Pages in topic:   < [1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37] >
Off topic: UYARI: Dikkat Scam
Thread poster: Adnan Özdemir
Adnan Özdemir
Adnan Özdemir  Identity Verified
Türkiye
Local time: 10:19
Member (2007)
German to Turkish
+ ...
TOPIC STARTER
Almanca yazı.. Konusu aşağıdadır Dec 9, 2013

--Alıntıdır--

NSA-SKANDAL
Internet-Riesen verbünden sich und fordern Reformen


Von Andrej Sokolow und Christoph Dernbach, dpa
---------------------------------------------------------------
Informationen abgreifen: Der Staat gehörte zu den Geburtshelfern des Silicon Valley - inzwischen ist das Verhältnis zu den Tech-Riesen getrübt
........................................................................................................
... See more
--Alıntıdır--

NSA-SKANDAL
Internet-Riesen verbünden sich und fordern Reformen


Von Andrej Sokolow und Christoph Dernbach, dpa
---------------------------------------------------------------
Informationen abgreifen: Der Staat gehörte zu den Geburtshelfern des Silicon Valley - inzwischen ist das Verhältnis zu den Tech-Riesen getrübt
.................................................................................................................................................................................................................................

Gemeinsam gegen staatliche Überwachung: Acht amerikanische Internet-Riesen verbünden sich jetzt in der Forderung nach Reformen. Die Aktion zeigt, wie aufgebracht die Unternehmen inzwischen über die NSA-Spionage in ihren Systemen sind.

Washington/Berlin - Wenn sich Rivalen wie Google Chart zeigen und Microsoft Chart zeigen in einem Team wiederfinden, muss die Lage ernst sein. Die beiden Firmen, die sonst kaum eine Gelegenheit für Seitenhiebe auslassen, haben inmitten des NSA-Skandals eine Koalition der Internet-Branche für eine Reform des staatlichen Überwachungssystems geschmiedet.

Mit an Bord sind auch Facebook Chart zeigen , Apple Chart zeigen , Yahoo Chart zeigen , AOL sowie die Online-Netzwerke Twitter und LinkedIn. Die Unternehmen kämpfen darum, das Vertrauen der Nutzer wiederzugewinnen, das durch die aufgedeckten Schnüffeleien der US-Geheimdienste erschüttert wurde.
Die Aktion zeigt, wie aufgebracht die Unternehmen inzwischen über die Spionage in ihren Systemen und gegen ihre Nutzer sind. Bislang standen die US-Regierung, das Militär und die Geheimdienste im Zweifelsfall an der Seite der amerikanischen Hightech-Industrie.

Der Staat gehörte zu den Geburtshelfern des Silicon Valley. Rüstungskonzerne wie Lockheed Martin brachten Produktion und Ingenieure nach Kalifornien. Im Kalten Krieg war der Rüstungs-Wettlauf ein zentraler Antrieb für Investitionen in die Elektronik-Forschung. Auch die Keimzelle des Internets entstand seit den 60er Jahren mit massiver staatlicher Unterstützung.

Vertrauensverhältnis auf die Probe gestellt

In der Internet-Ära blieb das Verhältnis zwischen der Branche und dem Staat lange Zeit weitgehend ungetrübt. Als Google Ziel eines groß angelegten Hacker-Angriffs aus China wurde, wandte Google-Mitgründer Larry Page sich laut Medienberichten an ranghohe US-Ermittler.

Allem Anschein nach standen damals vor allem Google-Nutzerkonten chinesischer Dissidenten im Visier. Der Fall belastete auch die Beziehungen zwischen Peking und Washington. Die Internet-Branche konnte sich im Zweifel auf die Politiker in Washington verlassen.

Doch mit immer neuen Enthüllungen im Zuge des NSA-Skandals wurde das Vertrauensverhältnis auf die Probe gestellt. Nach den ersten Berichten über das Überwachungsprogramm Prism im Juni wiederholten die Unternehmen noch standhaft die praktisch wortgleiche Formulierung, dass sie Behörden keinen direkten Zugang zu ihren Servern gewährten.

Google verlangte schon damals, die exakte Zahl der Geheimdienst-Anfragen nach Nutzerdaten nennen zu dürfen - eine Forderung, die bis heute nicht erfüllt wurde.

Zuckerberg: "Die Regierung hat es vergeigt"

In den vergangenen Woche wurde die Distanz jedoch größer, der Ton kühler. Die Regierung habe es "vergeigt", erklärte Facebook-Chef Mark Zuckerberg in eher jugendlicher Wortwahl. Der Geduldsfaden riss endgültig, nachdem die "Washington Post" schrieb, dass die NSA Nutzerdaten systematisch zwischen den Rechenzentren von Google und Yahoo sowie möglicherweise auch Microsoft abgreift.

Microsoft-Chefjustitiar Brad Smith sprach von einem "Erdbeben". Bei Google erklärte Verwaltungsratschef Eric Schmidt, ein solches Vorgehen wäre illegal gewesen. Die Internet-Konzerne wollen sich jetzt mit Rundum-Verschlüsselung schützen.

Man kann ihnen durchaus wirtschaftliche Motive für ihren Protest unterstellen: Sollten die Anwender das Vertrauen in die Dienste "Made in USA" verlieren, wird sich dies früher oder später auch in den Bilanzen von Google, Microsoft Facebook & Co. niederschlagen. "Spionieren ist schlecht für das Internet. Und was schlecht für das Internet ist, ist schlecht für das Silicon Valley", argumentiert US-Profressor Jeff Jarvis. "Und was schlecht für das Silcon Valley ist, ist auch schlecht für Amerika."

Amazon bemüht sich um Betrieb der Daten-Cloud der CIA

Es lohnt ein Blick auf die Liste der Teilnehmer an der Initiative. Interessant ist, wer fehlt. So beteiligt sich kein Telekom-Konzern wie AT&T und Verizon oder Level 3, ein Anbieter von Datenpipelines, an der Protestaktion. Dabei sollen sich die Schnittstellen für die NSA-Datensauger gerade in diesem Netzen befinden.
Auch der weltgrößte Online-Händler Amazon Chart zeigen ist nicht darunter, der eine gewaltige Cloud-Infrastruktur für viele Internet-Firmen betreibt. Der Name von Amazon tauchte in den bisher veröffentlichten NSA-Papieren nicht auf. Macht die Datensammelwut der NSA vor Amazon halt? Das Unternehmen bemüht sich zugleich um einen Auftrag für den Betrieb der internen Daten-Cloud des US-Geheimdienstes CIA.

Die Koalition der Internet-Riesen scheint nicht aus einem Guss zu sein: Apple unterzeichnete zwar den offenen Brief an das Weiße Haus und den US-Kongress. Unter dem Aufruf zu einer weltweiten Neuordnung der Geheimdienste fehlt dagegen das Logo mit dem angebissenen Apfel. Im Vergleich zu Google und Facebook versucht Apple sich als Unternehmen zu positionieren, das nicht darauf angewiesen ist, massive Datenbestände über seine Anwender anzuhäufen.

Kaynak: http://www.manager-magazin.de/unternehmen/it/a-938069.html




[Edited at 2013-12-09 17:15 GMT]
Collapse


 
Adnan Özdemir
Adnan Özdemir  Identity Verified
Türkiye
Local time: 10:19
Member (2007)
German to Turkish
+ ...
TOPIC STARTER
İngilizce yazı... konusu aşağıdadır Dec 9, 2013

--Alıntıdır--

Telecoms Boss: US 'Should Abide by European Privacy Rules'


The head of German Internet giant Deutsche Telekom has criticized European reaction to the NSA spying scandal and demanded the EU set international privacy standards. US technology players also published an open letter calling for major changes to spying laws.

The head of German telecommunications giant Deutsche Telekom has called for Europe to do more to protect priva
... See more
--Alıntıdır--

Telecoms Boss: US 'Should Abide by European Privacy Rules'


The head of German Internet giant Deutsche Telekom has criticized European reaction to the NSA spying scandal and demanded the EU set international privacy standards. US technology players also published an open letter calling for major changes to spying laws.

The head of German telecommunications giant Deutsche Telekom has called for Europe to do more to protect privacy and combat international spying. Rene Obermann's words come as eight of the world's largest technology companies appealed to President Barack Obama and the US Congress to enact sweeping changes to spying laws and put a stop to mass collection of data.


Obermann, who became chairman of the Deutsche Telekom board in 2006, told German business daily Handelsblatt that politicians in the European Union are not doing enough in response to the spying scandal uncovered by NSA whistleblower Edward Snowden earlier this year. The documents from his archive include allegations that the NSA and the British intelligence agency GCHQ hacked into internal connections between data centers belonging to Google and Yahoo, while millions of pieces of data were gathered. It was also revealed that the NSA was keeping track of mobile phones across the world -- and had even eavesdropped on German Chancellor Angela Merkel.
Obermann pulled no punches in criticizing the data gathering carried out by intelligence agencies in the US and beyond, and said: "I was angered most of all because confidence in two pillars of our society, free communication and privacy, has been shaken to such an extent. I think what is happening is in the long term even dangerous to democracy."

What is needed, Obermann said, is for the European Commission to fundamentally alter the relationship between Europe and the US, or at least its footing. For example, he called for a renegotiation of the Safe Harbor agreement allowing American companies doing business in the EU to transfer personal data like birthplace, telephone numbers and email addresses back to the US. "It's negligent that so little is happening here," he said.

Deutsche Telekom itself has been at the forefront of efforts to create a "German Internet" where data does not go outside national borders.

Mealy-Mouthed Behavior

Ultimately, Obermann believes Europe should try to enforce its stricter rules -- perhaps harmonized around those currently in force in Germany -- on the rest of the world. "If companies from the US or any other country want to do business here in Europe, then they must abide by our standards," he added. "And that also makes economic espionage difficult. I therefore don't understand this mealy mouthed behavior."

The eight tech giants that are signatories to the open letter to President Obama and Congress, which has also appeared in newspaper adverts, would seem to agree that action is needed. In the letter, Apple, Google, Facebook, Microsoft, Twitter, AOL, LinkedIn and Yahoo underline their support of radical reforms which have already been floated in Washington.

"The balance in many countries has tipped too far in the favor of the state and away from the rights of the individual -- rights that are enshrined in our constitution," the letter says. "This undermines the freedoms we all cherish. It's time for change."

Five Principles for Surveillance Reform

Along with a letter, the tech companies also published five principles for reforming government surveillance:

• Limiting the authority of governments to collect information

• Greater oversight and accountability

• More transparency about governmental demands on tech companies

• Respecting the free flow of information

• The creation of a "robust, principled and transparent framework" for requests for data across jurisdictions.

The Silicon Valley companies are also acting from self-interest, as a loss of confidence could affect them badly. Hundreds of millions of people worldwide use their services through email, smartphones, networks and chat programs. According to the Guardian, the letter is the largest concerted action yet by the industry.
But it is not the first -- American tech companies have already asked the US government several times to be allowed to publish details of how many requests they had received under the Foreign Intelligence Surveillance Act (FISA) per year. FISA was adopted as part of the Patriot Act and enables intelligence agencies to force companies to release data using secret court orders. Such arrangements are classified as secret so that the company concerned cannot publish any details.

The eight companies now challenging Washington still face criticism that they accepted this practice without resistance -- only Yahoo had even once complained about such a request for information.

---------
Kaynak: http://www.spiegel.de/international/germany/deutsche-telekom-ceo-calls-for-eu-to-set-international-privacy-standard-a-938003.html

[Edited at 2013-12-09 16:37 GMT]
Collapse


 
Adnan Özdemir
Adnan Özdemir  Identity Verified
Türkiye
Local time: 10:19
Member (2007)
German to Turkish
+ ...
TOPIC STARTER
DOLANDIRICILAR SELÇUK YÖNTEM'İ NASIL DOLANDIRMAK İSTEDİ --CENGİZ SEMERCİOĞLU YAZDI-- 10 ARA Dec 10, 2013

--Alıntıdır--

Dolandırıcılar Selçuk Yöntem’i arayınca...

Tam Canan Karatay’ın dolandırıldığı günlerde Selçuk Yöntem’le Cihangir’de oturuyoruz... “Abi bu cep telefonu sahtekarları bütün ünlülerin peşinde... Seni hiç aramadı mı bunlar, şuraya para gönder, buraya para getir demediler mi” diye bir kılçık attım ortaya...

Meğer aramışlar... Selçuk Yöntem’in, “Nasıl kandırıyorlar bu kadar insanı, beni arasa
... See more
--Alıntıdır--

Dolandırıcılar Selçuk Yöntem’i arayınca...

Tam Canan Karatay’ın dolandırıldığı günlerde Selçuk Yöntem’le Cihangir’de oturuyoruz... “Abi bu cep telefonu sahtekarları bütün ünlülerin peşinde... Seni hiç aramadı mı bunlar, şuraya para gönder, buraya para getir demediler mi” diye bir kılçık attım ortaya...

Meğer aramışlar... Selçuk Yöntem’in, “Nasıl kandırıyorlar bu kadar insanı, beni arasalar ne yaparım acaba” diye düşündüğü günlerden birinde cep telefonu çalmış... “Sizi emniyetten arıyoruz hesaplarınız istenmeyen şahısların eline geçti” gibi bir şeyler söylemişler.

“Arkadan da telsiz sesleri geliyor” diyor Selçuk Yöntem... “Ha ne yapayım” demiş usta oyuncu... “Şuraya şu kadar para getirin...”

“Ya ben şimdi meşgulüm. En iyisi siz Cihangir’e gelip alın... Gelin de ben sizin *#?+\**(^*...” diye başlamış kalaylamaya... Telefon hemen kapanmış.

“Geri aradım, numara düşmedi” diyor Selçuk Yöntem... Biz hep dolandırılanları okuyoruz ama böyle çetin ceviz çıkan ünlüler de var.

---------
Kaynak: http://kelebekgaleri.hurriyet.com.tr/galeridetay/76512/2368/1/selcuk-yontemi-nasil-dolandirmak-istediler-cengiz-semercioglu-yazdi-10-aralik-2013

[Edited at 2013-12-10 12:52 GMT]
Collapse


 
Adnan Özdemir
Adnan Özdemir  Identity Verified
Türkiye
Local time: 10:19
Member (2007)
German to Turkish
+ ...
TOPIC STARTER
Scam mı - Spam mı... Son zamanlar bir de bunlar türedi... Dec 10, 2013

Beatrice Corica

Via Biella 4

10012 Bollengo (TO)

Italy


Dear Sirs,



I am interested in the position of freelance translator from German/English into Italian.

In 2001 I got a post graduate degree in interpreting and translating foreign languages and from then I worked as a freelance translator for several Italian agencies.

In particular I got specialization in the following fields:
... See more
Beatrice Corica

Via Biella 4

10012 Bollengo (TO)

Italy


Dear Sirs,



I am interested in the position of freelance translator from German/English into Italian.

In 2001 I got a post graduate degree in interpreting and translating foreign languages and from then I worked as a freelance translator for several Italian agencies.

In particular I got specialization in the following fields:

commerce, economics, medicine, literature, tourism, technical manuals, software.

I always offered an accurate, cheap and on time translation service.



In response to your search for a freelance translator, I believe my experience in the translation’s field qualifies me for consideration. If you would like, I can provide with current samples with my work.

I hope you will consider me for this position. I look forward to hearing from you very soon.

Sincerely,

Beatrice Corica
--------------------------------

Sürekli alıyorum bu tür e-postaları. İtalyan bacım! Ben işgönderen değilim ki!!!

[Edited at 2013-12-10 15:27 GMT]
Collapse


 
Adnan Özdemir
Adnan Özdemir  Identity Verified
Türkiye
Local time: 10:19
Member (2007)
German to Turkish
+ ...
TOPIC STARTER
Çeng Dec 24, 2013

Gan.Cheng.gc@... sunumlamış:

Dear Sir/Madam,

I am glad to receive the translator recruitment mail from you, and I am willing to apply for the English to Simplified Chinese translation jobs.

I graduated from college and hold a bachelor degree of English Language. I have worked as a full-time translator and freelance translator since I graduated. I always give translation quality priority and deliver best quality translation on time.

Working with world famous localization enterprises currently; Full week working available. Drilled to deliver the credible final work; Working with SDL Trados 2011 and other CAT tools; Respect the agreed deadline and produce the high-quality with reasonable price. Working with me, you will find a trustworthy Chinese translator

Please kindly read my attached resume. Hope it is helpful for you to know me better.
If you find I am suitable for this job, feel free to contact me.
Look forward to our cooperation in the future.


Ado'nun yorumu: Çinli olduğunu sandığım aslan gardaşım GanCheng!
Mektubundan çok etkilendim vallağa bak. Amma ben işgönderen değilim. Elim doluysa eğer, yapabileceğim tek şey; bana sorulan işe uygun bir çevirici arkadaşı tavsiye etmek olur. Fazlasını yapamam. Beni yormazsan sevinirim.

Sağolasın

Ekleme: İmzan çok süpermiş, beğendim.

[Edited at 2013-12-24 17:20 GMT]


 
Halil Ibrahim Tutuncuoglu
Halil Ibrahim Tutuncuoglu "Бёcäטsع Լîfe's cômplicåtعd eñøugh"
Türkiye
Local time: 10:19
Turkish to English
+ ...
TRANSLATORSBASE Dec 24, 2013

Adnan Karamanoğlu Türkoğlu Türküm Özdemir wrote:

Gan.Cheng.gc@... sunumlamış:

Dear Sir/Madam,



Ado'nun yorumu: Çinli olduğunu sandığım aslan gardaşım GanCheng!
Mektubundan çok etkilendim vallağa bak. Amma ben işgönderen değilim. Elim doluysa eğer, yapabileceğim tek şey; bana sorulan işe uygun bir çevirici arkadaşı tavsiye etmek olur. Fazlasını yapamam. Beni yormazsan sevinirim.

Sağolasın

Ekleme: İmzan çok süpermiş, beğendim.

[Edited at 2013-12-24 17:20 GMT]


diye bir site var. Onlar yolluyor. (TRANSLATORSBASE= Çevirmenlerin süflisi/soysuzu/rezili (base)
olarak da çevrilebilme olanağı var. )


 
Adnan Özdemir
Adnan Özdemir  Identity Verified
Türkiye
Local time: 10:19
Member (2007)
German to Turkish
+ ...
TOPIC STARTER
"NSA's Secret Toolbox: Unit Offers Spy Gadgets for Every Need" Dec 30, 2013

--Alıntıdır--

Kaynak: SPIEGEL ONLINE http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html


The NSA has a secret unit that produces special equipment ranging from spyware for computers and cell phones to listening po
... See more
--Alıntıdır--

Kaynak: SPIEGEL ONLINE http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html


The NSA has a secret unit that produces special equipment ranging from spyware for computers and cell phones to listening posts and USB sticks that work as bugging devices. Here are some excerpts from the intelligence agency's own catalog.

When agents with the NSA's Tailored Access Operations (TAO) division want to infiltrate a network or a computer, they turn to their technical experts. This particular unit of the United States intelligence service is known internally as ANT. The acronym presumably stands for Advanced Network Technology, because that's what the division produces -- tools for penetrating network equipment and monitoring mobile phones and computers. ANT's products help TAO agents infiltrate networks and divert or even modify data wherever the NSA's usual methods won't suffice. You can read more about the TAO division, its strengths and tricks in a SPIEGEL feature that was published in English on Sunday.

SPIEGEL has obtained an internal NSA catalog describing ANT's various products, along with their prices. A rigged monitor cable, for example, which allows "TAO personnel to see what is displayed on the targeted monitor," goes for $30 (€22). An "active GSM base station" that makes it possible to mimic the cell phone tower of a target network and thus monitor mobile phones, is available for $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data undetected via radio link, are available in packs of 50, for over $1 million.

Intelligence agencies, incidentally, are not the only ones using these types of devices. The same kind of modified USB plug played a role, for example, in a recent high-tech drug-smuggling case uncovered at the port of Antwerp, Belgium.

Spying on Allies

It has become clear that the ANT arsenal isn't used exclusively to track suspected terrorists. GSM base stations, for example, make it possible to monitor mobile phones, such as that of German Chancellor Angela Merkel. Radar systems such as the one known as "DROPMIRE" have also been used to spy on allies, for example EU representatives in Washington. And the hardware "implants" found in the ANT catalog evidently have been used, for example, to tap encrypted faxes.

NSA malware has also been used against international telecommunications companies, such as partially state-owned Belgian company Belgacom and mobile phone billing service provider MACH. One internal NSA document dating from 2004 describes a spyware program called "VALIDATOR" by saying that it provides "unique backdoor access to personal computers of targets of national interest, including but not limited to terrorist targets."

In the graphic in this article, you can browse nearly 50 pages from the ANT catalog, sorted by where these devices would potentially be used and purged of the names and email addresses of agents. There are "implants," as the NSA calls them, for computers, servers, routers and hardware firewalls. There is special equipment for covertly viewing everything displayed on a targeted individual's monitor. And there are bugging devices that can conduct surveillance without sending out any measurable radio signal -- their signals are instead picked up using radar waves. Many of these items are designed for subverting the technical infrastructure of telecommunications companies to exploit them, undetected, for the NSA's purposes, or for tapping into company networks.

Spyware for mobile phones was even on offer in the 2008 version of the catalog. A Trojan for gaining total access to iPhones, which were still new at the time, was still in development, though its specifications are listed in the catalog.

'Implants' for Cisco, Juniper, Dell, Huawei and HP

The catalog is not up to date. Many of the software solutions on offer date from 2008, some apply to server systems or mobile phone models no longer on the market, and it is very likely that the portions SPIEGEL has seen are far from complete. And yet this version still provides considerable insight both into the tools the NSA has had at its disposal for years and into the agency's boundless ambitions. It is safe to assume that ANT's hackers are constantly improving their arsenal. Indeed, the catalog makes frequent mention of other systems that will be "pursued for a future release."

The NSA has also targeted products made by well-known American manufacturers and found ways to break into professional-grade routers and hardware firewalls, such as those used by Internet and mobile phone operators. ANT offers malware and hardware for use on computers made by Cisco, Dell, Juniper, Hewlett-Packard and Chinese company Huawei.

There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. "Cisco does not work with any government to modify our equipment, nor to implement any so-called security 'back doors' in our products," the company said in a statement. The company has also since commented on SPIEGEL's intitial reporting on a Cisco blog. "We are deeply concerned with anything that may impact the integrity of our products or our customers' networks and continue to seek additional information," the company wrote.

A representative of Hewlett-Packard wrote that the company was not aware of any of the information presented in the report and that it did "not believe any of it to be true." Contacted by SPIEGEL reporters, officials at Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company "respects and complies with the laws of all countries in which it operates."

TAO's implants, in place around the world, have played a significant role in the NSA's ability to establish a global covert network consisting partly of the agency's own hardware, but also of other computers subverted to serve its purposes.

Intercepting Packages and Manipulating Computers

ANT's developers often seek to place their malicious code in BIOS, software located directly on a computer's motherboard that is the first thing to load when the computer is turned on. Even if the hard drive is wiped and a new operating system installed, ANT's malware continues to function, making it possible to later add other spyware back onto the computer.

Along with the BIOS software of computers and servers, the NSA's hackers also attack firmware on computer hard drives, essentially the software that makes the hardware work. The ANT catalog includes, for example, spyware capable of embedding itself unnoticed into hard drives manufactured by Western Digital, Seagate and Samsung. The first two of these are American companies.

Many of these digital tools are "remotely installable," meaning they can be put in place over the Internet. Others, however, require direct intervention, known in NSA jargon as "interdiction." This means that brand new products being delivered by mail are secretly intercepted, and hardware or software implants installed on them. The package is forwarded to its intended destination only after this has been done.

Windows Error Messages Potential Sources of Information

One example of the creativity with which the TAO spies approach their work can be seen in a hacking method that exploits frequent errors on Microsoft Windows. Every user of the operating system is familiar with the window that pops up on screen when an internal problem is detected, asking the user to report the error to Microsoft with a click of the mouse. The window promises this communication will be "confidential and anonymous."

For TAO specialists, these crash reports either were or continue to be a welcome source of potential information. When TAO selects a computer somewhere in the world as a target and enters its unique identifiers (an IP address, for example) into the corresponding database, intelligence agents are then automatically notified any time the operating system of that computer crashes and its user receives the prompt to report the problem to Microsoft.


The automated crash reports are a "neat way" to gain "passive access" to a targeted machine, the presentation continues. Passive access means that, initially, only data the computer sends out into the Internet is captured and saved, but the computer itself is not yet manipulated. Still, even this passive access to error messages provides valuable insights into problems with a targeted person's computer and, thus, information on security holes that might be exploitable for planting malware or spyware on the unwitting victim's computer.

Although the method appears to have little importance in practical terms, the NSA's agents still seem to enjoy it because it allows them to have a bit of a laugh at the expense of the Seattle-based software giant. In one internal graphic, they replaced the text of Microsoft's original error message with one of their own reading, "This information may be intercepted by a foreign sigint system to gather detailed information and better exploit your machine." ("Sigint" stands for "signals intelligence.")

In response to a query from SPIEGEL, NSA officials issued a statement saying, "Tailored Access Operations is a unique national asset that is on the front lines of enabling NSA to defend the nation and its allies." The statement added that TAO's "work is centered on computer network exploitation in support of foreign intelligence collection." The officials said they would not discuss specific allegations regarding TAO's mission.

One trail also leads to Germany. According to a document dating from 2010 that lists the "Lead TAO Liaisons" domestically and abroad as well as names, email addresses and the number for their "Secure Phone," a liaison office is located near Frankfurt -- the European Security Operations Center (ESOC) at the so-called "Dagger Complex" at a US military compound in the Griesheim suburb of Darmstadt.

BY JACOB APPELBAUM, JUDITH HORCHERT, OLE REISSMANN, MARCEL ROSENBACH, JÖRG SCHINDLER AND CHRISTIAN STÖCKER
Collapse


 
Adnan Özdemir
Adnan Özdemir  Identity Verified
Türkiye
Local time: 10:19
Member (2007)
German to Turkish
+ ...
TOPIC STARTER
"Neue Dokumente: Der geheime Werkzeugkasten der NSA" Dec 30, 2013

--Alıntıdır--

Kaynak: SPIEGEL ONLINE http://www.spiegel.de/netzwelt/netzpolitik/neue-dokumente-der-geheime-werkzeugkasten-der-nsa-a-941153.html

Von Jacob Appelbaum, Judith Horchert, Ole Reißmann, Marcel Rosenbach, Jörg Schindler und Christian Stöcker

Die NSA hat eine geheime Abtei
... See more
--Alıntıdır--

Kaynak: SPIEGEL ONLINE http://www.spiegel.de/netzwelt/netzpolitik/neue-dokumente-der-geheime-werkzeugkasten-der-nsa-a-941153.html

Von Jacob Appelbaum, Judith Horchert, Ole Reißmann, Marcel Rosenbach, Jörg Schindler und Christian Stöcker

Die NSA hat eine geheime Abteilung, die Spezialausrüstung herstellt: Spähsoftware für Rechner und Handys, Mobilfunk-Horchposten, manipulierte USB-Stecker und unsichtbare Wanzen. Hier sehen Sie Auszüge aus dem hausinternen Bestellkatalog der Abteilung ANT - Preise inklusive.

Wenn die NSA-Abteilung Tailored Access Operations (maßgeschneiderte Operationen, kurz TAO) ein Netzwerk oder einen Rechner infiltrieren möchte, wendet sie sich an ihre Technikspezialisten. Die entsprechende Einheit des US-Geheimdienstes wird hausintern ANT genannt. Vermutlich stehen die Buchstaben für Advanced Network Technology, denn was ANT herstellt, sind Angriffswaffen zur Penetration von Netzwerkausrüstung, zur Überwachung von Handys und Computern.

ANT-Produkte helfen den NSA-Mitarbeitern dabei, überall dort einzudringen, Daten auszuleiten oder sie gar zu verändern, wo die herkömmlichen Methoden der NSA nicht ausreichen. Mehr über die Abteilung TAO, ihre Stärken und ihre Tricks lesen Sie in der aktuellen Ausgabe des SPIEGEL.

Dem SPIEGEL liegt auch ein NSA-interner Katalog vor, in dem Ausrüstung der TAO-Abteilung ANT feilgeboten wird, Preise inklusive. Ein manipuliertes Monitorkabel etwa, dass es "TAO-Personal erlaubt zu sehen, was auf dem anvisierten Monitor angezeigt wird", gibt es demnach für 30 Dollar, eine "aktive GSM Basisstation", die es erlaubt, sich als Handy-Funkmast auszugeben, um so Mobiltelefone zu überwachen, für 40.000 Dollar. Eine als normaler USB-Stecker getarnte Computerwanze, die unbemerkt über eine Funkverbindung Daten senden und empfangen kann, kostet im Fünfzigerpack über eine Million Dollar.

Solche Geräte benutzen übrigens nicht nur Geheimdienste - kürzlich etwa wurde ein Fall von Hightech-Drogenschmuggel im Hafen von Antwerpen bekannt, bei dem ebenfalls derart modifizierte USB-Stecker eine Rolle spielten.


EU-Niederlassungen, Staatschefs, Telekommunikationskonzerne

Das ANT-Arsenal wird keineswegs nur zur Verfolgung von Terrorverdächtigen eingesetzt, wie mittlerweile bekannt ist. Mit GSM-Basisstationen etwa lassen sich Handys überwachen, auch solche von Staat- und Regierungschefs wie Bundeskanzlerin Angela Merkel. Mit Radarsystemen wie Dropmire wurden auch Verbündete ausgeforscht, etwa die EU-Vertretung in Washington. Auch Hardware-"Implantate", wie sie im ANT-Katalog zu finden sind, kamen dort offenbar zum Einsatz, etwa um ein Gerät für verschlüsselte Faxe anzuzapfen.

NSA-Schadsoftware wird auch gegen internationale Telekommunikationsunternehmen eingesetzt, etwa den halbstaatlichen belgischen Konzern Belgacom (SPIEGEL 46/2013) und Mobilfunk-Abrechnungshäuser wie Mach. In einem NSA-internen Dokument aus dem Jahr 2004 heißt es über eine Spähsoftware namens "Validator", sie richte "eine einzigartige Hintertür auf den Personalcomputern von Zielpersonen von nationalem Interesse" ein, und zwar "einschließlich terroristischer Zielpersonen, aber nicht beschränkt auf diese".

In unserer Grafik können Sie knapp 50 Seiten aus dem ANT-Katalog durchblättern - sortiert nach dem potentiellen Einsatzort und um Namen und E-Mail-Adressen von Mitarbeitern bereinigt. Es gibt "Implantate", wie die NSA das nennt, für Rechner, Server, Router und Hardware-Firewalls, Spezialausrüstung zum heimlichen Mitlesen auf dem Monitor einer Zielperson und Wanzen, die zwar lauschen, aber nicht funken - ihre Signale werden mit Radarwellen ausgelesen. Viele sind dafür gemacht, die technische Infrastruktur von Telekommunikationskonzernen zu unterwandern, um sie unbemerkt für NSA-Zwecke zu missbrauchen, oder um Unternehmensnetze anzuzapfen.

Auch Spähsoftware für Handys war schon 2008 im Angebot. Der Trojaner für den Vollzugriff auf das damals noch neue iPhone befand sich da noch in der Entwicklung, seine Spezifikationen aber sind im Katalog nachzulesen.

"Implantate" für viele große Firmen

Die Zusammenstellung ist nicht aktuell: Viele der angebotenen Softwarelösungen stammen aus dem Jahr 2008, manche betreffen Server-Systeme oder Handys, die heute nicht mehr verkauft werden. Die Zusammenstellung, die dem SPIEGEL vorliegt, dürfte auch bei weitem nicht vollständig sein. Dennoch gibt sie einen guten Eindruck von den Möglichkeiten, die die NSA schon vor Jahren hatte - und von der Schrankenlosigkeit ihrer Ambitionen. Zudem ist davon auszugehen, dass die Hacker der Abteilung ANT ihr Arsenal permanent weiterentwickeln. Oft sind weitere Systeme aufgeführt, die "bald unterstützt" würden.

Betroffen sind auch Produkte namhafter US-Hersteller sowie Router und Hardware-Firewalls für den professionellen Gebrauch, die etwa von Internet- und Mobilfunkbetreibern eingesetzt werden. ANT hat laut diesem Katalog Schadsoftware- und Hardware-Einbauten für Rechner von Cisco, Dell, Juniper, Hewlett-Packard (HP) und dem chinesischen Konzern Huawei im Angebot.

Aus den Unterlagen ergibt sich nicht, dass die erwähnten Unternehmen die NSA unterstützt hätten oder überhaupt Kenntnis von den Überwachungslösungen hatten. "Cisco arbeitet mit keiner Regierung zusammen, um eigene Produkte zu verändern oder sogenannte Sicherheitshintertüren in unseren Produkten zu installieren", heißt es in einer Stellungnahme des Konzerns, in einem Eintrag im hauseigenen Blog kommentiert die Firma bereits die erste Veröffentlichung des SPIEGEL: Man sei sehr besorgt über alles, was die Integrität der eigenen Produkte gefährden könnte.

HP schrieb, dem Unternehmen seien diese Sachverhalte nicht bekannt und man glaube auch nicht, dass sie stimmten. Die Firma selbst entwickle wissentlich keine Produkte, die Sicherheitslücken enthalten. Bei Juniper Networks und Huawei hieß es, man wisse ebenfalls nichts von derlei Modifizierungen. Dell beteuerte generell, sich an die Gesetze aller Länder zu halten, in denen die Firma tätig sei.

TAO-Implantate in aller Welt sind maßgeblich daran beteiligt, dass der US-Geheimdienst ein globales Schattennetzwerk errichten konnte, das zum Teil aus NSA-eigener Hardware, zum Teil aber auch aus zweckentfremdeten Computern besteht.

Pakete auf dem Postweg geöffnet, Rechner manipuliert

Oft versuchen die ANT-Entwickler, ihren Schadcode im sogenannten Bios zu platzieren, einer Software, die direkt auf der Hauptplatine eines Rechners sitzt und beim Einschalten als erstes geladen wird. Selbst wenn die Festplatte gelöscht und ein neues Betriebssystem aufgespielt wird, funktionieren die ANT-Schadprogramme weiterhin und können dafür sorgen, dass später erneut Späh- und Schnüffelsoftware nachgeladen wird.

Neben dem Bios von Rechnern und Servern attackieren die Staatshacker auch die Firmware von Festplatten, gewissermaßen die Software, die die Hardware erst zum Laufen bringt. Im Angebot ist etwa ein Spähprogramm, das sich so unbemerkt auf Festplatten von Western Digital, Seagate und Samsung einnisten kann - auch die beiden erstgenannten Unternehmen stammen aus den USA. Auf Nachfrage gibt Western Digital an, nichts von dieser Einnistung durch die Regierung zu wissen, geschweige denn, ihr dabei geholfen zu haben. Von anderen Firmen liegen bislang keine Stellungnahmen vor.

Viele der digitalen Angriffswaffen lassen sich per Fernzugriff installieren, also über das Internet. Andere erfordern einen direkten Eingriff, Interdiction heißt das im NSA-Jargon. Das bedeutet, dass ausgelieferte, nagelneue Produkte auf dem Postweg heimlich abgefangen werden, um Hard- oder Software-Implantate einzusetzen. Erst dann wird das Paket an seinen eigentlichen Bestimmungsort weitergeleitet.

Windows-Fehlermeldungen als potentielle Informationsquelle

Wie kreativ die Truppe vorgeht, zeigt sich zum Beispiel auch bei einer Methode, die auf die Fehleranfälligkeit des Microsoft-Betriebssystems Windows setzt. Wohl jeder Windows-Nutzer hat das Standardfensterchen schon einmal gesehen, das den Kunden auffordert, mit einem Klick einen Problembericht an Microsoft zu senden. Diese Berichte würden "vertraulich und anonym" behandelt, versichert das Fenster.

Für die TAO-Spezialisten sind oder waren die Fehlerberichte laut interner Dokumente eine potentielle Informationsquelle. Haben sie einen ans Internet angeschlossenen Computer irgendwo auf der Welt einmal zum Ausspähziel erklärt, können sie dafür sorgen, dass sie benachrichtigt werden, sobald der überwachte Benutzer einen solchen Fehlerbericht abschickt.

Die automatisierten Crash-Meldungen seien eine "hübsche Methode", um sich "passiven Zugriff" auf eine "anvisierte Maschine zu verschaffen", heißt es in einem NSA-Dokument. Mit passivem Zugriff ist hier gemeint, dass nur die Daten, die von diesem Rechner aus ins Internet wandern, erfasst und mitgeschnitten und noch keine aktiven Veränderungen auf dem Rechner selbst durchgeführt werden. Doch auch dazu bieten die Fehlermeldungen wertvolle Informationen. Etwa darüber, welche Sicherheitslücken des entsprechenden Rechners sich möglicherweise ausnutzen lassen, um dem Nutzer Schadsoftware unterzujubeln.

Obwohl die Methode in der Praxis kaum Bedeutung haben soll, haben die Agenten offenbar ihren Spaß daran: In einer internen Grafik heißt es im Fenster statt des Originaltextes von Windows hämisch: "Diese Meldung kann von einem ausländischen Sigint-System abgefangen werden, um Ihren Computer besser anzuzapfen."

Die Abteilung TAO sei ein einzigartiges Instrument der USA, heißt es in einer Stellungnahme der NSA. Sie versetze den Dienst in die Lage, "die Nation und ihre Verbündeten an vorderster Front zu verteidigen. Sie konzentriert sich dabei auf die Informationsbeschaffung im Ausland durch die Ausbeutung von Computernetzen". Zu Einzelheiten über die Aufgaben der TAO äußere sich die NSA nicht.

Eine Spur der Hacker führt auch nach Deutschland: Ausweislich eines Papiers aus dem Jahr 2010, das die "wichtigsten TAO-Kontaktstellen" im In- und Ausland mit Namen, E-Mail-Adressen und "sicheren Telefonnummern" auflistet, gab es eine solche TAO-Liaisonstelle dem Dokument zufolge auch in Darmstadt - im "European Security Operations Center" (ESOC) des Dagger-Complexes in Griesheim.

Mitarbeit: Andy Müller-Maguhn
Collapse


 
Adnan Özdemir
Adnan Özdemir  Identity Verified
Türkiye
Local time: 10:19
Member (2007)
German to Turkish
+ ...
TOPIC STARTER
"Dizüstü bilgisayarlarda büyük şok" Dec 30, 2013

--Alıntıdır--

Kaynak: Hürriyet Gazetesi 30 Aralık 2013 http://www.hurriyet.com.tr/teknoloji/25471282.asp

Milyonlarca Gmail ve Yahoo hesaplarına girerek kullanıcıların verilerini izlediği ortaya çıkan ABD Ulusal Güvenlik Dairesi NSA hakkında çok çarpıcı bir iddia daha ortaya atıldı. Alman Der Spiegel dergisi, NSA'nın piyasaya sürülen
... See more
--Alıntıdır--

Kaynak: Hürriyet Gazetesi 30 Aralık 2013 http://www.hurriyet.com.tr/teknoloji/25471282.asp

Milyonlarca Gmail ve Yahoo hesaplarına girerek kullanıcıların verilerini izlediği ortaya çıkan ABD Ulusal Güvenlik Dairesi NSA hakkında çok çarpıcı bir iddia daha ortaya atıldı. Alman Der Spiegel dergisi, NSA'nın piyasaya sürülen milyonlarca dizüstü bilgisayara casus yazılım yüklediğini yazdı.

Der Spiegel'de yer alan habere göre NSA'nın uzman hacker'larından oluşan timi FBI ve CIA ile işbirliğine giderek globalde pek çok bilgisayar parekandecisine gönderilen laptoplara el koydu.

Bu cihazlara son kullanıcıya ulaşmadan evvel müdahale eden NSA, hepsinin içine kendi geliştirdiği casus yazılımı ekledi.

Del Spiegel'in haberinde geçen belgelere göre hacker timi özellikle online satılan dizüstü bilgisayar nakliyatlarına müdahale etti ve ardından bu bilgisayarları özel bir ortama getirterek casus yazılımlarını yükledi.

NSA'nın bilgisayarlara ne tip casus yazılım yüklediği henüz bilinmezken, NSA'nın casus yazılım yüklediği dizüstü bilgisayarların üreticileri arasında Samsung, Huawei, Maxtor ve Dell gibi dünyanın önde gelen teknoloji devleri de yer alıyor.

WINDOWS'TAKİ AÇIKLARI BİLE TARIYOR
Del Spiegel, NSA'nın bilgisayarlara casus yazılım yüklemekle kalmayıp özellikle yaygın olarak kullanılan Windows işletim sisteminin açıklarını tespit ettiği ve bu açıklar için özel olarak zararlı yazılım geliştirdiğine de dikkat çekti.

------------------
Ado'nun yorumu: Ne desem bilemedim vallağa... Kafayı yemişsiniz + sıyırmışsınız + tozutmuşsunuz ey UYDURUK KURUMSALLAR!!!

[Edited at 2013-12-30 19:48 GMT]
Collapse


 
Adnan Özdemir
Adnan Özdemir  Identity Verified
Türkiye
Local time: 10:19
Member (2007)
German to Turkish
+ ...
TOPIC STARTER
"Privatsphäre und Datenschutz" --Almanca video/Euronews-- Jan 12, 2014

--Alıntıdır--

06/01 14:02

Ist es im digitalen Zeitalter noch möglich, unser Privatleben zu schützen? Die Enthüllungen von Edward Snowden über das Ausmaß der amerikanischen Spionage haben in Europa für Aufregung gesorgt. Alles, was wir im Internet tun, wird belauscht und aufgezeichnet – von Staaten und von Privatunternehmen. Der Internet-Bürgerrechtler Jérémie Zimmermann von der Vereinigung “La Quadrature du Net” in Paris meint: “Es wird noch lange
... See more
--Alıntıdır--

06/01 14:02

Ist es im digitalen Zeitalter noch möglich, unser Privatleben zu schützen? Die Enthüllungen von Edward Snowden über das Ausmaß der amerikanischen Spionage haben in Europa für Aufregung gesorgt. Alles, was wir im Internet tun, wird belauscht und aufgezeichnet – von Staaten und von Privatunternehmen. Der Internet-Bürgerrechtler Jérémie Zimmermann von der Vereinigung “La Quadrature du Net” in Paris meint: “Es wird noch lange dauern, bis wir wissen, welches Ausmaß und welche Folgen für unsere Gesellschaft, unsere Beziehung zur Macht und zur Technologie diese Enthüllungen tatsächlich haben.”

Der Skandal um das Spionageprogramm PRISM ist vor gut sieben Monaten bekannt geworden. Unter dem Vorwand des Kampfes gegen den Terrorismus hat der US-Geheimdienst NSA die persönlichen Daten von weltweit Millionen Menschen gespeichert und ausgewertet, eine bislang nie dagewesene Sammelwut. Abgesehen von den diplomatischen Verstimmungen hat die Affäre auch für eine Diskussion über eine der wichtigsten Fragen unserer Zeit gesorgt. Ist der riesige Datenfluss dabei zu einem “Big Brother” zu werden? Zimmermann meint, die Vormachtstellung amerikanischer Konzerne sei ein besonderes Problem: “Ihr Technologie- und Wirtschaftsmodell basiert darauf, möglichst viele Daten über jedermann zu sammeln. Diese Über-Zentralisierung ist einer der Pfeiler der Massenüberwachung.”

Doch es gibt Alternativen, wie die Internet-Aktivisten wissen. Etwa die Suchmaschine “DuckDuckGo”. Sie speichert keinerlei persönliche Daten. Ein der Schlüsselproblem für die Aktivisten ist die Bewusstseinsbildung. Sie beklagen, dass es eine irreführende Vorstellung sei, die Welt werde zwischen denjenigen geteilt, die die Daten beherrschen und denjenigen, die das nicht tun. Zimmermann: “Einerseits ist da das Produkt, das man auf seinem Computer hat, das anscheinend von ganz allein funktioniert, das ganz einfach und Nutzer-freundlich ist. Andererseits sind da aber auch weisse Buchstaben auf einem schwarzen Feld, Dinge, die wir nicht verstehen. In Wirklichkeit ist es einerseits die Technologie, die uns kontrolliert. Andererseits haben wir aber das Potenzial, diese Technologie ebenfalls zu kontrollieren. Dafür müssen wir aber bereit sein zu lernen. Ich bin davon überzeugt, dass es im 21. Jahrhundert dasselbe ist, wenn man nicht weiß, wo seine Daten sind, die Architektur seines Kommunikationssystems nicht kennt, als sei man Analphabet und müsse den ganzen Tag Verträge unterzeichnen, ohne sie lesen zu können.”

In Europa ist der Schutz des Privatlebens ein Grundrecht. In allen Ländern wacht eine Behörde darüber, dass es eingehalten wird. In Frankreich ist das die CNIL, die Nationale Datenschutzbehörde mit Sitz in Paris. Ihre Präsidentin, Isabelle Falque-Pierrotin, weist es zurück, dass der NSA-Skandal auf ein Versagen der nationalen Datenschutzbehörden zurückzuführen ist. Sie fordert eine klare politische und juristische Antwort auf europäischer Ebene. “Wenn es ein Versagen gäbe, dann wäre das ein Europa, das nicht dazu in der Lage ist, auf eine Affäre wie PRISM mit einer einheitlichen Marschrichtung zu reagieren. Ich denke, das kann uns sogar einen zusätzlichen Anreiz dafür geben, zu einer einheitlichen europäischen Rechtssprechung zu finden, eine Industriepolitik im Hinblick auf diese Fragen in Europa zu entwickeln, um einen Kooperationsrahmen zwischen Geheimdiensten hier und in den USA zu haben, der heute nicht existiert”, so Falque-Pierrotin.

In Brüssel tobt die Schlacht um eine Reform der europäischen Gesetzgebung zum Datenschutz seit drei Jahren. Eine komplexe Schlacht, bei der das Lobbying der amerikanischen Internet-Giganten besonders stürmisch ist. Ein Recht auf Vergessen, das fordern alle Nutzer, der Umgang mit Daten generell, die Themen sind vielfältig. Das Ziel ist ein klarer rechtlicher Rahmen, der in allen Ländern der Europäischen Union gilt. Im vergangenen Oktober hat eine Kommission des EU-Parlaments einem solchen Text zugestimmt, die Debatte wird nun mit der EU-Kommission und in den Mitgliedsstaaten fortgesetzt.

Während die einen, etwa die Repräsentanten der amerikanischen Internet-Industrie, auf eine nicht zu strenge Gesetzgebung drängen, fordern andere, etwa die europweite Bürgerrechtsorganisation EDRI, dass das Privatleben geschützt wird und die neuen Gesetze keine leere Hülle bleiben. Joe McNamee ist der Direktor von EDRI. Er sagt: “Es gab eine Diskussion vor den Enthüllungen Snowdens über die Regeln zum Transfer von Daten außerhalb der EU. Es gab einen breiten Konsens darüber, dass die Regeln nicht verschärft werden sollen. Nach den Enthüllungen Snowdens hat sich die ganze Situation geändert. Jetzt scheint es einen Konsens in den Mitgliedsstaaten und im EU-Parlament dahingehend zu geben, dass die Regeln klar, verständlich und voraussehbar sein müssen.”

Bei einer zukünftigen Regelung geht es in erster Linie um die Praktiken von privaten Unternehmen. Wenn es aber um die Überwachungsrechte von Regierungen geht, bleibt noch viel zu tun. Sergio Carrera, Wissenschaftler und Forscher am Centre for European Policy Studies, meint: “Die vielleicht wichtigste Lektion ist, wie frei die Geheimdienste nicht nur in den USA, sondern auch in Europa sind, das zu tun, was immer sie wollen. Ich denke, es ist sehr wichtig, die Kontrolle über Geheimdienstaktivitäten zu stärken, die die Bürger überwachen. Das ist im Moment sehr offen und Gegenstand verschiedener rechtlicher Szenarien.” In unseren vernetzten Leben bleibt es wohl wichtig, dass wir wachsam bleiben, damit nicht wirtschaftliche Interessen und zu viel Überwachung die Vorherrschaft über unser Recht auf Privatsphäre übernehmen.

Kaynak: Euronews
------------------------
Almanca video: http://de.euronews.com/2014/01/06/wird-das-internet-zum-big-brother-unserer-zeit

[Edited at 2014-01-12 15:57 GMT]
Collapse


 
Adnan Özdemir
Adnan Özdemir  Identity Verified
Türkiye
Local time: 10:19
Member (2007)
German to Turkish
+ ...
TOPIC STARTER
"Privacy and data protection" --İngilizce video/Euronews-- Jan 12, 2014

--Alıntıdır--

06/01 14:02 CET

Right On reporter Anne Devineaux traveled to Paris and Brussels to assess the impact the digital age is having on individual privacy, she poses a simple but potent question:

“Is it still possible to protect our privacy in the digital age? Edward Snowden’s revelations about the extent of US cyber surveillance has sent shockwaves across Europe. All our internet activity is monitored and stored by states and private compani
... See more
--Alıntıdır--

06/01 14:02 CET

Right On reporter Anne Devineaux traveled to Paris and Brussels to assess the impact the digital age is having on individual privacy, she poses a simple but potent question:

“Is it still possible to protect our privacy in the digital age? Edward Snowden’s revelations about the extent of US cyber surveillance has sent shockwaves across Europe. All our internet activity is monitored and stored by states and private companies.”

Jérémie Zimmermann is a founding member La Quadrature du Net, a group set up to protect individual privacy:

“It will take a lot longer for the magnitude of these revelations to impact on our society and on our relationship with power and our relationship with technology.”

For months the scandal surrounding the Prism program has raged. Under the guise of anti-terrorism the National Security Agency (NSA) collected, via the US net giants, the personal data of millions of citizens worldwide, a massive, menacing and indiscriminate collection.

Beyond the diplomatic fallout the revelations have opened up a debate on the major issue of our time. The mass production of data via the net, known as Big Data, for Big Data read Big Brother.

Jérémie Zimmermann, is concerned by the power the main US net players hold:

“Their technological and economic models are based on the maximum data collection globally. This centralisation of data forms the pillar of mass surveillance.”

However, alternatives do exist say activists. One example is the search engine DuckDuckGo, which does not store personal information. A vital component is a change in attitudes. Activists reject the misleading trend of the split between the computer masters and the ordinary world.

Jérémie Zimmermann, from La Quadrature du Net: “On the one hand hand there is the product that comes in a box, it is easy, simple, user friendly and the other stuff in white letters on black screen, stuff you are not expected to understand. There is the technology you control and the technology you have the potential to control. This has to be studied, learned. I’m convinced that in the 21st Century not knowing where one’s data is or ignorance of the architecture of the communication system will be akin to illiteracy. We will be signing contracts we cannot read and don’t understand.”

In Europe the protection of privacy is considered a fundamental right. In each country a public authority is responsible for protecting it. In France it is CNIL, the Commission Nationale Informatique et Liberté.

Its president refuses to accept the scandal is a failure of the national supervisory authorities. She is calling for a clear political and legal response at a European level.

Isabelle Falque-Pierrotin is the President of French Data Protection Authority (CNIL): “If there was a failure, it was that Europe didn’t react quickly to the Prism case. So I think it will kick start negotiations to formulate a new legal framework to develop a business policy on these issues across Europe. And for a framework for cooperation between intelligence services between Europe and the United States, which does not exist as we speak.”

Anne Devineaux says the formulation of EU legislation to protect individual privacy in the digital age is easier said than done: “Here in Brussels the battle has raged for three years around the reform of EU legislation on data protection. It is a long and complex battle with lobbying from the US net giants particularly intense.”

The right to be forgotten, the explicit consent of users, data processing, the subjects are many and varied. The aim is to create a clear legislative framework across the EU. At the end of October a draft was finally approved by a committee of the European parliament, suffice to say talks are ongoing between the Commission and member states.

As representatives of the US net industry fight to avoid restrictive regulations, others such as EDRI, a Brussels-based organisation, battle to defend privacy.

Joe McNamee, belongs to the European Digital Rights (EDRi) advocacy group: “There was a lot of discussion before the Snowden revelations as regards the rules for transfer of data to law enforcement authorities outside the EU. There was a broad consensus at the time that the rules shouldn’t be strengthened. After the Snowden revelations, suddenly the whole situation changed and now there is seems to be a consensus across the Member states and across the European Parliament that the rules need to be clear, comprehensive and predictable.”

Essential to future regulation is a change in business practices. As far as government snooping is concerned much remains to be done.

Sergio Carrera, is a Senior Research Fellow at the Centre for European Policy Studies: “Perhaps the more important lesson is how free the intelligence services in the US and the EU are to do whatever they like. I think it’s very important to look at way how to bolster scrutiny of intelligence services and surveillance of citizens which at the moment is very much open and subject to very diverse legal settings”.

These days connectivity is vital for the economy and security, but individuals right to privacy is a very high price to pay.

Kaynak: Euronews
-----------------------
İngilizce video: http://www.euronews.com/2014/01/06/big-data-big-brother-and-the-death-of-privacy-in-the-digital-age/

[Edited at 2014-01-12 15:58 GMT]
Collapse


 
Adnan Özdemir
Adnan Özdemir  Identity Verified
Türkiye
Local time: 10:19
Member (2007)
German to Turkish
+ ...
TOPIC STARTER
"İnternette özel hayat ve kişisel verilerin korunması" --Türkçe video/Euronews-- Jan 12, 2014

--Alıntıdır--

06/01 14:02 CET

Özel hayatımızı korumak sayısal çağda da hala mümkün mü? Edward Snowden’ın Amerikan casusluğunun boyutları hakkında söyledikleri Avrupalıların akıllarında soru işaretleri doğurdu. İnternette yaptığımız her şey, hem devlet hem de özel şirketler tarafından gözleniyor ve kaydediliyor:

Jeremie Zimmermann, Quadrature du net Derneği kurucusu:
“Bu bilgilerin toplumlarımız, iktidarlar ve t
... See more
--Alıntıdır--

06/01 14:02 CET

Özel hayatımızı korumak sayısal çağda da hala mümkün mü? Edward Snowden’ın Amerikan casusluğunun boyutları hakkında söyledikleri Avrupalıların akıllarında soru işaretleri doğurdu. İnternette yaptığımız her şey, hem devlet hem de özel şirketler tarafından gözleniyor ve kaydediliyor:

Jeremie Zimmermann, Quadrature du net Derneği kurucusu:
“Bu bilgilerin toplumlarımız, iktidarlar ve teknoloji ile olan ilişkilerimiz üzerindeki etkilerini ve büyüklüğünü ölçmek için oldukça fazla zaman gerekecek.”

Yedi ay önce Prism programı hakkında bir skandal patlak verdi. Terörizme karşı mücadele çerçevesinde Amerikan Ulusal Güvenlik Teşkilatı’nın (NSA) internet devleri aracılığıyla dünyadaki milyonlarca kişinin kişisel bilgilerini topladığını öğrendik. Bu devasa işlem kişi ayrımı da yapmıyordu.

Diplomatik gerginliklerin de ötesinde, olay çağımızın en önemli konularından birini tartışmaya açtı. İnternet üzerinden yapılan diğer adı ‘Big Data’ olan dev çaplı veri toplama işlemi yoksa yeni bir Big Brother (her şeyi gözetleyen bir ağabey) vakası mı yaratacaktı?

Paris’te sayısal çağdaki özgürlükler ve haklar üzerine uzmanlaşmış ‘Net’in Karelenmesi’ (Quadrature du net) adlı bir dernek bulunuyor. Kurucularından bir tanesi dev Amerikan gruplarının tekelleri yüzünden ortaya çıkan bir sorunun altını çiziyor:

Jérémie Zimmermann:
“Onların ekonomik ve teknolojik modelleri herkesten en çok veriyi toplamak üzerine kurulu. Verilerdeki bu dev merkezleşme toplumların gözlenmesinin temelini ve kökünü oluşturuyor.”

Varolan diğer seçenekler ise siber militanları parmakla gösteriyor. Bu örneklerden bir tanesi olan arama motoru DuckDuckGo, hiçbir kişisel bilgiyi depolamıyor.

Fakat Zimmermann’a göre burada asıl yapılması gereken, düşünüş şekillerinin değişmesi. Bir de dünyanın bilgiyi kullanmayı bilenler ve bilmeyenler arasında bölünmüş gibi gösterilmesinden vazgeçilmesi:

“Bir tarafta kutusundan çıkardığımız anda tek başına çalışan ve kullanımı çok kolay bir ürün var. Diğer tarafta ise normalde hiçbir şey anlamadığımız siyah ekran üzerinde beyaz karakterler. Aslında bir yanda sizi kontrol eden, diğer yanda ise sizin kontrol edebileceğiniz bir teknoloji bulunuyor. Ama bunu yapabilmeniz için kaydedilmiş olmanız gerekli. Bence XXI. yüzyılda verilerinizin nerede olduğunu söyleyememek, iletişim sisteminin mimari yapısını tanımamak, okuma yazma bilmemek ya da sözleşmeleri okumadan imzalamaktan farklı bir şey değil.”

Avrupa’da özel hayatın korunması temel haklardan biri olarak kabul ediliyor. Her ülkede bir kamu kurumu bu hakkı korumakla yükümlü. Fransa’da bu kurum Ulusal Enformasyon ve Özgürlük Komisyonu (CNIL) adını taşıyor. Başkanı ise yaşanan skandalda ulusal kontrol kurumlarının bir başarısızlığı olduğunu düşünmüyor. Fakat Avrupa seviyesinde açık ve net bir hukuki ve siyasi yanıtın verilmesini bekliyor:

Isabelle Falque-Pierrotin:
“Bir başarısızlık olsaydı, Prism gibi bir olayın ardından ve bu olay yüzünden Avrupa’nın kendi işleyişine çeki düzen veremeyecek bir durumda olduğu anlaşılırdı. Bense tersini düşünüyorum. Bu durum bize Avrupa seviyesinde yeni bir hukuki çerçeve sağlamak, Avrupa ile Amerikan istihbaratı arasında olmadığı anlaşılan, işbirliği sağlayacak yeni bir sanayi politikası kurmak için fırsat olarak kullanılmalı.”

Anne Devineaux, euronews:
“Veri güvenliği hakkındaki yasa reformu Burada Brüksel’de 3 yıldır büyük bir meydan savaşına sahne oluyor. Bu uzun ve karmaşık savaşın içinde özellikle Amerikalı dev internet lobileri çok kuvvetli.”

Hedef, unutma hakkı, kullanıcıların açık kabulü ve verilerin işlenmesi gibi birçok konuda Birlik ülkelerinin yasal bir çerçeve oluşturması. Ekim ayı sonunda Avrupa Parlamentosu’nun bir komisyonu ortak bir metni sonunda oylayabildi. Fakat üye ülkeler ile komisyon arasındaki tartışmalar sürüyor.

Amerikan internet sanayisinin temsilcileri gibi bazıları çok kısıtlayıcı bir metnin olmaması diğerleri ise içi boşaltılmış bir yasaya ulaşılmaması için çabalıyor. Avrupa Dijital Haklar Derneği (EDRI), kişisel hayat haklarını savunuyor:

Joe McNamee:
“Avrupa Birliği dışındaki kontrol organlarına veri transferinin şartlarını belirleyen bir düzenleme üzerinde Snowden’dan önce de birçok görüşme yapıldı. O dönem kuralların sıkılaştırılmaması konusunda ortak bir görüş sağlanmıştı. Snowden’ın açıklamalarından sonra bir anda durum değişti. Bugün üye ülkeler ve Avrupa Parlamentosu arasındaki ortak kanı kuralların açık, anlaşılabilir ve öngörülebilir olması yönünde.”

Fakat alınacak yeni yasa özellikle şirketlerin çalışma şekillerini düzenlemeyi hedefliyor. Bu araştırmacıya göre ise hükümetlerin uyguladıkları kontrol konusunda daha yapılacak çok iş var:

Sergio Carrera, Avrupa Politikaları Araştırma Merkezi:
“Buradaki en önemli ders belki de sadece Amerika Birleşik Devletler’ndeki değil Avrupa’daki istihbarat servislerine tanınan hareket özgürlüğü. Vatandaş kontrolü ve haber alma servislerinin çalışmaları üzerinde daha büyük bir kontrol öngörülmesi çok önemli. Çünkü şu anda bu kontrol küçük çaplı ve farklı yasal temellere bağlı.”

İnternetli hayatlarımızda, ekonomik tehlikeler ve güvenlik sorununa karşı alınan önlemler çok kuvvetli olmak zorunda. Zira bu yapılmazsa özel hayatımızı kaybetmemiz söz konusu.

------------------------
Kaynak: Euronews
Türkçe video: http://tr.euronews.com/2014/01/06/internette-ozel-hayat-ve-kisisel-verilerin-korunmasi/

Çok sağolasın Edward Snowden. Sizin gibi insanların olması çok güzel. Thank you.

[Edited at 2014-01-12 20:58 GMT]
Collapse


 
Adnan Özdemir
Adnan Özdemir  Identity Verified
Türkiye
Local time: 10:19
Member (2007)
German to Turkish
+ ...
TOPIC STARTER
"PRISM (surveillance program)" Jan 12, 2014

--Alıntıdır--


PRISM is a clandestine mass electronic surveillance data mining program known to have been operated by the United States National Security Agency (NSA) since 2007.[3][4][5] PRISM is a government code name for a data-collection effort known officially by the SIGAD US-984XN.[6][7] The Prism program collects stored Internet communications based on demands made to Internet companies such as Google Inc. and Apple Inc. under Section 702 of the FISA Amendments Act o
... See more
--Alıntıdır--


PRISM is a clandestine mass electronic surveillance data mining program known to have been operated by the United States National Security Agency (NSA) since 2007.[3][4][5] PRISM is a government code name for a data-collection effort known officially by the SIGAD US-984XN.[6][7] The Prism program collects stored Internet communications based on demands made to Internet companies such as Google Inc. and Apple Inc. under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms.[8] The NSA can use these Prism requests to target communications that were encrypted when they traveled across the Internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier,[9][10] and to get data that is easier to handle, among other things.[11]

PRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush Administration.[12][13] The program is operated under the supervision of the U.S. Foreign Intelligence Surveillance Court (FISA Court, or FISC) pursuant to the Foreign Intelligence Surveillance Act (FISA).[14] Its existence was leaked six years later by NSA contractor Edward Snowden, who warned that the extent of mass data collection was far greater than the public knew and included what he characterized as "dangerous" and "criminal" activities.[15] The disclosures were published by The Guardian and The Washington Post on June 6, 2013. Subsequent documents have demonstrated a financial arrangement between NSA's Special Source Operations division (SSO) and PRISM partners in the millions of dollars.[16]

Documents indicate that PRISM is "the number one source of raw intelligence used for NSA analytic reports", and it accounts for 91% of the NSA's Internet traffic acquired under FISA section 702 authority."[17][18] The leaked information came to light one day after the revelation that the FISA Court had been ordering a subsidiary of telecommunications company Verizon Communications to turn over to the NSA logs tracking all of its customers' telephone calls on an ongoing daily basis.[19][20]

U.S. government officials have disputed some aspects of the Guardian and Washington Post stories and have defended the program by asserting it cannot be used on domestic targets without a warrant, that it has helped to prevent acts of terrorism, and that it receives independent oversight from the federal government's executive, judicial and legislative branches.[21][22] On June 19, 2013, U.S. President Barack Obama, during a visit to Germany, stated that the NSA's data gathering practices constitute "a circumscribed, narrow system directed at us being able to protect our people."[23]

.
.
.

PRISM was publicly revealed when classified documents about the program were leaked to journalists of the The Washington Post and The Guardian by Edward Snowden – at the time an NSA contractor – during a visit to Hong Kong.[3][4] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[3][4] The documents identified several technology companies as participants in the PRISM program, including Microsoft in 2007, Yahoo! in 2008, Google in 2009, Facebook in 2009, Paltalk in 2009, YouTube in 2010, AOL in 2011, Skype in 2011 and Apple in 2012.[36] The speaker's notes in the briefing document reviewed by The Washington Post indicated that "98 percent of PRISM production is based on Yahoo, Google and Microsoft".[3] The slide presentation stated that much of the world's electronic communications pass through the U.S., because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world's Internet infrastructure is based in the United States.[17] The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.[4][17]

Snowden's subsequent disclosures included statements that governments such as the United Kingdom's GCHQ also undertook mass interception and tracking of Internet and communications data[37] – described by Germany as "nightmarish" if true[38] – allegations that the NSA engaged in "dangerous" and "criminal" activity by "hacking" civilian infrastructure networks in other countries such as "universities, hospitals, and private businesses",[15] and alleged that compliance offered only very limited restrictive effect on mass data collection practices (including of Americans) since restrictions "are policy-based, not technically based, and can change at any time", adding that "Additionally, audits are cursory, incomplete, and easily fooled by fake justifications",[15] with numerous self-granted exceptions, and that NSA policies encourage staff to assume the benefit of the doubt in cases of uncertainty.[39][40][41]

.
.
.
--------------
Kaynak + yazının tümü: http://en.wikipedia.org/wiki/PRISM_(surveillance_program)

[Edited at 2014-01-13 00:14 GMT]
Collapse


 
Adnan Özdemir
Adnan Özdemir  Identity Verified
Türkiye
Local time: 10:19
Member (2007)
German to Turkish
+ ...
TOPIC STARTER
"PRISM" Jan 12, 2014

--Alıntıdır--


PRISM (US: [ˈprɪzəm]; GB: [ˈprɪz(ə)m]; deutsch Prisma) ist ein seit 2005[4] existierendes und als Top Secret eingestuftes Programm zur Überwachung und Auswertung elektronischer Medien und elektronisch gespeicherter Daten.[5] Es wird von der US-amerikanischen National Security Agency (NSA) geführt und gehört wie die anderen Teilprogramme „Mainway“, „Marina“ und „Nucleon“ zu dem groß angelegten Überwachungsprogramm „Stellar Wind“.[6]
... See more
--Alıntıdır--


PRISM (US: [ˈprɪzəm]; GB: [ˈprɪz(ə)m]; deutsch Prisma) ist ein seit 2005[4] existierendes und als Top Secret eingestuftes Programm zur Überwachung und Auswertung elektronischer Medien und elektronisch gespeicherter Daten.[5] Es wird von der US-amerikanischen National Security Agency (NSA) geführt und gehört wie die anderen Teilprogramme „Mainway“, „Marina“ und „Nucleon“ zu dem groß angelegten Überwachungsprogramm „Stellar Wind“.[6]

Laut einer zuerst von der US-amerikanischen Washington Post[7] und dem britischen Guardian[8] im Juni 2013 veröffentlichten Präsentation sind an dem Programm neun der größten Internetkonzerne und Dienste der USA beteiligt: Microsoft (u. a. mit Skype), Google (u. a. mit YouTube), Facebook, Yahoo, Apple, AOL und Paltalk.[7]
PRISM soll eine umfassende Überwachung von Personen innerhalb und außerhalb der USA ermöglichen, die digital kommunizieren. Dabei sei es der NSA und dem FBI[7] laut der Washington Post möglich, auf live geführte Kommunikation und gespeicherte Informationen bei den beteiligten Internetkonzernen zuzugreifen, wobei aus den Folien selbst lediglich hervorgeht, dass es Echtzeitbenachrichtigungen zu gewissen Ereignissen gibt, z. B. wenn sich ein Benutzer anmeldet oder eine E-Mail verschickt.[1] Auf welche Daten zugegriffen werden kann, soll laut einem Bericht der Süddeutschen Zeitung vom jeweiligen Anbieter abhängen.[9]

Ein zu PRISM funktional ähnlicher Vorläufer war die PROMIS‎-Software der 1980er-Jahre.
Aufgedeckt wurde dieses Programm durch den Techniker Edward Snowden, einen ehemaligen CIA- und NSA-Mitarbeiter,[10][11] der die Daten als „Whistleblower“ dem britischen Guardian und der Washington Post zuspielte.[12] Einige US-Politiker und IT-Sicherheitsexperten sowie zahlreiche Bürgerrechtsgruppen und -aktivisten haben die ohne konkreten Verdacht vorgenommenen Überwachungsmaßnahmen im Rahmen des Programms als „illegal“ bzw. als „Bruch der US-Verfassung“ bezeichnet.
Die Veröffentlichungen zu PRISM sind Teil verschiedener Offenlegungen geheimer US-amerikanischer Dokumente, durch die Edward Snowden die Überwachungs- und Spionageaffäre 2013 auslöste.

.
.
.
Edward Snowden hatte sich in einem Video dazu bekannt, die Daten an verschiedene Zeitungen gesandt zu haben.[105] Er war in der Vergangenheit sowohl Mitarbeiter der CIA als auch der NSA. Später war er bei der Firma Booz Allen Hamilton angestellt und arbeitete auf Hawaii als externer Mitarbeiter in einem NSA-Büro. Im Rahmen dieser Tätigkeit hatte er Zugriff auf die geheimen Dokumente, kopierte sie und gab sie schließlich an die Presse weiter.[11] Zuerst hielt er sich in Hongkong auf und bat um politisches Asyl.[11][10][106] Später reiste er nach Russland. Sein genauer Aufenthaltsort ist unbekannt. Die Ausreise Snowdens aus Hongkong nach Russland hat zu diplomatischen Verwicklungen geführt. Die USA äußerten sich über die passive Haltung Chinas und Russlands empört.[107][108]

In einem Interview mit dem Guardian beschrieb er, dass die Datensammlung der NSA sogar eine deutlich größere Dimension habe, als die bisher von ihm enthüllten Dokumente andeuten: „Die NSA hat eine Infrastruktur aufgebaut, die ihr erlaubt, fast alles abzufangen. Wenn ich in Ihre E-Mails oder in das Telefon Ihrer Frau hineinsehen wollte, müsste ich nur die abgefangenen Daten aufrufen. Ich kann Ihre E-Mails, Passwörter, Gesprächsdaten und Kreditkarteninformationen bekommen.“ (Edward Snowden: Heise Online)[109][105][106]

In einem knapp 2-stündigen Live-Chat stand Snowden den Twitter-Followern vom Guardian am 17. Juni für Fragen zur Verfügung und präzisierte darin unter anderem einige seiner bisherigen Aussagen. Dabei legte er großen Wert darauf, dass seine Veröffentlichung nicht darauf abzielte, irgendwem zu schaden, sondern die Menschen darüber zu informieren, wie weitreichend die Ausspähungen seien.[110]

.
.
.
--------------
Kaynak + yazının tümü: http://de.wikipedia.org/wiki/PRISM

[Edited at 2014-01-13 00:11 GMT]
Collapse


 
Adnan Özdemir
Adnan Özdemir  Identity Verified
Türkiye
Local time: 10:19
Member (2007)
German to Turkish
+ ...
TOPIC STARTER
"Obama presents NSA reforms with plan to end government storage of call data" Jan 17, 2014

--Alıntıdır--

Kaynak: http://www.theguardian.com/world/2014/jan/17/obama-nsa-reforms-end-storage-americans-call-data

US president Barack Obama forcefully defended the embattled National Security Agency on Friday in a speech that outlined a series of surveillance reforms but stopped well short of demanding an
... See more
--Alıntıdır--

Kaynak: http://www.theguardian.com/world/2014/jan/17/obama-nsa-reforms-end-storage-americans-call-data

US president Barack Obama forcefully defended the embattled National Security Agency on Friday in a speech that outlined a series of surveillance reforms but stopped well short of demanding an end to the bulk collection of American phone data.

In his widely anticipated address at the Justice Department on the future course of US surveillance policy, Obama said the government should no longer hold databases of every call record made in the United States, citing the “potential for abuse”.

But Obama did not say what should replace the databases and made it clear the intelligence agencies should still be able to access call records information in some unspecified way, signalling a new round in the battle between privacy advocates and the NSA’s allies.

Mounting a forceful defence of the NSA, Obama said: “They’re not abusing authorities in order to listen to your private phone calls, or read your emails.” He did not mention that judges on the secret surveillance court have found NSA has repeatedly and “systematically” overstepped its bounds. Instead, he counselled strongly against any steps that would undermine US national security. “We cannot unilaterally disarm our intelligence agencies,” he said.

Obama’s remarks were bound to give the beleaguered NSA a boost of confidence, while disappointing civil libertarians who wanted to hear the president defend the privacy of American citizens more emphatically.

In the key points of his speech, Obama said:

• The government will no longer store the phone call information of millions of Americans. But he did not say who should maintain the information, instead giving the intelligence community 60 days to come up with options.

• Intelligence agencies must, with immediate effect, apply to the secret Fisa court for judicial approval to access Americans' phone records.

• The secret Fisa court should be reformed to include a panel of independent advocates to provide a voice in "significant cases".

• The NSA will not spy on the heads of state and governments of allies, and said some further protections would be given to foreign citizens whose communications were caught up in the agency's dragnet.

• The US government had to be held to a "higher standard" than private corporations that store user data or foreign governments that undertake their own surveillance.

Obama said a balance had to be struck between competing demands. “We have to make some important decisions about how to protect ourselves and sustain our leadership in the world, while upholding the civil liberties and privacy protections that our ideals and our constitution require,” he said.

More reviews

The president called for further reviews of the thorny questions surrounding the scope of NSA’s power. “The challenge is getting the details right, and that is not simple.”

Obama has directed attorney general Eric Holder, NSA director Keith Alexander and the rest of the intelligence community to present proposals over the next several weeks for what private entity should hold Americans’ telephone metadata, casting it as an issue that requires further deliberation before any decision that could have major implications for both privacy and security.

He made it clear that when he previously reviewed US intelligence gathering operations, he concluded that the NSA needed the capabilities offered by the controversial programs and did not intentionally abuse them.

“What I did not do is stop these programs wholesale, not only because I felt that they made us more secure, but also because nothing in that initial review, and nothing that I have learned since, indicated that our intelligence community has sought to violate the law or is cavalier about the civil liberties of their fellow citizens,” Obama said.

Obama said that ahead of transitioning the database out of government hands, the NSA will now have to receive approval from the secret surveillance court before searching through the data trove for connections to terrorist groups. Those searches would be restricted to two “hops”, meaning that a number “reasonably” suspected can have all the numbers it called and from which it received calls reviewed, and all of those numbers can also have their connections examined.

“I believe it is important that the capability that this program is designed to meet is preserved,” Obama said.

Cautious welcome

That call fell short of expectations from privacy advocates in and outside of Congress, who want the government collection of Americans’ metadata without specific connections to terrorism, approved by a judge, to stop. "We must all remember that the very act of bulk collection of private data undermines Americans’ constitutional rights," said Senator Ron Wyden, a prominent critic, on Twitter after the speech.

But Wyden and another Democrat on the Senate intelligence committee, Mark Udall, gave the speech as a whole a cautious welcome. “Make no mistake, this is a major milestone in our longstanding efforts to reform the National Security Agency’s bulk collection program,” they said a joint statement.

“The president has listened to some of the advice of his independent panel of experts and endorsed some of the reforms we have long advocated. The fight to protect liberty and increase security is far from over.”

Patrick Leahy, a Democrat on the Senate justice committee, welcomed the reforms to the bulk collection, but said Congress had to act to put them into place. "The president has ordered some significant changes, but more are needed," he said in a statement.

Republican critics in Congress were more blunt in their assessment of the speech's shortcomings. “It's not about who holds it, I don't want them collecting Americans' information,” senator Rand Paul of Kentucky told CNN.

“Paul Revere was warning us that the British were coming. He wasn't warning us that the Americans were coming,” he added, taking issue with Obama's reference to colonial revolutionaries in defence of NSA surveillance.

In his speech, Obama was more definitive about assuring allied foreign leaders that he would not spy on their communications, an issue that became a diplomatic row straining relations with Germany, Brazil and other countries.

“The leaders of our close friends and allies deserve to know that if I want to learn what they think about an issue, I will pick up the phone and call them, rather than turning to surveillance,” Obama said.

But Obama did not announce any new protections for non-Americans abroad, instead punting the issue to his top officials for further consideration. Nor did he address the NSA’s secret weakening of encryption standards, first reported by the Guardian, which have greatly concerned US businesses.

The Guardian reported on Thursday, based on documents leaked by NSA whistleblower Edward Snowden, that the NSA collects an average of 200m texts messages abroad every day. The collection of “untargeted and unwarranted” communications, through a program codenamed Dishfire, is one of several NSA activities that have drawn global concern since their disclosure.

Similarly, Obama defended a program, now conducted under Section 702 of the Fisa Amendments Act, that allows the NSA to hold the internet communications of foreigners abroad. He directed Holder and James Clapper, the director of national intelligence, to review the program to add protections for Americans whose information has been caught up in the dragnet.

But he stopped he short of ordering NSA not to query that database for Americans’ identifying information, an authority first revealed by the Guardian and which senator Ron Wyden dubbed the “backdoor search loophole”. Any restriction on that authority would apparently follow the review.


Obama said he wanted additional safeguards for the secret surveillance court, known as the Fisa court, which currently only the government can petition. Obama urged Congress to set up “an independent voice” before the court, along with new technological consultants, who can argue for the privacy interests of US citizens and help the court better navigate the vast, complex and changing technological capabilities of the NSA. Declassified rulings show this has vexed judges on the court for years.

The president also rejected a recommendation from his handpicked surveillance panel to place judicial oversight over the FBI’s practice of issuing a nonjudicial subpoena known as a National Security Letter for the records of US businesses. But Obama proposed allowing businesses greater, but as yet unspecified, ability to discuss those letters, which are currently under a gag order.

Much of the substance of Obama’s proposals remain undefined. The telephone companies have resisted having to store customer data for additional periods of time on behalf of the NSA, and any new third-party private storehouse of metadata would have to be created from scratch.

The lack of clarity places increasing pressure on Congress to ultimately resolve many of the complexities of surveillance – creating effectively a new round of jockeying on Capitol Hill between privacy advocates and the NSA’s allies, who fear losing what Obama described as a valuable tool for determining domestic connections to terrorism.

"Now it's up to the courts, Congress, and the public to ensure that real reform happens, including stopping all bulk surveillance – not just telephone records collection,” said Cindy Cohn, legal director of the Electronic Freedom Foundation.

Obama gave less attention to the man whose disclosures prompted his speech: Edward Snowden. “I’m not going to dwell on Mr Snowden’s actions or motivations,” Obama said. “I will say that our nation’s defence depends in part on the fidelity of those entrusted with our nation’s secrets.”



...........................
Ado'nun yorumu: Sanki 5 yaşında bir çocuğum da birisi beni uyutmak için masal anlatıyormuş gibi; gibi...

[Edited at 2014-01-17 21:08 GMT]
Collapse


 
Pages in topic:   < [1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37] >


To report site rules violations or get help, contact a site moderator:


You can also contact site staff by submitting a support request »

UYARI: Dikkat Scam


Translation news in Türkiye





Wordfast Pro
Translation Memory Software for Any Platform

Exclusive discount for ProZ.com users! Save over 13% when purchasing Wordfast Pro through ProZ.com. Wordfast is the world's #1 provider of platform-independent Translation Memory software. Consistently ranked the most user-friendly and highest value

Buy now! »
Protemos translation business management system
Create your account in minutes, and start working! 3-month trial for agencies, and free for freelancers!

The system lets you keep client/vendor database, with contacts and rates, manage projects and assign jobs to vendors, issue invoices, track payments, store and manage project files, generate business reports on turnover profit per client/manager etc.

More info »