Dusseldorf Edward Snowden wants to develop in future technology for the protection of privacy on the Internet. He called on participants at a hacker conference in New York, technologically anchor the rights of citizens in programs and protocols. “This is also a lot of my future work to do, and I hope ye connects me to put into practice,” he said in a video switching from Russia. The video of the event Hope X has released the technology blog Recode.
Snowden justified once more his revelations. The Americans had hitherto hardly had any idea of how far the government auswerfe their network in order to get information. The monitoring programs would aim to monitor all the people on a global basis. . There were dealing with an unjustified collection of information that is contrary to the American Constitution
An “important first step” towards monitoring whether encryption – but that alone is not sufficient because they the content to keep it safe, but not the compounds of the communication partner. Therefore, a need for new protocols and infrastructure, in order to protect the privacy.
How the NSA monitored the Internet
-
Always new revelations
Since Summer 2013 always come new details about espionage activities of intelligence agencies on the Internet to light. They are based on documents that handed the former intelligence employee Edward Snowden to journalists. An overview of the key findings
-
Prism
Prism:. Name was initially for the whole affair, but includes only a part of the repertoire of the NSA. About Prism monitoring service has access to user data of major U.S. Internet companies, including Google , Yahoo, Microsoft and Facebook . A secret court orders the release of the information. These were about the contents of mails, search queries or chats, reported the British newspaper “Guardian”. The companies are sworn to secrecy. The Internet giant fight in court to be allowed to publish more details.
-
tenses
tenses hießt a program of the British service GCHQ. The GCHQ works closely with the NSA. Together with Australia, New Zealand and Canada, the countries of the alliance of the “Five Eyes” (“Five Eyes”), to be replaced in the information. Under the code name tenses of GCHQ to tap into more than 200 fiber optic cable, lawn of the data around the world. So did the GCHQ access to the Internet traffic that runs over the tapped cable.
-
Xkeyscore
The massive amounts of data, which collects the NSA must somehow be evaluated. For this purpose the software serves XKeyscore. This allows NSA analysts like Snowden search the mountains of data for suspects. The German Federal Intelligence Service also put a version of XKeyscore, reported “Der Spiegel”. -
Encryption Lever
If data is encrypted sent through the network, intelligence agencies can not just read along so. But NSA and GCHQ can reportedly crack or overturn several popular encryption techniques, including the often used SSL technology. However, it is unclear which techniques to what extent are open to the services accurately.
-
anonymity cancel
the Tor anonymizing network, can cover their tracks on the net with the user was spying target of the NSA. The Secret Service made it but probably not the network directly to crack.
-
monitoring of foreign heads of state
Not only Angela Merkel cell phone apparently was targeted by the NSA. The “Guardian” reported the news service had monitored telephones of 35 leading politicians. The Brazilian President Dilma Rousseff and her Mexican counterpart Enrique Peña Nieto had been spied on.
-
attack on Google and Yahoo
The NSA could, according to the “Washington Post” the traffic between the data centers of the two Internet giants tap. In the data center information is stored from e-mail services, search queries or documents of the users. Meanwhile, the data should also be encrypted between the data centers be on the road.
Also at the user-friendliness of the programs had to be worked. Thus, the encryption software PGP is indeed robust and reliable, but: “Unfortunately, it is almost useless.” (Possible ways out shows the text “Encryption Against the Dark Arts” on.)
To achieve more privacy, it requires a collaborative effort of the whistleblower’s view. “We need people who attack these systems (…) and try to find the holes, so that we can close this,” he said, according to the technology blog Techcrunch.
The former intelligence officials had triggered last summer with his revelations about the NSA surveillance practice of the secret affair. He currently holds in Russia, where he has asked the beginning of July to the extension of his residence permit.
No comments:
Post a Comment