messages, entries on
Facebook and the history of any internet
user's access to websites [...]”
68. skimminglight.netThe Cloud
74/7824 June 2013
Erich Mielke,
Minister Staatssicherheit (Stasi)
from 1957 until 1989
in the former GDR
George Orwell,
Author of '1984'
Would have been inspiring to...
And many more...
69. skimminglight.netThe Cloud
75/7824 June 2013
Increased
censorship
Loss of
citizens' control
Increased
surveillance
Weakening
democracy
& rising
tensions
Contributes to
requires
requires
amplifies
facilitates
facilitates
Economic
decline
Nationalist
rethoric
Openess for
Acceptance of
Cyber war/
espionage
Contributesto
72. skimminglight.netThe Cloud
78/7824 June 2013
For more information
www.skimminglight.net
The Internet & The Cloud – Socio-Economic Implications on Citizens
Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.