Necromancer |
1 person marked this as a favorite. |
His reasons for sacrificing his freedoms for others' and Julian Assange shows support. We've assumed our government was spying on us for years...turns out we were right.
Spanky the Leprechaun |
Guy Humual |
2 people marked this as a favorite. |
Not to be too skeptical but are we sure that this guy is completely on the level? I mean I'm not surprised that the US government is monitoring people, that doesn't come as a surprise, but some of his other claims do sound a bit fishy. Supposedly he doesn't have a high school diploma but yet he's got a $200,000 salary? Maybe the guy is telling us the truth but parts of his story make me hesitant. Also I wonder why he'd wait till now to break the story?
Orthos |
Spanky the Leprechaun wrote:LOL, exactly what I was think.Game of Thrones spoiler:
** spoiler omitted **
I don't even read/watch SoIaF/GoT and this is where my mind went.
The guy's all over Imgur and Reddit and that's about the extent I've seen of him, since I don't watch TV or read news. There seems to be a pretty even split over whether or not he's legit.
Comrade Anklebiter |
Well, here's his wiki page with footnotes to track down.
According to it, he does have his GED. His former employer disputed his salary, but...well, you can read it for yourself.
kmal2t |
1 person marked this as a favorite. |
The fact that they were able to do this stuff was reported a few years ago. Hell it was even on the NSA wikipedia entry. The full scope wasn't known, but it was clear they had access to a lot of information. There's no problem with them having access to information. The problem is the checks on this ability are apparently worthless as a rubber stamp court never denies them. It pretty much nullifies the 4th amendment when it comes to electronic information.
It would be like having to require search warrants to search people's homes...except the judge issuing the warrants is Vic Mackey..
Comrade Anklebiter |
I don't pretend to be a surveillance or technology expert, but from what I've been reading there were two leaks: the PRISM leak (which, indeed, we've known they can do for years) and the Verizon-seize-everybody's-phone-records leak.
Which, I've been reading, is an interpretation of Section 215 (or something) of the FISA Act that nobody in the public and only certain members of the Congress knew about until his leak.
Quandary |
1 person marked this as a favorite. |
That it's a real leak has been confirmed by the reaction and statements of the government and NSA figures. Come on.
That they're trying to extradite him/prosecute him (besides the more subjective reactions to him, and empty accusations of him working for foreign countries) means it is real. And that means that sworn testimony to congress by intelligence directors (as well as public statements of government) were lies, i.e. perjury. Something's a bit off about THAT, I'd say.
Also I wonder why he'd wait till now to break the story?
He explained that, he wanted to earlier but was drawn in by the idea that Obama would change things, except the only change was expanding these types of unconstitutional programs, so he eventually gave up on that hope. Since he's very familiar with the government intelligence and security apparatus, going from the decision to do this and carrying it out certainly must have taken a while for him to formulate his plan, from selecting and gathering the documents themselves to planning how to escape safely and deal with the aftermath. .
Comrade Anklebiter |
I found this article from The New Republic rather helpful.
I'm sure others have, um, others they could recommend.
Vo Giap, Ambassador of Bachuan |
And two opposing articles from the same radical-liberal website on the wisdom of fleeing to Hong Kong:
A Whistleblower Holding All The Cards: Why is Edward Snowden in Hong Kong? by DAVE LINDORFF
Failure to Protect Snowden: Greenwald Botches NSA Leak by KEN KLIPPENSTEIN
Guy Humual |
The story made clear which systems are subject to this monitoring—naming Facebook, Skype, Google, and a number of others—and asserted that the monitoring occurs not just with the knowledge but also the active cooperation of the companies involved. Indeed, the Post claimed that the companies do not merely facilitate such monitoring upon request, but have established means by which the NSA can directly tap into their systems as needed (a point sharply contested by at least some of the companies involved, notably).
This is some of the stuff that I'm finding difficult to swallow.
Comrade Anklebiter |
Although...
"The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.
The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley.
Equally unusual is the way the NSA extracts what it wants, according to the document: 'Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.'"
So it appears that this claim comes from the leaked document. Although I haven't seen the document.
LazarX |
1 person marked this as a favorite. |
Although...
"The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.
The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley.
PRISM is hardly the first of these things. Or has everyone already forgotten the uproar over ECHELON at the turn of the century?
Guy Humual |
@Guy Humual: Are you saying the documents are false? Or he's a patsy and someone else is the actual leak?
edit- for clarity.
I'm not entirely sure Irontruth, but I do find it very hard to believe that internet companies have given the US government direct access to their data. I'm sure they've complied with court orders but this report seems to be suggesting that PRISM has some sort of back door built into these companies. I think that's absolutely an impossibility, not because it can't be done, but because no company would agree to something like that.
Now is this document forged? I have no idea. Maybe we're seeing something like what BluePigeon suggested and someone filtered him this document to see if he was the leak? It might explain why he suddenly decided to go public with what he knew.
GentleGiant |
1 person marked this as a favorite. |
I recently started watching Person of Interest. A few days later this whole story came out.
I found that somewhat poetic. ;-)
Irontruth |
Irontruth wrote:@Guy Humual: Are you saying the documents are false? Or he's a patsy and someone else is the actual leak?
edit- for clarity.
I'm not entirely sure Irontruth, but I do find it very hard to believe that internet companies have given the US government direct access to their data. I'm sure they've complied with court orders but this report seems to be suggesting that PRISM has some sort of back door built into these companies. I think that's absolutely an impossibility, not because it can't be done, but because no company would agree to something like that.
Now is this document forged? I have no idea. Maybe we're seeing something like what BluePigeon suggested and someone filtered him this document to see if he was the leak? It might explain why he suddenly decided to go public with what he knew.
You're probably right, the back door probably doesn't exist, but that's largely irrelevant.
An analogy: You'll let me borrow your car, but you're not giving me my own key. It sounds like you're in control. Then we add the fact that you're obligated to say 'yes' every time I ask. Sure, I have to ask, but you can never deny me.
The fact that I don't have a key to the car seems to be the most minor part of that situation IMO.
Gorbacz |
3 people marked this as a favorite. |
I'm not entirely sure Irontruth, but I do find it very hard to believe that internet companies have given the US government direct access to their data. I think that's absolutely an impossibility, not because it can't be done, but because no company would agree to something like that.
"I do find it very hard to believe that government agencies were used to spy on political opposition. I think that's absolutely an impossibility, not because it can't be done, but because no government official would agree to something like that."
--somebody in 1972
Guy Humual |
Maybe, I see now that many of these companies are chomping at the bit to explain what exactly they did turn over, but I'd assume that some sort of gag order is also in effect. Things certainly do sound bad but perhaps not nearly as bad as some of these articles would suggest, and maybe, not saying anything for sure yet, but maybe once things come to light we could find that only very specific information was handed out.
The car analogy is bad if you're constantly borrowing my car but if you're only using it once in a while, like say to drive down a new street because you heard there was a new pizza place on it, and you needed to stop off at every mini mall on that street to check it out, well that wouldn't be as bad as constantly roaming the city streets looking for pizza joints.
Actually forget the analogy. I think there were 1700 and some odd requests for data mining, all of those requests were rubber stamped apparently, but if you're doing a search of say a terrorist suspect like the two Boston bombers, you start at two, and then you add friends on facebook to the search, and suddenly those numbers jump pretty quickly as some folks have hundreds of names and one or two could be a collaborator.
I don't know the situation but when Snowden says he could run a search on the president's if he had an email . . . I don't know, I get the feeling that Snowden might be overplaying his importance or the ability of PRISM. I'm sure these guys are following links and connections but I'd think they'd need a reason to dig through someone's information. I mean time wise alone these guys aren't mining anyone they come across because there's a lot to sift though.
Guy Humual |
Guy Humual wrote:I'm not entirely sure Irontruth, but I do find it very hard to believe that internet companies have given the US government direct access to their data. I think that's absolutely an impossibility, not because it can't be done, but because no company would agree to something like that."I do find it very hard to believe that government agencies were used to spy on political opposition. I think that's absolutely an impossibility, not because it can't be done, but because no government official would agree to something like that."
--somebody in 1972
I'm not suggesting that the government isn't spying on people. Especially not the US government. What I'm finding hard to swallow is that PRISM has private access to the data of independent companies.
Also the fact that Snowden is in China of all places . . . that really does seem odd.
Guy Humual |
Not that subtle. Considering the number of cyber attacks against the US that originate in China and considering this is someone with supposed insider information on the US security I'd say his choice of vacation city is curious at best. Less eyebrows would be raised if he were in Singapore, Korea, or Japan. Better yet, why not Iceland or Ecuador? Places championing freedom of speech and supporting whistle blowers?
Are we supposed to think that he's not there to make some sort of sale of information?
Arni Carni |
3 people marked this as a favorite. |
Why should we be talking about this guy? Just because he has documentation to back up what anyone with a brain had already figured out as soon as the Patriot Act was passed.
Besides, the only phone in history that wasn't tapped was the one that Bell used to call Watson on.
You ever been on a party line? There has NEVER been any reasonable expectation of privacy on the telephone. If you had such an expectation, that was totally irrational of you.
His story will totally be backpage by next week, and you will never hear about it again. Just ask Winston Smith down at the Ministry of Truth how that works.
Gorbacz |
Not that subtle. Considering the number of cyber attacks against the US that originate in China and considering this is someone with supposed insider information on the US security I'd say his choice of vacation city is curious at best. Less eyebrows would be raised if he were in Singapore, Korea, or Japan. Better yet, why not Iceland or Ecuador? Places championing freedom of speech and supporting whistle blowers?
Are we supposed to think that he's not there to make some sort of sale of information?
Likely because of the way extradition agreements are worded. It's entirely possible that Iceland and Ecuador are able to extradite to the US anybody for any reason, while Hong Kong doesn't deport people accused of crimes of political nature.
Comrade Anklebiter |
Comrade Anklebiter wrote:PRISM is hardly the first of these things. Or has everyone already forgotten the uproar over ECHELON at the turn of the century?Although...
"The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.
The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley.
It's a quote from The Washington Post. If you will look up six posts from the one quoted, you will see that I made the exact same point.
And I will stress again: PRISM--seen it before; seizing everybody's phone records, a la Verizon--previously unknown to everybody except the dudes on Dixie Diane's Senate Committee (maybe some other gov't dudes).