Tuesday, July 15, 2014

The exact details of how the NSA can access customer personal data by the U.S. Internet company man


Recent disclosures of former contractors of the National Security Agency (NSA) American, Edward Snowden, was a smash hit. Edward Snowden told The Guardian that the NSA is not only holding details of telephone conversations touching millions of mobile subscribers of Verizon (U.S.), but also can be accessed through the exchange activity in the Internet individual. This is considered part of the monitoring program the U.S. government called Prism. That's all being watched!
The exact details of how the NSA can access customer personal data by the U.S. Internet company management (Microsoft, Apple, Skype, Google ....) There is still unclear mtv ema 2011 but the next data access calls by Verizon management course need to "secret order" of the Supreme Court. When the court would suggest that cellular carriers must provide notice including call duration, phone number and position made the phone call that. That means the government can "reached" and plucking the network traffic slipping now and capture a large volume of traffic information individualistic mtv ema 2011 citizens. mtv ema 2011
Tanya Berger-Wolf at the University of Illinois at Chicago, who has many years of research on the method of removal of information from large data sets, that the combination of data from multiple sources such as Google, Facebook and Verizon mtv ema 2011 can provide fairly detailed profile of a person. mtv ema 2011 Only the telephone conversation was enough to provide the necessary information. Yves-Alexandre de Montjoye of MIT and his colleagues analyzed the records of 1.5 million anonymous calls from a European network. The group identified confirmed just 4 calls or messages at the moment and have different positions can distinguish "roll out" of a person.
Information on'll especially if more details are coordinated mtv ema 2011 with the activities of that person online. Malte Spitz, a German politician, sued Deutsche Telekom mtv ema 2011 (Germany) mtv ema 2011 to require the data to be transferred mtv ema 2011 telephone calls in a row in his 6 months. Then Spitz has collaborated with newspaper Die Zeit (Germany) coupling these data with information and web surfing activities on your class to create a detailed map of their activities. Accordingly, this notice maps indicate the location of Spitz in any definite period, are doing, have practiced how he calls and connect to the Internet for how long. With the system mtv ema 2011 analyzed by modern supercomputers of the NSA, the map of this personal information will be painted detail as possible, and it can re-create life paintings of anyone that interested organizations.
Chris Clifton, who analyzed individual data at Purdue University, Indiana, said the NSA is a type of software used to group together similar notice, such rules many phone callers to a group, or group who never calls go international. In addition, the unusual behavior of the telephone intervention system is to focus NSA analysts to detect suspicious cases involving stagnant, terrorism and other criminal acts.
So people want to protect their own west, why? There are a number mtv ema 2011 of options to ensure that the electronic traffic monitoring more difficult. First and foremost is the use as Silent Circle (silentcircle.Com) and RedPhone, have the ability to encrypt and send calls over a data connection or Wi-Fi network instead of the mobile network service providers. The application also helps prevent network access to look up phone numbers to call, and with the amount of download two applications jumped after the Guardian revealed that they are proved to be many who are skeptical. However, this did not apply to help users complete anonymity mtv ema 2011 if they move out of the practice area calls are the most by a cell tower management level. Speaking in an understandable way transference is if the user is making a call when they will be discovered.
Of course, the Silent Circle and RedPhone only the application-level. There is a new transaction standard called WebRTC mtv ema 2011 (Web Real-Time Communication) can allow users to make calls over the Internet without leaving mtv ema 2011 a trace. Having this ability is due to the user data that is not implemented on the centralized server that is sent directly from the mutual personal computer together. If coordinate with encrypted connections Tor anonymous browsing network (send data over computer networks voluntary), the WebRTC can protect safety notices before the eyes peered nom.
At higher mtv ema 2011 levels, there is currently trying to build a new Internet network is not large corporations, or the government's failure to manage. Meshnet Project is one of these, is based on the mechanism used separate hardware router and that means the contacts application is not standard practice infrastructure major telecom operators today. Although this network is still being built and run pilot in Maryland, Seattle and New York but from existing users can be

No comments:

Post a Comment