Olá, Visitante. Por favor entre ou registe-se se ainda não for membro.

Entrar com nome de utilizador, password e duração da sessão
 

Autor Tópico: Programa da NSA recolhe "quase tudo o que um utilizador comum faz na Internet  (Lida 23192 vezes)

itg00022289

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 2332
    • Ver Perfil
Impressionante de facto.
E pensar que isto era o que se fazia à 5 anos...
Uma apresentação interna da NSA sobre este software: http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation

Citar
Programa da NSA recolhe "quase tudo o que um utilizador comum faz na Internet"
ALEXANDRE MARTINS 31/07/2013 - 20:31
Jornal britânico The Guardian revela documentos facultados por Edward Snowden sobre o programa XKeyscore.

 
A Agência de Segurança Nacional dos Estados Unidos usa um programa para recolha de dados em larga escala que lhe permite aceder a "quase tudo o que um utilizador comum faz na Internet", incluindo o conteúdo de emails, mensagens privadas trocadas no Facebook e o histórico da navegação de sites, revela o jornal The Guardian.

O programa, chamado XKeyscore, já tinha sido referido de uma forma superficial pela revista alemã Der Spiegel, no início da semana passada, mas o jornal britânico publicou nesta quarta-feira uma apresentação interna da Agência de Segurança Nacional (NSA, na sigla em inglês), facultada pelo analista informático Edward Snowden.

Descrito pela própria NSA como o seu programa "mais abrangente" com vista à recolha de dados, o XKeyscore permite perceber melhor uma das declarações mais polémicas de Edward Snowden durante as entrevistas que deu em Hong Kong ao jornalista Glenn Greenwald e à realizadora Laura Poitras: "Sentado na minha secretária, podia espiar qualquer pessoa, tu ou o teu contabilista, um juiz ou até mesmo o Presidente, desde que tivesse um endereço de email."

De acordo com a apresentação revelada pelo The Guardian, os analistas da NSA têm apenas de preencher alguns campos num formulário e acrescentar uma justificação genérica (num dos slides lê-se apenas "alvo em África") para fazerem a pesquisa. De imediato, têm à sua disposição "quase tudo o que um utilizador comum faz na Internet", incluindo actividade em tempo real, e sem necessidade de obterem um mandado judicial – segundo a lei norte-americana, só é exigido um mandado para espiar cidadãos norte-americanos e que sejam considerados suspeitos. Se os alvos da intercepção forem cidadãos estrangeiros, ou cidadãos norte-americanos em comunicação com estrangeiros, não é necessário um mandado judicial.

O XKeyscore permite pesquisar informação por nome, número de telefone, endereço de IP, palavras-chave ou pelo tipo de browser usado, avança o The Guardian. Podem ser feitas pesquisas "no corpo das mensagens de email", nos campos "Para, De, CC e BCC" e nos formulários disponibilizados por sites para que os utilizadores possam enviar mensagens, por exemplo.

Os documentos secretos da NSA revelam também a existência de uma ferramenta chamada DNI Presenter, que permite o acesso ao conteúdo de emails e aos chats e mensagens privadas do Facebook.

Bases de dados especiais com informação guardada durante cinco anos
O volume de dados recolhidos através do XKeyscore é de tal ordem que o conteúdo das comunicações só pode ser guardado por um período de até cinco dias. A metainformação (informação sobre a duração de uma chamada telefónica, por exemplo) é armazenada durante um mês. Num dos documentos a que o The Guardian teve acesso, lê-se que, em certas situações, "o volume de dados recebidos por dia só pode ser armazenado por 24 horas".

Para as informações consideradas "interessantes", a NSA desenvolveu bases de dados específicas, entre as quais uma chamada Pinwale, que pode ser pesquisada durante cinco anos.

Num esclarecimento enviado ao The Guardian, a NSA negou as "alegações de acesso generalizado e não controlado por parte de analistas aos dados recolhidos pela NSA".

"O acesso ao XKeyscore, assim como a qualquer outra ferramenta de análise da NSA, está limitado a funcionários devidamente autorizados. Para além disso, há uma variedade de controlos técnicos, manuais e de supervisão dentro do próprio sistema para prevenir a ocorrência de uso indevido deliberado", garante a Agência de Segurança Nacional.

Em Junho, numa das entrevistas que concedeu ao The Guardian, Edward Snowden admitiu que algumas das pesquisas feitas por analistas da NSA são alvo de controlo, mas disse que os supervisores não são muito exigentes. "É muito raro que sejamos questionados sobre as nossas pesquisas. E mesmo quando somos, normalmente a questão é posta desta forma: 'Vamos reforçar esta justificação'."

http://www.publico.pt/mundo/noticia/programa-da-nsa-recolhe-quase-tudo-o-que-um-utilizador-comum-faz-na-internet-1601891

Mystery

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 1562
    • Ver Perfil
isto pode representar um risco serio para as empresas que actuam em areas digitais, virtualizacao e cloud computing especialmente se estiverem em solo americano

exemplo

http://www.telekom.com/media/company/192834
A fool with a tool is still a fool.

valves1

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 1160
    • Ver Perfil
eu sou de aqueles que acredita que vivemos num Big Brother global em que tudo o que fazemos online, conversas telefonicas e ate movimentos via camaras de TV instaladas na via publica etc sao " recolhidas "
Porque nao levar as coisas para o lado positivo ? quem nao deve nao teme e a  informacao ate pode ser utilizada para proteger os cidadaos ..

« Última modificação: 2013-08-10 15:28:01 por valves1 »
"O poder só sobe a cabeça quando encontra o local vazio."


JoaoAP

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 4778
    • Ver Perfil
Montra TeK: Quatro ferramentas anti-NSA
TekSapo

Jérôme

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 976
    • Ver Perfil
isto pode representar um risco serio para as empresas que actuam em areas digitais, virtualizacao e cloud computing especialmente se estiverem em solo americano

exemplo

http://www.telekom.com/media/company/192834


E uma oportunidade de negócio fora dos USA pelo link que aí colocas. Bastante interessante.



Jérôme

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 976
    • Ver Perfil
eu sou de aqueles que acredita que vivemos num Big Brother global em que tudo o que fazemos online, conversas telefonicas e ate movimentos via camaras de TV instaladas na via publica etc sao " recolhidas "
Porque nao levar as coisas para o lado positivo ? quem nao deve nao teme e a  informacao ate pode ser utilizada para proteger os cidadaos ..


2x.

Mas sou contra, gosto da minha privacidade. Sempre evitei utilizar o Crome por causa disso, mas não resisti e já o utilizo.
É arrepiante saber que os tipos sabem mais de partes da minha vida do que eu.
É o Google store no Android, com todas as aplicações a sacarem informação tua para a nuvem,
é o Crome com histórico e favoritos
é o Gmail
é o Youtube
é o Google search
os tipos sabem tudo o que fazemos e pensamos, só me tranquilizo porque estou no meio de milhões que terão um perfil mais consumista e terrorista e assim não levanto red flags.

Mesmo assim utilizo o Firefox para fazer buscas mais anónimas. E não utilizo o Facebook, que esse é escandalosamente óbvio na utilização sem escrúpulos da nossa info, por sinal ainda mais pessoal e íntima, na maior parte das vezes.

Ainda não sinto necessidade de utilizar routing anónimo mas se precisar: http://learn.adafruit.com/onion-pi/overview

Jérôme

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 976
    • Ver Perfil
Citar
Tor usage doubles in under a week, and no one knows why
"And it's not just a fluke in the metrics data," Tor's project director writes.

This week on the Tor e-mail list, Roger Dingledine, the project leader for the well-known online anonymity tool, pointed out that the “number of Tor clients running appears to have doubled since August 19.”

The above graph shows that in less than one week, the number of Tor users has shot up to about 1.2 million from 600,000.

“And it's not just a fluke in the metrics data—it appears that there really are twice as many Tor clients running as before,” Dingledine wrote on Tuesday. “There's a slight increase (worsening) in the performance measurements, but it's hard to say if that's a real difference. So while there are a bunch of new Tor clients running, it would seem they're not doing much. Anybody know details? It's easy to speculate (Pirate Browser publicity gone overboard? People finally reading about the NSA thing? Botnet?), but some good solid facts would sure be useful.”

In the wake of the Edward Snowden news and the National Security Agency revelations, I’ve definitely increased my use of VPNs, PGP (here’s my key!), and Tor. Perhaps I'm not alone.

Others on the Tor list have suggested that it’s a spike from Russia as a result of a newly passed “anti-piracy” law. Anyone have any better ideas?

Se a NSA tiver 50% dos clientes sobre a sua alçada, tem 50% de hipótese de apanhar quem anda a esconder-se atrás do Tor. É uma possível explicação e não vi a ideia refutada.
Spookie...

Jérôme

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 976
    • Ver Perfil
Citar
Majority of Tor crypto keys could be broken by NSA, researcher says

The majority of devices connected to the Tor privacy service may be using encryption keys that can be broken by the National Security Agency, a security researcher has speculated.

Rob Graham, CEO of penetration testing firm Errata Security, arrived at that conclusion by running his own "hostile" exit node on Tor and surveying the encryption algorithms established by incoming connections. About 76 percent of the 22,920 connections he polled used some form of 1024-bit Diffie-Hellman key. The analysis came a day after revelations the NSA can circumvent much of the encryption used on the Internet. While no one knows for sure exactly what the NSA is capable of cracking, educated speculation has long made a case that the keys Graham observed are within reach of the US spy agency.

"Everyone seems to agree that if anything, the NSA can break 1024 RSA/DH keys," Graham wrote in a blog post published Friday. "Assuming no 'breakthroughs,' the NSA can spend $1 billion on custom chips that can break such a key in a few hours. We know the NSA builds custom chips, they've got fairly public deals with IBM foundries to build chips."

He went on to cite official Tor statistics to observe that only 10 percent of Tor servers are using version 2.4 of the software. That's the only Tor release that implements elliptical curve Diffie-Hellman crypto, which cryptographers believe is much harder to break. The remaining versions use keys that are presumed to be weaker.

Graham called on Tor Project leaders to do a better job of getting end users to upgrade to version 2.4, but he also couched his findings with a word of caution.

"Of course, this is just guessing about the NSA's capabilities," he wrote. "As it turns out, the newer elliptical keys may turn out to be relatively easier to crack than people thought, meaning that older software may in fact be more secure. But since 1024 bit RSA/DH has been the most popular SSL encryption for the past decade, I'd assume that it's that, rather than curves, [it's 1024 RSA/DH] that the NSA is best at cracking."


http://arstechnica.com/security/2013/09/majority-of-tor-crypto-keys-could-be-broken-by-nsa-researcher-says/

Jérôme

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 976
    • Ver Perfil
Brazil’s bold plan to combat the NSA
« Responder #10 em: 2013-09-25 22:02:59 »
Citar
Cutting the cord: Brazil’s bold plan to combat the NSA
President Dilma Rousseff wants to route internet traffic away from the US, but experts say it will do little to deter American espionage

Revelations about the American government’s ongoing electronic surveillance have sent shockwaves across the globe, but few countries have reacted as boldly as Brazil, where lawmakers are currently considering a plan to cut ties — quite literally — with the US.

Earlier this month, Brazilian president Dilma Rousseff announced plans to create an undersea fiber-optic cable that would funnel internet traffic between South America and Europe, bypassing the US entirely. Rousseff also urged legislators to pass an amendment that would force Google, Microsoft, and other US web companies to store data for Brazilian users on servers located within Brazil, while the country's postal service has already begun developing an encrypted domestic email system.

The moves come as a direct response to allegations that the National Security Agency (NSA) has been eavesdropping on Rousseff’s phone calls and emails, according to classified documents leaked by whistleblower Edward Snowden. The reports, published earlier this year, have escalated diplomatic tensions between the Obama administration and Rousseff, who yesterday accused the US of violating international law in a scathing speech to the United Nations General Assembly.

Rousseff's proposals rest upon the premise that by routing web traffic away from American soil and keeping data within Brazil, the Brazilian government could more easily control and secure citizens' online information. But experts say the plans would do little to stop the NSA from spying on Brazilian communications, and some worry that they could lead to a more fractured internet.


continua em:
http://www.theverge.com/2013/9/25/4769534/brazil-to-build-internet-cable-to-avoid-us-nsa-spying

itg00022289

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 2332
    • Ver Perfil
Mais algumas revelações do Snowden.
Impressiona-me muito a capacidade de intrusão da NSA.

Se calhar são eles que me perseguem de forma vil e estão a dar cabo dos meus negócios na bolsa.... hehehe

Citar
NSA guarda historial de navegação na Internet durante um ano
ALEXANDRE MARTINS 30/09/2013 - 20:26
Programa Marina armazena dados de milhões de pessoas durante 365 dias, independentemente de serem consideradas ou não suspeitas.

 
A Agência de Segurança Nacional (NSA) norte-americana guarda durante um ano informações sobre chamadas telefónicas e navegação na Internet de milhões de pessoas em todo o mundo, sem nenhum critério definido – qualquer utilizador, seja ou não considerado uma "pessoa de interesse" para os serviços secretos, pode ficar com o seu historial armazenado nas bases de dados da NSA.

Os pormenores deste programa, conhecido como "Marina", estão incluídos na série de documentos recolhidos pelo antigo analista informático Edward Snowden e foram divulgados nesta segunda-feira pelo jornal britânico The Guardian.

O objectivo é permitir que os serviços secretos tenham acesso ao padrão de comportamento online de milhões de pessoas, através do registo de metainformação (dados como o historial de navegação na Internet, pesquisas em mapas, duração e localização de chamadas telefónicas – quase tudo, excepto o suporte áudio das conversas e o conteúdo dos emails).

As autoridades dos EUA têm repetido em várias ocasiões que apenas é guardada informação sobre pessoas consideradas suspeitas, mas o Programa Marina indica o contrário. Num documento distribuído aos agentes da NSA, lê-se que "a aplicação de metainformação do Marina rastreia a utilização dos browsers, recolhe informação de contactos/conteúdos e produz resumos sobre um alvo. Esta ferramenta oferece a capacidade de exportar dados numa variedade de formatos, bem como criar gráficos que contribuem para o estabelecimento de um padrão de vida".

A ideia é conseguir olhar para trás no tempo, a partir do momento em que alguém passa para a lista de pessoas suspeitas de envolvimento em acções terroristas ou outras actividades criminosas. A principal questão é que, em muitos casos, os dados são registados e armazenados quando as pessoas não são suspeitas, nem as suas actividades despertam qualquer interesse aos serviços secretos norte-americanos.

"Uma das características mais distintivas do Marina é a capacidade para olhar para trás sobre os últimos 365 dias de metainformação observada pelo sistema de recolha de dados Sigint, independentemente de [esses dados] terem ou não sido objecto de um pedido de recolha", lê-se no documento, citado pelo The Guardian.

Contactada pelo jornal britânico, a NSA não se referiu directamente à questão do armazenamento de metainformação de cidadãos sobre os quais não existem suspeitas de qualquer actividade criminosa.

Em resposta, a agência norte-americana repete o que já tinha sido afirmado em várias ocasiões, inclusivamente pelo Presidente dos EUA, Barack Obama, e que é uma questão diferente: "Sabemos que existe uma percepção errada de que a NSA ouve conversas telefónicas e lê os emails de americanos comuns, com o objectivo de monitorizar ilegalmente cidadãos dos EUA. Mas isso não é verdade. (…) As actividades de recolha de informação no estrangeiro são conduzidas de acordo com os procedimentos aprovados pelo procurador-geral dos EUA e pelo secretário da Defesa e, nos casos em que isso seja necessário, com a autorização do tribunal de vigilância [Foreign Intelligence Surveillance Court – FISA]."

http://www.publico.pt/mundo/noticia/nsa-guarda-registos-de-utilizadores-durante-um-ano-suspeitos-ou-inocentes-1607634

Jérôme

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 976
    • Ver Perfil
Citar
US has been monitoring German chancellor Angela Merkel's phone since 2002, report says


The US government may have been monitoring German chancellor Angela Merkel's cell phone for more than 10 years, according to a report by Der Spiegel based on internal documents from the National Security Agency (NSA).

President Barack Obama told Merkel that he was not aware her phone was being bugged, or he would have stopped it. However, he declined to say whether her phone had been monitored in the past. A separate report in Die Welt said the number of Merkel's Nokia 6120 Slide was listed in leaked NSA documents, although she's since switched to a BlackBerry Z10 smart phone.

The White House assured Merkel that her phone is not being tapped now. But today's report suggests that the surveillance went back as far as 2002, when Merkel was the head of her political party, the Christian Democratic Union. She became chancellor in 2005.

It's unclear how much data was being collected. Der Spiegel reports the surveillance was being done from a legally-registered intelligence office. The agency reportedly has 80 such offices around the world, including Paris, Madrid, Rome, Prague, Geneva, and Frankfurt, according to a 2010 NSA document.

EUROPEAN LEADERS ARE GROWING INCREASINGLY INCENSED

European leaders are growing increasingly incensed over new revelations of NSA spying on foreign citizens and governments. Details are still being revealed by former federal contractor-turned-whistleblower Edward Snowden, who turned over an unknown number of internal NSA documents to journalists.

Germany and France are now pushing the United Nations to pass a measure protectect their citizens' privacy against foreign spying, and Germany is sending representatives to Washington.


http://www.theverge.com/2013/10/26/5031990/us-has-been-monitoring-german-chancellor-angela-merkels-phone-since-2002

Asgard

  • Full Member
  • ***
  • Mensagens: 225
    • Ver Perfil
Muito bom artigo
http://www.foreignaffairs.com/articles/140155/henry-farrell-and-martha-finnemore/the-end-of-hypocrisy#
The End of Hypocrisy
American Foreign Policy in the Age of Leaks

By Henry Farrell and Martha Finnemore


The U.S. government seems outraged that people are leaking classified materials about its less attractive behavior. It certainly acts that way: three years ago, after Chelsea Manning, an army private then known as Bradley Manning, turned over hundreds of thousands of classified cables to the anti-secrecy group WikiLeaks, U.S. authorities imprisoned the soldier under conditions that the UN special rapporteur on torture deemed cruel and inhumane. The Senate’s top Republican, Mitch McConnell, appearing on Meet the Press shortly thereafter, called WikiLeaks’ founder, Julian Assange, “a high-tech terrorist.”

More recently, following the disclosures about U.S. spying programs by Edward Snowden, a former National Security Agency analyst, U.S. officials spent a great deal of diplomatic capital trying to convince other countries to deny Snowden refuge. And U.S. President Barack Obama canceled a long-anticipated summit with Russian President Vladimir Putin when he refused to comply.

Despite such efforts, however, the U.S. establishment has often struggled to explain exactly why these leakers pose such an enormous threat. Indeed, nothing in the Manning and Snowden leaks should have shocked those who were paying attention. Former Defense Secretary Robert Gates, who dissented from the WikiLeaks panic, suggested as much when he told reporters in 2010 that the leaked information had had only a “fairly modest” impact and had not compromised intelligence sources or methods. Snowden has most certainly compromised sources and methods, but he has revealed nothing that was really unexpected. Before his disclosures, most experts already assumed that the United States conducted cyberattacks against China, bugged European institutions, and monitored global Internet communications. Even his most explosive revelation -- that the United States and the United Kingdom have compromised key communications software and encryption systems designed to protect online privacy and security -- merely confirmed what knowledgeable observers have long suspected.

The deeper threat that leakers such as Manning and Snowden pose is more subtle than a direct assault on U.S. national security: they undermine Washington’s ability to act hypocritically and get away with it. Their danger lies not in the new information that they reveal but in the documented confirmation they provide of what the United States is actually doing and why. When these deeds turn out to clash with the government’s public rhetoric, as they so often do, it becomes harder for U.S. allies to overlook Washington’s covert behavior and easier for U.S. adversaries to justify their own.

Few U.S. officials think of their ability to act hypocritically as a key strategic resource. Indeed, one of the reasons American hypocrisy is so effective is that it stems from sincerity: most U.S. politicians do not recognize just how two-faced their country is. Yet as the United States finds itself less able to deny the gaps between its actions and its words, it will face increasingly difficult choices -- and may ultimately be compelled to start practicing what it preaches.

A HYPOCRITICAL HEGEMON

Hypocrisy is central to Washington’s soft power -- its ability to get other countries to accept the legitimacy of its actions -- yet few Americans appreciate its role. Liberals tend to believe that other countries cooperate with the United States because American ideals are attractive and the U.S.-led international system is fair. Realists may be more cynical, yet if they think about Washington’s hypocrisy at all, they consider it irrelevant. For them, it is Washington’s cold, hard power, not its ideals, that encourages other countries to partner with the United States.

Of course, the United States is far from the only hypocrite in international politics. But the United States’ hypocrisy matters more than that of other countries. That’s because most of the world today lives within an order that the United States built, one that is both underwritten by U.S. power and legitimated by liberal ideas. American commitments to the rule of law, democracy, and free trade are embedded in the multilateral institutions that the country helped establish after World War II, including the World Bank, the International Monetary Fund, the United Nations, and later the World Trade Organization. Despite recent challenges to U.S. preeminence, from the Iraq war to the financial crisis, the international order remains an American one.

This system needs the lubricating oil of hypocrisy to keep its gears turning. To ensure that the world order continues to be seen as legitimate, U.S. officials must regularly promote and claim fealty to its core liberal principles; the United States cannot impose its hegemony through force alone. But as the recent leaks have shown, Washington is also unable to consistently abide by the values that it trumpets. This disconnect creates the risk that other states might decide that the U.S.-led order is fundamentally illegitimate.

Of course, the United States has gotten away with hypocrisy for some time now. It has long preached the virtues of nuclear nonproliferation, for example, and has coerced some states into abandoning their atomic ambitions. At the same time, it tacitly accepted Israel’s nuclearization and, in 2004, signed a formal deal affirming India’s right to civilian nuclear energy despite its having flouted the Nuclear Nonproliferation Treaty by acquiring nuclear weapons. In a similar vein, Washington talks a good game on democracy, yet it stood by as the Egyptian military overthrew an elected government in July, refusing to call a coup a coup. Then there’s the “war on terror”: Washington pushes foreign governments hard on human rights but claims sweeping exceptions for its own behavior when it feels its safety is threatened.

The reason the United States has until now suffered few consequences for such hypocrisy is that other states have a strong interest in turning a blind eye. Given how much they benefit from the global public goods Washington provides, they have little interest in calling the hegemon on its bad behavior. Public criticism risks pushing the U.S. government toward self-interested positions that would undermine the larger world order. Moreover, the United States can punish those who point out the inconsistency in its actions by downgrading trade relations or through other forms of direct retaliation. Allies thus usually air their concerns in private. Adversaries may point fingers, but few can convincingly occupy the moral high ground. Complaints by China and Russia hardly inspire admiration for their purer policies.

The ease with which the United States has been able to act inconsistently has bred complacency among its leaders. Since few countries ever point out the nakedness of U.S. hypocrisy, and since those that do can usually be ignored, American politicians have become desensitized to their country’s double standards. But thanks to Manning and Snowden, such double standards are getting harder and harder to ignore.

THE IMPORTANCE OF BEING EARNEST

To see how this dynamic will play out, consider the implications of Snowden’s revelations for U.S. cybersecurity policy. Until very recently, U.S. officials did not talk about their country’s offensive capabilities in cyberspace, instead emphasizing their strategies to defend against foreign attacks. At the same time, they have made increasingly direct warnings about Chinese hacking, detailing the threat to U.S. computer networks and the potential damage to U.S.-Chinese relations.

But the United States has been surreptitiously waging its own major offensive against China’s computers -- and those of other adversaries -- for some time now. The U.S. government has quietly poured billions of dollars into developing offensive, as well as defensive, capacities in cyberspace. (Indeed, the two are often interchangeable -- programmers who are good at crafting defenses for their own systems know how to penetrate other people’s computers, too.) And Snowden confirmed that the U.S. military has hacked not only the Chinese military’s computers but also those belonging to Chinese cell-phone companies and the country’s most prestigious university.

Although prior to Snowden’s disclosures, many experts were aware -- or at least reasonably certain -- that the U.S. government was involved in hacking against China, Washington was able to maintain official deniability. Protected from major criticism, U.S. officials were planning a major public relations campaign to pressure China into tamping down its illicit activities in cyberspace, starting with threats and perhaps culminating in legal indictments of Chinese hackers. Chinese officials, although well aware that the Americans were acting hypocritically, avoided calling them out directly in order to prevent further damage to the relationship.

But Beijing’s logic changed after Snowden’s leaks. China suddenly had every reason to push back publicly against U.S. hypocrisy. After all, Washington could hardly take umbrage with Beijing for calling out U.S. behavior confirmed by official U.S. documents. Indeed, the disclosures left China with little choice but to respond publicly. If it did not point out U.S. hypocrisy, its reticence would be interpreted as weakness. At a news conference after the revelations, a spokesperson for the Chinese Ministry of National Defense insisted that the scandal “reveal[ed] the true face and hypocritical conduct regarding Internet security” of the United States.

The United States has found itself flatfooted. It may attempt, as the former head of U.S. counterintelligence Joel Brenner has urged, to draw distinctions between China’s allegedly unacceptable hacking, aimed at stealing commercial secrets, and its own perfectly legitimate hacking of military or other security-related targets. But those distinctions will likely fall on deaf ears. Washington has been forced to abandon its naming-and-shaming campaign against Chinese hacking.

Manning’s and Snowden’s leaks mark the beginning of a new era in which the U.S. government can no longer count on keeping its secret behavior secret. Hundreds of thousands of Americans today have access to classified documents that would embarrass the country if they were publicly circulated. As the recent revelations show, in the age of the cell-phone camera and the flash drive, even the most draconian laws and reprisals will not prevent this information from leaking out. As a result, Washington faces what can be described as an accelerating hypocrisy collapse -- a dramatic narrowing of the country’s room to maneuver between its stated aspirations and its sometimes sordid pursuit of self-interest. The U.S. government, its friends, and its foes can no longer plausibly deny the dark side of U.S. foreign policy and will have to address it head-on.

SUIT THE ACTION TO THE WORD, THE WORD TO THE ACTION

The collapse of hypocrisy presents the United States with uncomfortable choices. One way or another, its policy and its rhetoric will have to move closer to each other.

The easiest course for the U.S. government to take would be to forgo hypocritical rhetoric altogether and acknowledge the narrowly self-interested goals of many of its actions. Leaks would be much less embarrassing -- and less damaging -- if they only confirmed what Washington had already stated its policies to be. Indeed, the United States could take a page out of China’s and Russia’s playbooks: instead of framing their behavior in terms of the common good, those countries decry anything that they see as infringing on their national sovereignty and assert their prerogative to pursue their interests at will. Washington could do the same, while continuing to punish leakers with harsh prison sentences and threatening countries that might give them refuge.

The problem with this course, however, is that U.S. national interests are inextricably bound up with a global system of multilateral ties and relative openness. Washington has already undermined its commitment to liberalism by suggesting that it will retaliate economically against countries that offer safe haven to leakers. If the United States abandoned the rhetoric of mutual good, it would signal to the world that it was no longer committed to the order it leads. As other countries followed its example and retreated to the defense of naked self-interest, the bonds of trade and cooperation that Washington has spent decades building could unravel. The United States would not prosper in a world where everyone thought about international cooperation in the way that Putin does.

A better alternative would be for Washington to pivot in the opposite direction, acting in ways more compatible with its rhetoric. This approach would also be costly and imperfect, for in international politics, ideals and interests will often clash. But the U.S. government can certainly afford to roll back some of its hypocritical behavior without compromising national security. A double standard on torture, a near indifference to casualties among non-American civilians, the gross expansion of the surveillance state -- none of these is crucial to the country’s well-being, and in some cases, they undermine it. Although the current administration has curtailed some of the abuses of its predecessors, it still has a long way to go.

Secrecy can be defended as a policy in a democracy. Blatant hypocrisy is a tougher sell. Voters accept that they cannot know everything that their government does, but they do not like being lied to. If the United States is to reduce its dangerous dependence on doublespeak, it will have to submit to real oversight and an open democratic debate about its policies. The era of easy hypocrisy is over.

5555

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 5555
    • Ver Perfil
Citar
Espionagem: NSA tem posto de operações em Portugal

Site holandês revela que, através deste posto e de outro situado em Espanha, a agência norte-americana consegue intercetar as comunicações na Europa


A Agência de Segurança Nacional dos Estados Unidos tem um posto de operações em Portugal e é também através desse posto que desenvolve o processo de espionagem na Europa. A informação é avançada pelo site holandês NRC.

http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/

A fonte citada é um slide do antigo colaborador da NSA, Edward Snowden. No documento datado de 2012 é possível ver um mapa onde estão assinalados os postos de operações da agência norte-americana espalhados pelo mundo.

É através destes centros que a NSA controla a informação que circula em mais de 20 mil redes informáticas.

No caso português, esse posto aparece situado no sudoeste do território nacional.

De acordo com o site holandês, através deste posto, e de outro situado em Espanha, a NSA consegue intercetar as comunicações na Europa.

5555

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 5555
    • Ver Perfil
Citar
Snowden pode ter cópia de segurança online de todos os documentos

Reuters

As principais agências secretas de Reino Unido e EUA temem que Snowden tenha guardado uma apólice de segurança para o caso de lhe acontecer alguma coisa. Pode haver uma cópia online de documentos sensíveis já revelados e ainda por revelar.

A agência de notícias Reuters falou com sete elementos das agências secretas que explicaram que as agências temem a publicação de mais documentos que estejam guardados na nuvem e que revelem os nomes de agentes e aliados dos espiões.

Ainda não se conseguiu confirmar se Snowden terá mesmo realizado esta cópia, mas os rumores avançados indicam que o ex-analista terá usado mecanismos de segurança dignos de um filme. «Os dados estão protegidos com encriptação sofisticada e é preciso múltiplas passwords para os abrir. As passwords estão na posse de, pelo menos, três pessoas diferentes e só são válidas durante um breve período do dia», explicaram dois agentes.

Especialistas em segurança informática ouvidos pelo ArsTechnica duvidam da utilização destas técnicas. Matt Blaze, da especialista em encriptação da Universidade da Pensilvânia, explicou que muitos dos detalhes técnicos podem ter sido omitidos pelas fontes ou pelos jornalistas da Reuters.

Na altura em que começaram a ser conhecidos os documentos, Glenn Greenwald, do The Guardian, já tinha afirmado que Snowden tomou as devidas precauções e distribuiu cópias dos registos a várias pessoas.

Thunder

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 2009
    • Ver Perfil
Este tipo de colecta gigantesca de informação é um perigo para a democracia.
Torna-se uma arma potentíssima para a destruição de adversários políticos.
E como a população é facilmente comida e liga mais a forma que ao conteúdo, tal é facílimo de fazer.
A população é super sensível a escândalos de natureza sexual, só aí ... ui...
Um pequeno exemplo:
Imaginem que eu criava um partido político e que o mesmo estava a começar a chatear um bocado os players de costume.
Eu há uns tempos atrás andava a ver uns suportes para o tejadilho do meu carro e pesquisei n vezes a palavra "Thule", que é uma marca super conhecida de artigos desse tipo. Qual não é o meu espanto ao ver um documentário outro dia em que há a referência à "Thule Society" e as suas ligações as origens do parido Nazi.
Facilmente plantava-se uma notícia no jornais e a minha situação ficava complicada..... e na mente de muita gente, mesmo que houvessem desmentidos e esclarecimentos eu seria para sempre o Nazi  >:(
Nullius in Verba
Divide et Impera
Não há almoços grátis
Facts do not cease to exist because they are ignored
Bulls make money, bears make money.... pigs get slaughtered

5555

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 5555
    • Ver Perfil
Re:Site verifica credenciais online, será que está exposto ?
« Responder #17 em: 2013-12-08 12:08:39 »
Citar
Site verifica credenciais online, será que está exposto ?

http://pplware.sapo.pt/informacao/site-verifica-credenciais-online-sera-que-esta-exposto/

Nestes últimos tempos temos assistido a um elevado número de credenciais roubadas e usadas por cibercriminosos. As empresas de serviços online estão alarmadas pois além de comprometer a credibilidade desses serviços, há uma correspondência de dados dos utilizadores com outros serviços e tudo isso cria uma bola de neve.

Muitos utilizadores estão a ser notificados por serviços que têm relação com as brechas de segurança. Será que as suas credenciais estão na mão dos cibercriminosos? É isso que poderá verificar num site agora criado.

Um novo site permite que os utilizadores da Web verifiquem se o seu email, nome de utilizador e palavra-passe foram expostos a alguma das grandes violações de dados que aconteceram nos últimos anos.

O site chama-se haveibeenpwned.com e foi desenvolvido por um australiano, Troy Hunt, arquitecto de software. O serviço permite aos utilizadores verificarem se o seu email está presente nalguma base de dados que fosse roubada recentemente, como foi o caso do que aconteceu na Adobe este ano, onde foram roubadas milhares de credenciais, como aconteceu também à Yahoo em 2012, à Sony PlayStation Network em 2011 e à Gawker em 2010… entre outros.

Os dados do “assalto” à Adobe vieram à tona no passado mês de Outubro e é já considerado o maior roubo de informações de utilizadores da história, de conhecimento público. Mais de 153 milhões de registos dos utilizadores, incluindo endereços de email e senhas mal criptografadas, foram expostos, como resultado do incidente.

SEJA CRIATIVO A CRIAR PALAVRAS-PASSE E CONFIE DESCONFIANDO!

Vários investigadores de segurança criaram sites que permitem aos utilizadores verificar se as pessoas foram afectadas. Hunt foi mais além e fez um site que mapeia os endereços de email através das várias falhas de segurança das muitas empresas visadas. Este tipo de correlação é importante, porque um grande número de pessoas volta a utilizar as mesmas palavras-passe, endereços de email e nomes de utilizador que haviam sido roubados noutros serviços.

Verifique se os seus dados foram roubados

Em 2012 Troy Hunt comparou os registos da informação roubada à Sony e à Yahoo e descobriu que 59 por cento das pessoas, com contas nos dois serviços, usaram a mesma senha.

O site haveibeenpwned.com não guarda nenhuma das palavras-passe roubadas, apenas os endereços de e-mail.

“Eu simplesmente não preciso delas [as senhas] e, francamente, não quero essa responsabilidade”, disse Hunt num post no blog . “Isto é tudo a ver com a sensibilização relacionada com a amplitude das violações”.

Importar os dados para o site não foi uma tarefa fácil, com a base de dados contendo mais de 152 milhões de registos da Adobe, quase 860 mil da Stratfor, mais de 530 mil da Gawker, da Yahoo e Sony foram 453.000 e 37.000 respectivamente. Hunt publicou também um post no blog sobre os aspectos técnicos do trabalho com este conjunto de dados de grande porte.

O trabalho foi combinar os dados numa única base de dados o que depois revelou estatísticas muito interessantes. Hunt cruzou os dados da Stratfor aos registos da Adobe e verificou que 16% dos endereços de email já estavam no sistema. Quando cruzou com os da Sony, foram 17% que coincidiram e quando comparou com os da Yahoo! verificou que eram 22% de resultados coincidentes.

O projecto está ainda a crescer, também porque as violações dos dados privados não param, mas há uma conclusão clara: as pessoas continuam a facilitar a vida aos criminosos e a desprezar a sua própria segurança, entregam facilmente palavras-passe simples, parcas em dificuldade o que é altamente condenável, tendo em conta o que cada uma dessas pessoas deposita nos serviços da Internet. A exposição traz graves problemas, uns a curto prazo, como o acesso aos netbancos e a dados financeiros sensíveis, assim como traz problemas futuros ao verem as suas contas associadas a práticas criminosas.

« Última modificação: 2013-12-08 12:09:14 por Batman »

5555

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 5555
    • Ver Perfil
Edward Snowden: Here's how we take back the Internet


Citar
«Herói» na TED, Snowden avisa que o melhor «ainda está para vir»

Ex-analista da NSA «apareceu» de surpresa em Vancouver e apelou aos gigantes da internet para codificarem as suas páginas

Por: tvi24 / CP     |   2014-03-19 18:09

Edward Snowden foi o convidado surpresa da conferência TED (Tecnologia, Entretenimento e Design) em Vancouver, Canadá, esta terça-feira, tendo aparecido em palco através de videoconferência.

A partir de um local não revelado na Rússia, o ex-consultor da NSA (Agência de Segurança Nacional norte-americana) que já revelou milhares de documentos sobre espionagem prometeu novidades para breve. «Parte das revelações mais importantes ainda está para vir», afirmou, citado pela BBC.

Snowden acusou a NSA de atividades ilegais ao «violar as suas próprias regras milhares de vezes». «As pessoas deviam poder pegar no telefone, enviar uma SMS ou comprar um livro online sem se questionarem como vão reagir as agências de inteligência», defendeu.

O líder do projeto TED, Chris Anderson, referiu que a NSA foi convidada para a conferência, mas alegou «razões logísticas» para a sua ausência.

O público foi convidado a votar se considerava as ações de Edward Snowden heróicas ou imprudentes. A grande maioria escolheu a primeira.

«Não é nenhum segredo que há governos que me querem ver morto. Mas eu vou dormir a pensar no que posso fazer pelos americanos. Não quero prejudicar o meu governo, mas não podem ignorar o processo», disse.

O antigo analista da NSA apelou às empresas tecnológicas para protegerem os seus utilizadores através da criptografia de todas as páginas internet.

«A maior coisa que as companhias de internet podem fazer para proteger os seus utilizadores é encriptar todas as páginas», explicou.

Ao lado de Snowden em palco esteve o criador da World Wide Web, Tim Berners-Lee, que o chamou de «herói» e lhe deu um «high five» virtual.

Snowden apoiou então o plano de Tim para uma Carta Magna da Internet, que consagraria a liberdade online como um direito.
« Última modificação: 2014-03-20 11:11:14 por Batman »

5555

  • Ordem dos Especialistas
  • Hero Member
  • *****
  • Mensagens: 5555
    • Ver Perfil
Citar
How to keep companies from tracking you online — for good

March 25, 2014 4:48 PM, Yahoo Finance

These days, it’s nearly impossible for the average consumer to expect anonymity online or off — at least not without a bit of legwork first. 

Data brokers —companies that specialize in gathering information about consumers and selling it to third parties — have turned the collection and sale of publicly available personal information into a multibillion-dollar industry.

At any given moment, hundreds of these companies are analyzing everything from our ZIP code, income and ethnicity to our taste in music, our driving record and how often we search for funny cat videos. They then take that information, sort us into groups and make a fortune selling it to marketers, employers, charities, government agencies, and other businesses. As to what they do with this information, the details can be hazy.  Some data are sold to marketers, but other information can be used to screen prospective employees, run background checks, detect identity theft, or come up with a dubious alternative to traditional credit scores.   

There’s little we know about data tracking and the companies that do it. Neither regulators nor lawmakers have managed to wrap their heads around data brokers quite yet.
 
What we do know, based on reports by the Government Accountability Office, Federal Trade Commission, and the World Privacy Forum, a consumer advocacy group, is that it’s nearly impossible for consumers to control the information that’s been collected about them. The FTC will publish the results of its investigation of nine major data brokers later this year.

 “A lot of this [tracking] is happening in a benign way, but to me the security problem is what makes the privacy problem so much worse,” Avi Ruben, a professor of computer science at John Hopkins University’s Information Security Institute, told Yahoo Finance. “If every company collecting this data was capable of securing it 100%, then we could take some comfort. But they can’t.”
 
We talked with a few experts to find out steps consumers can take on their own to keep their information and browsing habits as private as possible.
 
Start with your search engine
 
You may think of your search queries as a private conversation between you and the boundless realm of the Internet, but the opposite is often true. Search engines can and often do keep a log of everything users search for. When you click on links that turn up in search results, the corresponding website will often get a blurb of data telling them which search term led you to their site, along with a log of your computer location and IP address.
 
The consequences of this sort of data tracking can vary from the benign (more ads based on your search history) to the incriminating.
 
To prevent search engine tracking, make a habit of deleting your search history and cookies (the little bits of code that attach themselves to your computer when you browse online).
 
One problem with this strategy is that deleting your cookies can undo all of the sweet shortcuts you’ve created for yourself  (such as remembered passwords and specific website preferences).
 
Enable the “Do Not Track” feature

In response to revelations about NSA spying and the federal government’s ongoing collection of consumer data, a group of Internet heavyweights, including Google and Apple, recently rolled out a feature called the “Do Not Track.” DNT lets consumers opt out of third-party web tracking. To date, only 19% of users say they use this feature, according to a Forrester Research report, but it’s one of the simplest ways to keep third-party trackers at bay.

To initiate “Do Not Track” on your browser, go into your browser preferences and look for the tab labeled “Privacy.” Check the box to enable the DNT feature. You can get the same protection on your mobile phone by enabling DNT via your browser privacy settings. Most popular browsers offer a DNT option, including Google’s Chrome, Mozilla Firefox, Explorer and Safari.


Find and block data trackers yourself

If you really want a window into the seedy world of data brokers, all you need to do is download a browser plugin like Ghostery or DisconnectMe. Both tools give you a bird’s eye view of the potentially hundreds of data tracking sites that may be “watching you” online at any given moment.

“On every page you visit, there’s a lot of tracking going on that you would not expect or have any way of detecting if you’re a typical web user,” said Casey Oppenheim, co-founder of DisconnectMe.

Like the screenshot to the left, you can see a list or diagram (depending on your preference) of sites that are tracking you for analytics, advertisements, or social media requests and decide which sites to block and which to allow. These plug-ins won’t stop ads from popping up on your screen, but they will keep sites from tracking your online behavior in order to tailor ads to you specifically.   

Make sure your connections are encrypted

How can you tell if the sites you’re using are encrypting the information you send and search for? They’ll be marked by web URLs that begin with “https.” Google, Bing, and Yahoo each recently began encrypting user searches online by default.

If you’re a fan of online shopping, it can be almost impossible to avoid inputting sensitive financial information online, as many retailers don’t offer secure connections. That’s why in most cases it’s smart not to use a public WiFi connection for shopping or banking.

Use your own Virtual Private Network

If you want to encrypt your web activity wherever you go, a virtual private network (VPN) is the best route. VPNs are frequently used by companies as a means of allowing their employees to access the company Internet network when they’re logging in remotely.
 
Thanks to hundreds of free and paid options online, it’s pretty easy to get your own VPN. Not only is the information sent over a VPN encrypted, but, depending on which kind you use, it’s protected from hackers and potential malware with added layers of security. And because VPNs allow you to log in via a private connection no matter where you are, they’ve become a favorite work-around tool for travelers who want to stream content from home (since you’re logging into a U.S.-based network, you’re basically treated like an American wherever you go online). 
 
Lifehacker has an exhaustive list of reliable VPNs here. Make sure to choose one that also has mobile functionality as well.
 
Opt-out of tracking via data brokers themselves

One of the biggest bones regulators have to pick with data brokers is that they make it nearly impossible for consumers to figure out how to opt out of their tracking mechanisms. That likely won’t change for a while, but the World Privacy Forum keeps a running list of the opt-out pages that currently exist at major data broker websites. You can find it here.

Adjust your privacy settings on your mobile devices

If you carry a smartphone, chances are at least some of your apps are tracking you in some way. Many apps that run ads can use your activity to tailor ads to you. In a lot of cases, these apps need access to this information in order to function the way they’re meant to. But know that you can adjust them at any time by tapping into your phone’s privacy settings and adjusting them one by one. The latest iPhone and Android updates also offer a new feature that stops apps from using ad tracking, but you’ll need to turn it on yourself.

The bottom line:

Short of chucking your cellphone and computer out the window, it’s practically impossible to expect total anonymity online. Until all web activity requires users to opt in to tracking -- rather than require us to go out of our way to opt out -- use these tips to find the right balance for yourself. Just don’t drive yourself crazy with paranoia.

“I think you can either live in the dark ages or you can use the Internet and understand what the risks are,” Ruben said. “I just assume that what I’m doing isn’t really that private and I don’t put things on the Internet that I wouldn’t put in a post card.”