18.3 C
Friday, September 29, 2023
    HomeNewsAmericaWhy USA is worried that TikTok may pass data to the Chinese...

    Why USA is worried that TikTok may pass data to the Chinese Government. Well, because they are doing the same thing since long

    - Advertisement -

    Five-year-old program provides government with direct access to email, messages, browser history, more

    By DAN SEIFERT / @dcseifert


    Jun 7, 2013,

    via www.washingtonpost.com

    The US National Security Agency and Federal Bureau of Investigation have been harvesting data such as audio, video, photographs, emails, and documents from the internal servers of nine major technology companies, according to a leaked 41-slide security presentation obtained by The Washington Post and The Guardian. According to The Washington Post, the program’s slides were provided by a “career intelligence officer” that had “firsthand experience with these systems, and horror at their capabilities,” and wished to expose the program’s “gross intrusion on privacy.”

    The program, codenamed PRISM, is considered highly classified and has never been made public before. The list of companies involved are the who’s who of Silicon Valley: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple. Dropbox, though not yet an official part of the program, is said to be joining it soon. These companies have all willingly participated in the program, says the Post.

    According to the leaked presentation, the program has been in action since 2007, and is considered the biggest contributor to the daily briefings given to the president, providing data in 1,477 articles last year alone. Allegedly, nearly one in seven intelligence reports from the NSA contains data from the PRISM program. The NSA has the ability to pull any sort of data it likes from these companies, but it claims that it does not try to collect it all. The PRISM program goes above and beyond the existing laws that state companies must comply with government requests for data, as it gives the NSA direct access to each company’s servers — essentially letting the NSA do as it pleases. The program was initiated to overcome what the NSA saw as constraints within the existing FISA warrant program that did not allow the agency to make use of the “home-field advantage” provided by having most of the internet’s biggest companies on US soil.

    The who’s who of Silicon Valley are involved in the NSA’s PRISM program

    Microsoft was the first company to bow to the government’s wishes and join the PRISM program in 2007, while Apple held out for five years before agreeing. Though Google and Facebook are a part of PRISM, Twitter has not yet joined. Apparently, the only members of Congress that knew about PRISM’s existence were bound by oath not to speak of it publicly. In a statement provided to both The Washington Post and The Guardian, Google denied that the government had any sort of backdoor access to its systems:

    Google cares deeply about the security of our users’ data. We disclose user data to the government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘backdoor’ into our systems, but Google does not have a ‘backdoor’ for the government to access private user data.

    Leaked PRISM data-collection program slides
    Leaked PRISM data-collection program slides
    Leaked PRISM data-collection program slides
    Leaked PRISM data-collection program slides
    Leaked PRISM data-collection program slides

    The training documents for the program reveal that the NSA collects a large amount of data on the American public through the PRISM program. For example, if a specific target is investigated using PRISM, that target’s complete inbox and outbox are swept, in addition to anyone who is connected to it. This high level of access was initially given to the NSA by President Bush and was later renewed in 2012 by President Obama.

    This report follows the news from earlier this week of the NSA’s involvement in collecting call data and records from Verizon in another massive surveillance partnership.

    Update: The director of National Intelligence issued a statement today, aiming to clear up “inaccuracies” in reporting on the PRISM program. The DNI argues that only people outside of the United States have been targeted, and that the program “does not allow” the targeting of citizens or others within US borders. “This program was recently reauthorized by Congress after extensive hearings and debate,” said the official, adding that, “information collected under this program is among the most important and valuable intelligence information we collect, and is used to protect our nation from a wide variety of threats.”

    The word “target” takes on special significance given what has been reported by former NSA codebreaker William Binney and others. The Stellar Wind program, for which Binney claims to have contributed much of the base code, is said to compile massive amounts of internet traffic, which can then be queried at a later time. According to USSID 18, a top-secret NSA manual of definitions and legal directives, an “intercept” only occurs when the database is queried — when someone actually reads the text on a screen.

    Update 2: The Washington Post has backtracked slightly on its original story. Attempting to explain the disparity between its findings and the statements given by the companies involved, it says:

    It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing “collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,” rather than directly to company servers.



    Categories: America, American History, Americas, Asia, China, United States, USA

    Tagged as: apple, browser history, email, NSA, prism, privacy

    - Advertisement -


    Please enter your comment!
    Please enter your name here

    Keep exploring...

    Complete Guide to Eid Prayer: Rituals, Cleanliness, Process, and More

    Eid Prayer is a significant festival in Islam, marking the end of Ramadan, the holy month of fasting. One of the most important aspects...

    Eid Al-Fitr: A Comprehensive Guide to Recommended Acts on the Day of Celebration

    Eid Al-Fitr, often referred to as "Eid," is one of the most significant and joyous festivals in the Islamic calendar. It marks the end...

    Related Stories

    Uttar Pradesh Teacher Arrested for Alleged Communal Incident in Classroom

    In a recent development, the Uttar Pradesh Police apprehended a schoolteacher on Thursday for...

    Inspiring Journey: Guinean Student’s Epic Bike Ride to Secure a Spot at a Top Islamic University

    In a remarkable display of determination, Mamadou Safaiou Barry, a young Guinean student, embarked...

    12th Islamic World Ministers of Culture Conference Endorses Doha Declaration to Revitalize Cultural Endeavors

    Under the distinguished patronage of His Highness the Amir Sheikh Tamim bin Hamad al-Thani,...

    Agong Urges Muslims to Embrace Prophet Muhammad’s Virtues on Maulidur Rasul

    In a heartfelt address on Maulidur Rasul, Yang di-Pertuan Agong Al-Sultan Abdullah Ri’ayatuddin Al-Mustafa...

    Assessing Nehru’s Impact on the Plight of Indian Muslims

    Pratinav Anil's latest literary endeavor, "Another India: The Making of the World's Largest Muslim...

    President Wickremesinghe Encourages Unity Among Muslims to Address National Challenges

    In a special address commemorating Milad-un-Nabi, President Ranil Wickremesinghe has called upon the Muslim...

    Iran Expresses Outrage Over Holy Qur’an Desecration in Netherlands

    In an official statement released on Thursday, the spokesperson for Iran's Ministry of Foreign...

    India’s Treatment of Muslims: A Concerning Pattern of Alienation

    In his inaugural address to the United Nations General Assembly, Caretaker Prime Minister Anwarul...

    Explore More Articles

    Welcome to the enlightening realm of our Islamic Articles Page – a digital sanctuary where knowledge, spirituality, and the rich tapestry of Islamic culture converge. In an era where information flows ceaselessly and the world seems to spin faster each day, our platform stands as a steadfast beacon of wisdom and reflection.