tech support 14

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 3 November 2013

NSA Hacks Google, You Need To See The Bigger Picture

Posted on 23:01 by Unknown
Attention increases on the Snoopers and the corruption surrounding them.

This article clearly stated that Keith Alexander has publicly lied and that the reality of how deep the affair of snooping goes is well beyond what most people recognize.

Imagine what happens if the agency or some other party decides to use the the data streams for vengeance. The possibility of great harm to people is far too big to be ignored and needs to be reined in.




Virtual Threat
By Chris Dougherty
1 November 2013

NSA Hacks Google. How could it affect you? Emails? Online searches? Think bigger…

Recently it was leaked that the National Security Agency tapped into primary overseas communication links that connect Yahoo and Google data centers around the world. According to former NSA contractor Edward Snowden, the agency has access to raw data from hundreds of millions of internet users, and many of them are Americans.

 
This is not the first disclosure from Snowden about NSA operations. Snowden is currently living in Russia after being granted temporary asylum following his release of other top secret NSA documents, including those about another agency surveillance program called PRISM. As expected, the U.S. Government would like to have a word with Mr. Snowden about the theft and unauthorized disclosure of that top-secret information.

According to a Washington Post article, a top-secret accounting dated January 9th 2013 provides evidence that the NSA‘s acquisitions directorate sends millions of records every day from Yahoo and Google internal networks to government data warehouses in Fort Meade, MD. In the 30 days prior to the report being released, the report states NSA analysts had processed more than 180 million records. By tapping those pipelines, the agency has access to not only the metadata, which includes information telling who sent what message and when, but analysts also have access to all of the raw data including text, audio and video.

The following slide was taken from a National Security Agency presentation on “Google Cloud Exploitation”. It shows that while most traffic passing from internet users to Google is encrypted, the traffic passing back and forth on the networks connecting Google data centers is in an unencrypted, or “clear text” format.



NSA "Google Cloud Explotation" Presentation

The primary tool that the NSA uses to infiltrate the data links is called MUSCULAR. The program is operated jointly between the National Security Agency (NSA) and the British Government Communications Headquarters (GCHQ). MUSCULAR allows the agencies to copy raw data flows across fiber-optic lines that carry information between the Google data centers.

It is important to note that this program is different than the previously disclosed PRISM program, which gathers user information from court orders. Instead, the MUSCULAR program targets tech companies and collects user data without their knowledge.

Google’s Chief Legal Officer, David Drummond, said the following in response to the news that the National Security Agency had secretly broken into the main links connecting Google’s data centers:


“We have long been concerned about the possibility of this kind of snooping, which is why we have continued to extend encryption across more and more Google services and links, especially the links in the slide. We do not provide any government, including the U.S. government, with access to our systems. We are outraged at the lengths to which the government seems to have gone to intercept data from our private fiber networks, and it underscores the need for urgent reform.”

However, in the past we have heard stories about Google cooperating with the NSA in joint operations. Last summer VirtualThreat.com posted a story about the Department of Justice asking for a court order to keep the Google and NSA partnership a secret. However, in this case it seems the search giant had no prior knowledge of the NSA’s activity.

In response to the allegations that the NSA had broken into Google’s network the National Security Agency released the following statement:


“NSA has multiple authorities that it uses to accomplish its mission, which is centered on defending the nation. The Washington Post’s assertion that we use Executive Order 12333 collection to get around the limitations imposed by the Foreign Intelligence Surveillance Act and FAA 702 is not true. The assertion that we collect vast quantities of U.S. persons’ data from this type of collection is also not true. NSA applies Attorney General-approved processes to protect the privacy of U.S. persons – minimizing the likelihood of their information in our targeting, collection, processing, exploitation, retention, and dissemination. NSA is a foreign intelligence agency. And we’re focused on discovering and developing intelligence about valid foreign intelligence targets only.”

On October 30th, at the Bloomberg Cyber Security Conference in Washington D.C., the head of the National Security Agency, General Keith Alexander, said:


“I can tell you factually we do not have access to Google servers, Yahoo servers…We go through a court order. We issue that court order to them through the FBI. And its not millions, its thousands of those that are done. And its almost all against terrorism and other things like that. It has nothing to do with U.S. persons.”



The PRISM program allows the NSA to gather huge amounts of internet communications by legally compelling U.S. tech companies, including Gooogle, to cooperate with officials and turn over all data that matches court approved search queries. That program. also disclosed by Edward Snowden, is authorized under Section 702 of the FISA Amendments Act. PRISM operations are overseen by the Foreign Intelligence Surveillance Court (FISC).

It doesn’t take a rocket scientist to see the clear advantages for the NSA with regard to their decision to intercept communications using MUSCULAR and overseas access points. With less oversight and looser regulations the agency has the ability to collect data from tech giants like Google using “full take”, “bulk access” and “high volume” operations.

These large scale collection operations would be illegal in the United States, however they are taking place overseas. Here the NSA can assume that anyone with information traversing these links must in fact be a foreigner.

What Are The Implications of a Program Like MUSCULAR?

Many people are saying to themselves “Sure, but how does this affect me?”. Most people only think about Google being used for online searches and email. But did you know Google also has privately branded services that are being used by corporations, non-profit organizations and educational institutions?

For example, my own daughter uses Gmail and Google Drive for her school projects. Her school has assigned every student with a Google email address and a login for the school’s Google Drive account. Google Drive is a service where classroom documents are often stored.

In addition, a company that I worked for in the past used “Google Apps for Business” in order to provide email accounts, chat/voice/video conferencing, document storage and calendaring for its employees. By tapping primary Google data center links, the government potentially has access to all types of information.
 

Google has many service offerings that provide everything from internet searches and email to video conferencing and private data storage. Did you know Google recently bought Motorola Mobility and is now manufacturing mobile phones?

Google is also the creator of the Android software that runs on many mobile phones and internet tablets. Millions of individuals and organizations around the world trust Google to store their data securely away from the prying eyes of hackers and others that would use that information for their own advantage.

To get an idea of how much private information might be traveling across those Google data center links, take a look at the following info-graphic. It only shows a portion of the products offered by Google, but you quickly gain a better understanding of how much data potentially flows across the Google wires.


Google Products…more than just simple email and online searches.

Still think the government only has access to your online search histories and email? One of the coolest/scariest things I’ve noticed recently is the facial recognition software being deployed by Google and other social networking sites like Facebook. Have you ever noticed when you upload photos of people to a site like Picaso or Facebook you are immediately prompted to tag the names of other people in the image?

Typically the software has already completed the hard work of identifying individuals for you, all you have to do is confirm the selections made by the underlying program.

Google has added the capability to instantly recognize people, places, objects and text in photographs both on the internet and on your hard drive. Don’t believe me? Watch the following video and then test it for yourself at http://images.google.com.

When you perform your tests try using photos of celebrities, politicians, TV/radio hosts, musicians, local Realtors, and so on. Let me know your results in the comments below this article.




Considering the fact that Google indexes nearly every web page and photograph on the open internet, try to imagine the vast amounts of identity information that must be traveling back and forth on some of those Google data center links. Combine that information with all of the additional data listed in the info-graphic shown earlier and you have a recipe for privacy abuse and identity theft.

Any person or agency with the keys to all of that raw data could easily build complete profiles on hundreds of millions of individual people, places, companies and organizations at will.

Remember, it all comes down to who’s holding the keys. This time it was the National Security Agency tapping into Google’s data. Next time maybe it will be a hacker group, terrorist organization, or foreign government. It really doesn’t matter who does it in the end.

What really matters is that we have evolved into a society where we voluntarily surrender this information, and our very right to privacy, to the likes of Google, the NSA and hackers from around the world.

–

Chris Dougherty is a grey hat hacker and online security expert. Please visit his blog, www.VirtualThreat.com, for more excellent news and information about protecting yourself in cyberspace.

This article is offered under Creative Commons license. It’s okay to republish it anywhere as long as attribution bio is included and all links remain intact.


original article found here
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Mongol invasion: Inside the most powerful bikie gang in Australia
    American exports. Organized American Crime has gone to Australia. Mongols bikie gang. Picture: News Limited Source: NewsComAu T...
  • The Subversive Sayanim Amongst Us
    Israel continues to pollute the world. Just Wondering by Zen Gardner 28 October 2013 This is a very hot topic that gets taken down off the n...
  • New Xbox Can See Through Your Clothes Like TSA Scanners
    I wonder how sales will fare? Parents won't like it and I imagine many gamers will not want to see themselves either and of course there...
  • Quantum physics proves that there IS an afterlife, claims scientist
    For the unenlightened, and so mindless Doctrinaire God Botherers, an interesting article to read, with an Open Mind? Robert Lanza claims th...
  • Americans Are Finally Learning About False Flag Terror
    If only! The eyes of many parties are starting to open and people are starting to question and perhaps it will cause people to act indivi...
  • IMF Pushes Plan to Plunder Global Wealth
    Not content with having abused the wealth of nations, being riddled with corruption, a history of Gross Incompetence, the IMF now want to se...
  • Record Saudi Arabia oil output fills supply gap
    Record production and still cash is short. Financial Times 16 September 2013 The US might be drowning in oil, but the world is still depende...
  • 25 Fast Facts About The Federal Reserve – Please Share With Everyone You Know
    The reality of the Fed and Fiscal crisis becomes ever more gruesome.  The Economic Collapse By Michael Snyder 15 September 2013 As we approa...
  • New Snowden docs show U.S. spied during G20 in Toronto
    It never ends. CBC News By Greg Weston, Glenn Greenwald and Ryan Gallagher 27 November 2013 Top secret documents retrieved by U.S. whistlebl...
  • Warning - NSA To Oversee Individual Bank Accounts & Wealth
    This will become a a nightmare. They will sequestrate all you have at will. Exactly why Agencies need a 50% budget cut. King World News By E...

Categories

  • Books
  • Exclusive
  • Humor
  • Saturnalia
  • Video

Blog Archive

  • ▼  2013 (500)
    • ►  December (2)
    • ▼  November (184)
      • 3300 Missile Warheads Intercepted Close To Home: W...
      • Elizabeth Warren: The Contender
      • China to Provide Uzbekistan $350M for Crucial Rail...
      • EU banks are on the verge of liquidity crisis
      • Russia Plans to Launch 11 Military Satellites By 2015
      • Why China is fixated on the Moon
      • A substantial prehistoric European ancestry amongs...
      • Drummer Lee Rigby was 'hacked like a joint of meat...
      • Forget About Stashing Your Cash in the Cayman Islands
      • DRDO Planning to Test-fire High-altitude 'Killer' ...
      • The National-Security State’s Childishly Dangerous...
      • GSDF spies have secretly worked abroad without inf...
      • China Declares "Willing To Engage In A Protracted ...
      • The Jesuit Agenda
      • Detroit: The Conspirators Behind the Largest Munic...
      • Homeland Security's Latest Nuclear Defense System ...
      • New Snowden docs show U.S. spied during G20 in Tor...
      • China Is On A Debt Binge And A Buying Spree Unlike...
      • Expect Devastating Global Economic Changes In 2014
      • N.S.A. May Have Hit Internet Companies at a Weak Spot
      • America Lives to Fight Another Day
      • Take the Money and Run: China's Ill-Gotten Wealth ...
      • Bitcoin working with the US government?
      • Angola bans Islam and shuts down all mosques acros...
      • Iran Deal Nullifies Needs for Europe Missile Shiel...
      • Pope Francis, Putin Discuss Syria Solution in Vatican
      • Special Report: How China took control of an OPEC ...
      • You Think You Know Someone, and Then He Gets on a ...
      • Jerusalem, Riyadh stunned: Obama makes Iran 7th wo...
      • The Darkest Hour is Before the Dawn
      • Commentary: Li's visit to lift China's ties with R...
      • Map Shows The NSA's Massive Worldwide Malware Oper...
      • Americans Are Finally Learning About False Flag Te...
      • Banks Warn Fed They May Have To Start Charging Dep...
      • A Confused World Reacts To The Iran Nuclear Deal
      • Obama’s Fight With Israel: This Time It's Serious
      • Revealed: Arnon Milchan - the Hollywood producer b...
      • Google to create a fashionable, prescription lense...
      • China creates air defence zone over Japan-controll...
      • LIST OF NAMES — Military Purge High Officers — Ter...
      • 5 Terrifying Smartphone Hacks You Won’t Believe Ar...
      • Drones deployed to all seven PLA military regions:...
      • Russia forming rapid deployment force
      • ObamaCare: The Neutron Bomb That Will Decimate the...
      • Europe in shock as Ukraine kills integration plan,...
      • Exclusive: 'Dozens' of Terrorists May Be in US as ...
      • Pakistan’s Imran Khan to Block NATO Supplies After...
      • Fed Minutes Reveal a Dangerous Power Grab by New Y...
      • China Announces That It Is Going To Stop Stockpili...
      • Luxembourg, Cyprus, BVI, Seychelles fail tax trans...
      • The ticking time-bomb at the bottom of the Baltic Sea
      • Global Power Structures: Symbolism Report #1
      • NSA Locations
      • America Has Entered a New Level of Tyranny
      • Warning - NSA To Oversee Individual Bank Accounts ...
      • AIR FORCE ONE
      • Lord James gets mooned
      • Secret TPP Negotiations Resume in Salt Lake City
      • RPT-Yellen set to move closer to confirmation as n...
      • US and UK struck secret deal to collect innocent B...
      • US troops could stay in Afghanistan until 2024 - s...
      • Gary Locke receives kind parting words from old fo...
      • Xi thanks Clinton for furthering ties
      • The "Obamacare Shock" - One California Employer's ...
      • How Washington D.C. Is Sucking The Life Out Of Ame...
      • LG TV phones home with your viewing habits, names ...
      • Financially strained Venezuela reportedly cuts gol...
      • NHTSA May Mandate That New Cars Broadcast Location...
      • Longwave Group: Economic Winter Vol.57 Issue 1 - C...
      • China central bank suggests faster tempo for freei...
      • Yahoo to add encryption to all services in wake of...
      • NSA monitored 33m phone calls in Norway: Snowden
      • British Intelligence Operation to Kidnap Snowden? ...
      • Wal-Mart Asks Workers To Donate Food To Its Needy ...
      • DC official fired after criticizing Obama change
      • Corrupt Bank Officials Get Death Sentence in Vietnam
      • Behind the Pentagon’s doctored ledgers, a running ...
      • Dem Senator: 'We All Knew' Obama Was Lying
      • How Britain's Biggest Racists Created Zionism
      • Humor: Careful what you ask Grandma!
      • The Internet Is Now Weaponized, And You Are The Ta...
      • Countdown: US Hits Debt Ceiling in 84 Days
      • Senate Poised to Fund Programs the Military Doesn’...
      • Police departments have NSA like spying powers for...
      • Today Thousands March Against Mainstream Media
      • Security Expert: “Buy American Doesn’t Sell Well A...
      • BOMBSHELL! Diplomatic Agent Reveals That Benghazi ...
      • Meetings: Team Arpaio Put Congress On Obama ID Fra...
      • Humor: Sibbarpsrevyn
      • New Obamacare Tax: Sell Your Home, Help Fund Obama...
      • Articles of Impeachment Introduced to Oust Attorne...
      • Billions of Taxpayer Dollars Funding Insurgents in...
      • New Xbox Can See Through Your Clothes Like TSA Sca...
      • EU uses new budget powers to demand more austerity...
      • Quantum physics proves that there IS an afterlife,...
      • Humor: It rears it's truly ugly head
      • BREAKING: Democrats Give Obama 72 Hours To Fix Hea...
      • China to Ease 1-Child Policy and Abolish Labor Camps
      • Your Phone Number Is Going To Get A Reputation Score
      • Top Ten List of America's Stupidity.
    • ►  October (192)
    • ►  September (122)
Powered by Blogger.

About Me

Unknown
View my complete profile