美国太尴尬:"棱镜门"曝美入侵中国网络长达15年(图)

严肃点儿!看看老美怎么评论的:

Tomahawk1775 4 days ago
John McCain IS a Proven Traitor! He IS the Only P.O.W. to come home from the Vietnam War weighing twenty pounds heavier than when he arrived! Bomb Hong Kong? This idiot must be off his medication! He IS asking for a straight up War with China if America were to do something this stupid!


:dx::dx::dx:

Returned from a war twenty pounds heavier...holly s...now I believe he said those crap.
 
我经常说帝国主义忘我之心不死, 你信过吗?

我覺得美國人還信帝國主義的已經很少了。傻瓜倒很多。
傻瓜自己嚇自己,仗著手長,到處打擊想像出來的敵人。

中國信帝國主義的卻很多。很危險呢。
 
谁都有个"棱镜门"吧:oops:
谁的"棱镜门"里出叛徒,谁倒霉~~:(:D
 
我覺得美國人還信帝國主義的已經很少了。傻瓜倒很多。
傻瓜自己嚇自己,仗著手長,到處打擊想像出來的敵人。

中國信帝國主義的卻很多。很危險呢。


美国人民跟美国政府的区别很大,美国人民中傻瓜是很多, 但是美国政府非常精明。
 
这个好玩儿:
John McCain Calls For Invasion of Hong Kong
In an interview with BBC World News...

如果是真的,还能有更弱智的人了吗!
 
中国亡国指日可待啊,海外的带路党们何不跟着你们的主子打回老家去?
 
中国亡国指日可待啊,海外的带路党们何不跟着你们的主子打回老家去?

无非是一些借64留在国外的,炼大法的,偷渡找理由当难民的,这些人成不了气候.徒增财政负担罢了.这些人在国内早已为人唾弃,更不敢回国兴风作浪.
 
美国人民跟美国政府的区别很大,美国人民中傻瓜是很多, 但是美国政府非常精明。

哪国不是这样,都是精英分子执政。
gcd够精明了,十几亿人,世界最牛经济体。
伟光正的ccp万岁
 


U.S. Agencies Said to Swap Data With Thousands of Firms
http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html
By Michael Riley - Jun 15, 2013 12:01 AM ET

Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said.

These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency. The role of private companies has come under intense scrutiny since his disclosure this month that the NSA is collecting millions of U.S. residents’ telephone records and the computer communications of foreigners from Google Inc (GOOG). and other Internet companies under court order.

Many of these same Internet and telecommunications companies voluntarily provide U.S. intelligence organizations with additional data, such as equipment specifications, that don’t involve private communications of their customers, the four people said.

Makers of hardware and software, banks, Internet security providers, satellite telecommunications companies and many other companies also participate in the government programs. In some cases, the information gathered may be used not just to defend the nation but to help infiltrate computers of its adversaries.

Along with the NSA, the Central Intelligence Agency (0112917D), the Federal Bureau of Investigation and branches of the U.S. military have agreements with such companies to gather data that might seem innocuous but could be highly useful in the hands of U.S. intelligence or cyber warfare units, according to the people, who have either worked for the government or are in companies that have these accords.

Microsoft Bugs

Microsoft Corp. (MSFT), the world’s largest software company, provides intelligence agencies with information about bugs in its popular software before it publicly releases a fix, according to two people familiar with the process. That information can be used to protect government computers and to access the computers of terrorists or military foes.

Redmond, Washington-based Microsoft (MSFT) and other software or Internet security companies have been aware that this type of early alert allowed the U.S. to exploit vulnerabilities in software sold to foreign governments, according to two U.S. officials. Microsoft doesn’t ask and can’t be told how the government uses such tip-offs, said the officials, who asked not to be identified because the matter is confidential.

Frank Shaw, a spokesman for Microsoft, said those releases occur in cooperation with multiple agencies and are designed to give government “an early start” on risk assessment and mitigation.
In an e-mailed statement, Shaw said there are “several programs” through which such information is passed to the government, and named two which are public, run by Microsoft and for defensive purposes.

Willing Cooperation

Some U.S. telecommunications companies willingly provide intelligence agencies with access to facilities and data offshore that would require a judge’s order if it were done in the U.S., one of the four people said.

In these cases, no oversight is necessary under the Foreign Intelligence Surveillance Act, and companies are providing the information voluntarily.

The extensive cooperation between commercial companies and intelligence agencies is legal and reaches deeply into many aspects of everyday life, though little of it is scrutinized by more than a small number of lawyers, company leaders and spies. Company executives are motivated by a desire to help the national defense as well as to help their own companies, said the people, who are familiar with the agreements.

Most of the arrangements are so sensitive that only a handful of people in a company know of them, and they are sometimes brokered directly between chief executive officers and the heads of the U.S.’s major spy agencies, the people familiar with those programs said.

‘Thank Them’

Michael Hayden, who formerly directed the National Security Agency and the CIA, described the attention paid to important company partners: “If I were the director and had a relationship with a company who was doing things that were not just directed by law but were also valuable to the defense of the Republic, I would go out of my way to thank them and give them a sense as to why this is necessary and useful.”

“You would keep it closely held within the company and there would be very few cleared individuals,” Hayden said.

Cooperation between nine U.S. Internet companies and the NSA’s Special Source Operations unit came to light along with a secret program called Prism. According to a slide deck provided by Snowden, the program gathers e-mails, videos, and other private data of foreign surveillance targets through arrangements that vary by company, overseen by a secret panel of judges.

U.S. intelligence agencies have grown far more dependent on such arrangements as the flow of much of the world’s information has grown exponentially through switches, cables and other network equipment maintained by U.S. companies.

Equipment Specs

In addition to private communications, information about equipment specifications and data needed for the Internet to work -- much of which isn’t subject to oversight because it doesn’t involve private communications -- is valuable to intelligence, U.S. law-enforcement officials and the military.

Typically, a key executive at a company and a small number of technical people cooperate with different agencies and sometimes multiple units within an agency, according to the four people who described the arrangements.

Committing Officer

If necessary, a company executive, known as a “committing officer,” is given documents that guarantee immunity from civil actions resulting from the transfer of data. The companies are provided with regular updates, which may include the broad parameters of how that information is used.

Intel Corp. (INTC)’s McAfee unit, which makes Internet security software, regularly cooperates with the NSA, FBI and the CIA, for example, and is a valuable partner because of its broad view of malicious Internet traffic, including espionage operations by foreign powers, according to one of the four people, who is familiar with the arrangement.

Such a relationship would start with an approach to McAfee’s chief executive, who would then clear specific individuals to work with investigators or provide the requested data, the person said. The public would be surprised at how much help the government seeks, the person said.

McAfee firewalls collect information on hackers who use legitimate servers to do their work, and the company data can be used to pinpoint where attacks begin. The company also has knowledge of the architecture of information networks worldwide, which may be useful to spy agencies who tap into them, the person said.

McAfee’s Data

McAfee (MFE)’s data and analysis doesn’t include information on individuals, said Michael Fey, the company’s worldwide chief technology officer.

“We do not share any type of personal information with our government agency partners,” Fey said in an e-mailed statement. “McAfee’s function is to provide security technology, education, and threat intelligence to governments. This threat intelligence includes trending data on emerging new threats, cyber-attack patterns and vector activity, as well as analysis on the integrity of software, system vulnerabilities, and hacker group activity.”

In exchange, leaders of companies are showered with attention and information by the agencies to help maintain the relationship, the person said.

In other cases, companies are given quick warnings about threats that could affect their bottom line, including serious Internet attacks and who is behind them.

China’s Military

Following an attack on his company by Chinese hackers in 2010, Sergey Brin, Google’s co-founder, was provided with highly sensitive government intelligence linking the attack to a specific unit of the People’s Liberation Army, China’s military, according to one of the people, who is familiar with the government’s investigation. Brin was given a temporary classified clearance to sit in on the briefing, the person said.

According to information provided by Snowden, Google, owner of the world’s most popular search engine, had at that point been a Prism participant for more than a year.

Google CEO Larry Page said in a blog posting June 7 that he hadn’t heard of a program called Prism until after Snowden’s disclosures and that the Mountain View, California-based company didn’t allow the U.S. government direct access to its servers or some back-door to its data centers. He said Google provides user data to governments “only in accordance with the law.”

Leslie Miller, a spokeswoman for Google, didn’t provide an immediate response June 13.

The information provided by Snowden also exposed a secret NSA program known as Blarney. As the program was described in the Washington Post (WPO), the agency gathers metadata on computers and devices that are used to send e-mails or browse the Internet through principal data routes, known as a backbone.

Metadata

That metadata includes which version of the operating system, browser and Java software are being used on millions of devices around the world, information that U.S. spy agencies could use to infiltrate those computers or phones and spy on their users.

“It’s highly offensive information,” said Glenn Chisholm, the former chief information officer for Telstra Corp (TLS)., one of Australia’s largest telecommunications companies, contrasting it to defensive information used to protect computers rather than infiltrate them.

According to Snowden’s information, Blarney’s purpose is “to gain access and exploit foreign intelligence,” the Post said.

It’s unclear whether U.S. Internet service providers gave information to the NSA as part of Blarney, and if so, whether the transfer of that data required a judge’s order.

Less Scrutiny

Stewart Baker, former general counsel for the NSA, said if metadata involved communications between two foreign computers that just happened to be crossing a U.S. fiber optic cable “then the likelihood is it would demand less legal scrutiny than when communications are being extracted one by one.”

Lawmakers who oversee U.S. intelligence agencies may not understand the significance of some of the metadata being collected, said Jacob Olcott, a former cybersecurity assistant for Senator John D. Rockefeller IV of West Virginia, the Democratic chairman of the Senate Commerce Committee.

“That’s what makes this issue of oversight so challenging,” said Olcott, now a principal at Good Harbor Security Risk Management in Washington. “You have a situation where the technology and technical policy is far outpacing the background and expertise of most elected members of Congress or their staffs.”

While companies are offered powerful inducements to cooperate with U.S. intelligence, many executives are motivated by patriotism or a sense they are defending national security, the people familiar with the trusted partner programs said.

Einstein 3

U.S telecommunications, Internet, power companies and others provide U.S. intelligence agencies with details of their systems’ architecture or equipment schematics so the agencies can analyze potential vulnerabilities.

“It’s natural behavior for governments to want to know about the country’s critical infrastructure,” said Chisholm, chief security officer at Irvine, California-based Cylance Inc.

Even strictly defensive systems can have unintended consequences for privacy. Einstein 3, a costly program originally developed by the NSA, is meant to protect government systems from hackers. The program, which has been made public and is being installed, will closely analyze the billions of e-mails sent to government computers every year to see if they contain spy tools or malicious software.

Einstein 3 could also expose the private content of the e-mails under certain circumstances, according to a person familiar with the system, who asked not to be named because he wasn’t authorized to discuss the matter.

AT&T, Verizon

Before they agreed to install the system on their networks, some of the five major Internet companies -- AT&T Inc. (T), Verizon Communications Inc (VZ)., Sprint Nextel Corp. (S), Level 3 Communications Inc (LVLT). and CenturyLink Inc (CTL). -- asked for guarantees that they wouldn’t be held liable under U.S. wiretap laws. Those companies that asked received a letter signed by the U.S. attorney general indicating such exposure didn’t meet the legal definition of a wiretap and granting them immunity from civil lawsuits, the person said.

Mark Siegel, a spokesman for Dallas-based AT&T, the nation’s biggest phone carrier, declined to comment. Edward McFadden, a spokesman for New York-based Verizon, the second-largest phone company, declined to comment.

Scott Sloat, a spokesman for Overland Park, Kansas-based Sprint, and Monica Martinez, a spokeswoman for Broomfield, Colorado-based Level 3, didn’t immediately respond to requests for comment.

Linda Johnson, a spokeswoman for Centurylink, formerly Qwest Corp., said her Monroe, Louisiana-based company participates in the Enhanced Cybersecurity Services program and the Intrusion Prevention Security Services program, which includes Einstein 3. Both programs are managed by the U.S. Department of Homeland Security.

Beyond that, she said, “CenturyLink does not comment on matters pertaining to national security.”

To contact the reporter on this story: Michael Riley in Washington at michaelriley@bloomberg.net
 
香港多个团体和政党声援斯诺登

2013-06-16 07:21 凤凰卫视
4c3a67866ab3d6cb0a4e0577ea6770df.jpg
图为香港民众示威游行,声援斯诺登
6bdabd1a2b92d2ec6cf673a141d294e6.jpg
星期六,香港有多个团体和政党游行至美国领事馆及政府总部,声援揭露美国政府监控丑闻的前中情局雇员斯诺登。香港特区行政长官梁振英也发表声明,表示当相关机制启动后,特区政府将按香港的法律和既定程序处理。

超过20个香港民间团体星期六下午首先在遮打花园集会,谴责美国侵犯市民权利与私隐,呼吁港府与市民一起保护斯诺登。这次发起游行的团体包括不同的政党、教育界及劳工组织,也有不少外籍人士参与游行。有英国人认为,斯诺登牺牲个人自由,揭露真相,是勇敢的行为。也有香港市民认为,虽然暂时未能证实斯诺登指控是否属实,但在厘清事实之前,特区政府不应该考虑引度斯诺登返回美国。

队伍从遮打花园出发, 游行到美国驻港领事馆和政府总部。由于斯诺登早前爆料,香港也是美国监控的目标之一,入侵次数数以百计。有到场支持的立法会议员就要求美方应销毁获取的电脑资料。

香港特区行政长官梁振英首次发表声明回应斯诺登事件。梁振英表示,当相关机制启动后,特区政府将按香港的法律和既定程序处理斯诺登事件。同时,特区政府也会跟进任何香港机构或香港人的隐私或其他权利被侵犯的事件。
 
比起那个要占领香港的议员,这个温和一点:

美国前副总统:斯诺登是卖国贼 可能是中国间谍
http://www.creaders.net 2013-06-16 10:56:50 多维

美国前副总统切尼16日在接受采访时,批评了奥巴马的反恐言论,为国安局监察项目辩护,并对斯诺登泄密一事口诛笔伐。

  美国前副总统切尼(Dick Cheney)6月16日在“福克斯周日新闻”早间节目中为美国的监控项目做出狡辩称,“这一间谍项目已经挽救了美国人民的性命,使我们免收袭击”。

  切尼离任后很少接受媒体采访,一旦接受采访,他往往直言不讳地就很多议题畅所欲言。

  1 切尼借机勐攻奥巴马

  切尼在节目中直言不讳地批评奥巴马“反恐战接近尾声”的言论,认为奥巴马应该更为积极地维护为那些间谍项目。切尼提到了基地组织附属分支的不断壮大以及其他恐怖组织在北非的活动,称反恐战仍在进行中。他说:“他(奥巴马)错了,这还没有收尾,重要的一点是,美国总统应该说,‘这是一个不错的项目,可以挽救美国人的性命,我支持它’”。

  切尼还旁敲侧击地就其他议题指责奥巴马。他说:“问题是这个家伙(奥巴马)在班加西事件和国税局丑闻中并不直率,也并没有诚意和可信度”。

  2 斯诺登是卖国贼 可能是中国间谍

  切尼在节目中还批评斯诺登(Edward Snowden)为卖国贼。他还认为斯诺登有可能是中国的间谍。斯诺登泄密后逃往香港,显然是要向中共泄露更透的情报。“我很怀疑他是中国的间谍,因为如果你对自由充满向往的话,你是不会选择去中国的。所以问题就出来了,泄密之前,他是否就和中共串通一气了呢。”切尼还担心斯诺登还有更多的信息没有向外界发布,而中共为了获悉这些情报,很有可能会为其提供庇护。

  斯诺登12日接受《南华早报》采访时披露,美国政府网络入侵中国与香港的网络至少有四年时间,黑客通常是入侵巨型的路由器,从而一举入侵成千上万的电脑。这一爆料让白宫十分尴尬,在新闻简报会上不予回应。

  “军情六处”(MI6)前情报官邓恩(Matthew Dunn)日前在美国《赫芬顿邮报》撰文称,鉴于在美国对中国“网络攻击”的大肆抨击,中国决意以其人之道还治其人之身,让美国人自己揭掉美国政府那张虚伪的面纱,披露美国情报部门对本国公民的监听行为。斯诺登可能早就被中国情报部门盯上,因为他对美国政府不满,而且还有金钱上的需求,因此一拍两合,中方用现金收买了斯诺登。交易条件是由他揭露美国国安局的“棱镜”(PRISM)项目。而作为回报,他将能在中国过上舒适的生活。

  美国联邦调查局局长米勒13日在国会听证会上表示,斯诺登向媒体曝光“棱镜”这项事关国家安全的秘密计划,完全触犯了美国法律,严重危害到国家安全,他们已经展开对斯诺登的刑事审查。这是美国官方首次证实已对斯诺登采取行动。

  3.美国情报部分为自己开脱

  此外,切尼还为监控项目进行了辩护,称如果美国此前就对电话、邮件等进行监控,“9·11”事件或可避免。“这一间谍项目已经挽救了美国人民的性命,使我们免收袭击”。奥巴马和切尼都以“出于国家安全之需要”为国家安全局监控项目狡辩。但是,切尼则直言不讳地批评奥巴马“反恐战接近尾声”的言论,认为奥巴马应该更为积极地维护为那些间谍项目。切尼提到了基地组织附属分支的不断壮大以及其他恐怖组织在北非的活动,称反恐战仍在进行中。他说:“他(奥巴马)错了,这还没有收尾,重要的一点是,美国总统应该说,‘这是一个不错的项目,可以挽救美国人的性命,我支持它’”。

  美国情报官员们15日在新近解密的信息中也表示,美国国家安全部门(NSA)的监控项目所搜集的电话和邮件记录帮助美政府挫败了许多潜在的恐怖阴谋。

  美国联邦调查局(FBI)局长米勒(Robert Miller)日前也表示,近日遭曝光的“棱镜”等电话和互联网秘密监控项目,在搜集反恐情报方面发挥了作用。假如此类监控项目在“9·11”恐怖袭击前就存在的话,甚至有可能协助挫败这一恐怖阴谋。 (古 月 编译)

http://news.creaders.net/headline/newsViewer.php?id=1271686
 
“军情六处”(MI6)前情报官邓恩(Matthew Dunn)日前在美国《赫芬顿邮报》撰文称,鉴于在美国对中国“网络攻击”的大肆抨击,中国决意以其人之道还治其人之身,让美国人自己揭掉美国政府那张虚伪的面纱,披露美国情报部门对本国公民的监听行为。斯诺登 可能 早就被中国情报部门盯上,因为他对美国政府不满,而且还有金钱上的需求,因此一拍两合,中方用现金收买了斯诺登。交易条件是由他揭露美国国安局的“棱镜”(PRISM)项目。而作为回报,他将能在中国过上舒适的生活。
光是 可能 就做一篇文章, 這水準太差了.
 
后退
顶部