How Much Would You Pay Google & Microsoft For Your Privacy?



Orig.src.Susanne.Posel.Daily.News- seguranca-internetSusanne Posel
Occupy Corporatism
November 29, 2013

 

 

Revelations provided by whistleblower Edward Snowden have prompted Microsoft, Google and Yahoo to announce they will install “harder-to-crack code to protect their networks and data.”

After revelations leaked by Snowden, National Security Agency (NSA) whistleblower, the idea is forming that free services are the problem and having user’s pay for Facebook, Google and other popular websites and search engines across the web would add protection to users from the evils of being spied on.

Unauthorized access to networks by the NSA has inspired measures to protect “against snooping by governments.”

By using fiber-optic cables to connect to data centers, the NSA this backdoor spying proved to be easy . The simple reason being that these cables are not “owned by the internet companies [and] are easily targets for interception.”

Media reports allege that the NSA was employing corporations such as Level 3, Verizon Communications, the BT Group and Vodafone Group.

Rebecca MacKinnon, senior fellow for the New America Foundation (NAF) warned : “The potential fallout is pretty huge given how much our economy depends on the information economy for its growth. It’s increasingly where the U.S. advantage lies.”

Because of the NSA program, Cisco announced customer confidence has fallen, resulting in drops in sales . International markets have also suffered due to the invasion of privacy “causing people to stop and then rethink decisions.”

Snowden provided documents concerning a program to discredit “suspected Muslim radicals” with General Keith Alexander, director of the NSA, as the mastermind behind the operation.

Encroaching on “private behavior” included:
• Viewing sexually explicit material online
• Using sexually explicit persuasive language when communicating with inexperienced young girls
• Misusing money from donations

The documents state : “Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers.”

The rational was that they could “undermine a target’s credibility, reputation and authority” by exposing their vulnerabilities “in the area of authority when their private and public behaviors are not consistent,” the document argues.”

The label of suspected terrorist affords the Department of Justice (DoJ), the Drug Enforcement Administration (DEA) and the NSA to use “all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence.”

Without proof that those targeted were actually involved in terrorist plots, the suspects were monitored for the attempts to “radicalize people” through social media, Facebook and YouTube.

The intention , according to the NSA, of the “radicalizers” was to “include individuals who do not yet hold extremist views bit who are susceptible to the extremist message.”


Universal Rhodium | Agents Wanted Today

Source Article from http://feedproxy.google.com/~r/OccupyCorporatism/~3/ok8vgrfYRr0/

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes