Monday, August 15, 2011

 
Cyber recruits key part of NSA hiring blitz

August 15, 2011 - 6:58am

By Jack Moore
Federal News Radio

The National Security Agency is on a hiring blitz. The cryptologic intelligence agency — home to the government's chief codemakers and breakers — announced its intention to hire as many as 3,000 people over the next two years, many of them cybersecurity experts.

In fact, NSA recruiters even took a trip to Las Vegas in the last few weeks to look for potential hires at DefCon, a high-profile hacker conference there.

Dickie George, the technical director of the Information Assurance Directorate at NSA, told the Federal Drive the agency is partnering with academia and industry to find the "best and brightest" in cybersecurity.

"We really need people who can solve hard problems," George said. "And network security is one of the hardest problems around."

However, the shortage of cyber pros doesn't only affect government, but also industry, he added.

"We need to develop the talent in this country to protect us from what's going on," he said. "And there's a lot going on." By joining forces with universities, he said, NSA and other government agencies hope to show a cyber career with the government can be an attractive option.

"There are great careers in this field," he said. "We want them to think about not being rocket scientists, but being cyber warriors, because that's what the country needs right now."

And the agency is looking in some unconventional places.

NSA raised some eyebrows when it was reported that the agency had visited the hacker convention, DefCon, in search of new cyber personnel.

"The community there is very vibrant; it's got a lot of talent," George explained. "Most of the people out there are doing the right things: They're trying to make products better, they're trying to improve the security of the Internet. And we need to work with those people ... We need to make sure they understand that we are the good guys."

But with many areas of the Defense Department preparing for flatter budgets and civilian hiring freezes already in the offing, NSA's robust hiring may be hard to account for.

But George characterized the current environment as a "cyber cold war," and said he's been given no indication to slow hiring.

"The importance of this mission and the importance to the nation of cybersecurity - it can't be understated," he said.

Today, the big value is intellectual property. "It's in the ideas," he added, in contrast to a bygone age where the value of industry was in large-scale manufacturing plants and material.

"This country is constantly being threatened by our adversaries," he said, which includes nation-states, terrorists and organized crime. "They're coming into this country and siphoning off our intellectual property. And that makes us really vulnerable."


Labels: , ,


Wednesday, July 27, 2011

 
NSA Admits It Tracks Americans Via Cell Phones

Surveillance has been going on for over a decade

Steve Watson & Paul Joseph Watson
Prisonplanet.com
July 25, 2011

NSA Admits It Tracks Americans Via Cell Phones 220411top2

The general counsel of the National Security Agency testified to a Senate hearing yesterday that he believes the agency has the authority to track Americans via cell phones.

“There are certain circumstances where that authority may exist,” said Matthew Olsen the current nominee to head up the National Counterterrorism Center.

Olsen made the comments to the Senate Select Committee on Intelligence as Sen. Ron Wyden (D., Ore.) repeatedly asked if the government has the authority to “use cell site data to track the location of Americans inside the country.”

Olsen added that the reason his answer was not definitive was that “it is a very complicated question”, assuring the committee that the NSA would provide more information in a future memo.

Sen. Wyden recently wrote (full letter below) to the Director of National Intelligence demanding to know whether the CIA and the NSA “have the authority to collect the geolocation information of American citizens for intelligence purposes.”

“If yes, please explain the specific statutory basis for this authority,” the letter, co signed by Sen. Mark Udall (D., Colo.) states.

The Senators also requested information on how many Americans have been monitored under authority granted by 2008 legislation amending the Foreign Intelligence Surveillance Act. “Have any apparently law-abiding Americans had their communications collected by the government?” the letter asks.

Two months ago Wyden expressed concern that the law relating to surveillance is unclear. “The law is being secretly interpreted by the executive branch” Wyden noted.

Along with Congressman Jason Chaffetz (R., Utah), Wyden has introduced a joint bill that would force any government agency to secure a search warrant and show probable cause before tracking the location of any American.

The issue of cell phone tracking blew up earlier this year when it was revealed that computer researchers discovered a hidden file that allows Apple to track the location of iPhone and iPad users. Google’s collection of location from cellphones has also been open to question.

As we have previously highlighted, however, since October 2001, the FCC has mandated that all wireless carriers track the location of their users down to within 50 feet.

Under the 1996 Telecommunications Act, the FCC mandated that by October 1, 2001 a quarter of all new cellphones be equipped with GPS functionality that would allow authorities to track the location of users. By the end of 2002, this became a mandatory requirement of allnew cellphones.

As Geek.com reported back in October 2001, “Because cellphone calls to 911 (estimated at around 140,000 per year) do not give the 911 operator location information, the FCC mandated that wireless companies “be able to locate 67 percent of callers to 911 within 50 meters that elect the handset solution while those using network technology must be able to locate the caller within 100 meters.” Wireless companies must also have one-quarter of the new cellphones they offer equipped to provide that location information by the end of the year, and all new cellphones so equipped by the end of next year.”

As a PC World article written in August 2001, two months before the first phase of the new FCC rules were enacted, asked, “The FCC requires cell phone companies to track you, in order to find you when you call 911–but what about your privacy?”

“Cell phone tracking was propelled by the Federal Communications Commission, which adopted enhanced 911 rules to cover wireless services. For E911′s first phase, cellular carriers must be able to pinpoint, to the nearest cell tower, the location of someone calling 911. For Phase II, carriers must be able to pinpoint a 911 caller’s location to within 50 to 300 meters,” states the article.

Your cellphone has been tracking you in real time for the lion’s share of the last decade, so why has it taken the media nearly 10 years to notice? Because in 2001, when such measures could have been made illegal, there was no iPhone, there was no app store, and the smart phones being used were extremely crude compared to today’s models, which are no less than mini-laptops.

In 2001, cellphones did little else than make calls and send text messages – these services didn’t require GPS technology. People weren’t addicted to their cellphones like they are today, they didn’t use them to catalogue, record and process every aspect of their existence.

The likes of Apple have worked hard over the last decade to make hundreds of millions of people dependent on their gadgets, creating an army of addicts who couldn’t care less that their cellphone is transmitting their every move directly to Steve Jobs. In their eyes, the choice between sacrificing their privacy and sacrificing their precious “apps” is an easy one to make. Privacy can’t book a table at a restaurant in a few taps of a finger, nor can it tell you the weather forecast or where the nearest ATM is located.

If the debate had been allowed to run its course in 2001, when cellphone tracking was first being adopted, the outcome may have been different. But since cellphone companies have been tracking their users for the best part of a decade, in line with government mandates, the recent controversy is merely part of the acclimatization process to achieve calm subservience and acceptance of the fact that true privacy is dead, and as Henry Blodget explains, Apple’s omnipresent brainwashing campaign has helped keep the outrage to a minimum.

Sen. Ron Wyden’s letter inquiring over tracking of Americans by federal intelligence agencies:

July 14, 2011

The Honorable James R. Clapper, Jr. Director of National Intelligence Washington, DC 20511

Dear Director Clapper:

In the coming months Congress is likely to consider various legislative initiatives that would modify different aspects of domestic surveillance law. We believe that the debate over these initiatives will be better informed if Congress and the public are provided with more unclassified information about how these initiatives will affect current intelligence authorities and activities.

The FISA Amendments Act of 2008 significantly modified the US government’s surveillance authorities with regard to individuals believed to be located outside the United States. These new authorities are currently scheduled to expire in late 2012, and Congress could begin considering possible extensions or revisions to these authorities later this year. Since any thorough consideration will require an understanding of how the FISA Amendments Act has been interpreted and implemented, we ask that you provide unclassified answers to the following questions:

• In a December 2007 Statement of Administration Policy on the FISA Amendments Act, the Office of Management and Budget said that it would “likely be impossible” to count the number of people located in the United States whose communications were reviewed by the government pursuant to the FISA Amendments Act. Is this still the case? If so, is it possible to estimate this number with any accuracy?

• Official documents released in 2010 noted that there have been multiple incidents in which intelligence agency personnel have failed to comply with the FISA Amendments Act, and that “Certain types of compliance incidents continue[d] to occur.” Please elaborate on these compliance incidents to the extent possible, and explain why you believe that they have continued to recur.

• Have any apparently law-abiding Americans had their communications collected by the government pursuant to the FISA Amendments Act?

• Are any significant interpretations of the FISA Amendments Act currently classified?

Turning to another area of surveillance law, recent advances in geolocation technology have made it increasingly easy to secretly track the movements and whereabouts of individual Americans on an ongoing, 24/7 basis. Law enforcement agencies have relied on a variety of different methods to conduct this sort of electronic surveillance, including the acquisition of cell phone mobility data from communications companies as well as the use of tracking devices covertly installed by the law enforcement agencies themselves.

Unfortunately, the law has not kept up with these advances in technology. As a result, courts in different jurisdictions have issued diverse, conflicting rulings about the evidence and procedures required for the government to surreptitiously track an individual’s movements using a mobile electronic device. Congress is now considering multiple legislative proposals that would attempt to establish clear rules for this sort of surveillance and will need to determine at some point whether it is necessary to update the laws that apply to intelligence investigations as well as the laws that apply to law enforcement investigations.

While there is a substantial amount of public information available regarding different interpretations of this area of the law (including the executive branch’s interpretation and the interpretations of various courts) all of these interpretations apply to law enforcement authorities, not intelligence authorities. Clearly Congress needs to also understand how intelligence authorities are being interpreted as it begins to consider legislation on this issue. For this reason, we request that you also provide unclassified answers to the following questions:

• Do government agencies have the authority to collect the geolocation information of American citizens for intelligence purposes?

• If yes, please explain the specific statutory basis for this authority. And to the extent that this statutory basis imposes any procedural requirements, such as judicial review or approval by particular officials, please describe these requirements.

• If no, please explain the statutory basis for this prohibition.

Thank you for your attention to this matter. We look forward to your prompt response.

Sincerely,

Ron Wyden Mark Udall United States Senator United States Senator

——————————————————————

Steve Watson is the London based writer and editor for Alex Jones’ Infowars.net, and Prisonplanet.com. He has a Masters Degree in International Relations from the School of Politics at The University of Nottingham in England.

Paul Joseph Watson is the editor and writer for Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a regular fill-in host for The Alex Jones Show.


Labels: , ,


Friday, June 17, 2011

 
NSA allies with Internet carriers to thwart cyber attacks against defense firms

Washington Post

The National Security Agency is working with Internet service providers to deploy a new generation of tools to scan e-mail and other digital traffic with the goal of thwarting cyberattacks against defense firms by foreign adversaries, senior defense and industry officials say.

The novel program, which began last month on a voluntary, trial basis, relies on sophisticated NSA data sets to identify malicious programs slipped into the vast stream of Internet data flowing to the nation’s largest defense firms. Such attacks, including one last month against Bethesda-based Lockheed Martin, are nearly constant as rival nations and terrorist groups seek access to U.S. military secrets...[Full Article]



Labels: ,


Thursday, January 6, 2011

 
Utah's $1.5 billion cyber-security center under way

DeseretNews.com

By Steve Fidel, Deseret News
Published: Thursday, Jan. 6, 2011 1:10 a.m. MST

CAMP WILLIAMS — Today's groundbreaking for a $1.5 billion National Security Administration data center is being billed as important in the short term for construction jobs and important in the long term for Utah's reputation as a technology center.

"This will bring 5,000 to 10,000 new jobs during its construction and development phase," Sen. Orrin Hatch, R-Utah, said on Wednesday. "Once completed, it will support 100 to 200 permanent high-paid employees."

Officially named the Utah Data Center, the facility's role in aggregating and verifying dizzying volumes of data for the intelligence community has already earned it the nickname "Spy Center." Its really long moniker is the Community Comprehensive National Cyber-security Initiative Data Center — the first in the nation's intelligence community.

A White House document identifies the Comprehensive National Cyber-security Initiative as addressing "one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter." The document details a number of technology-related countermeasures to the security threat.

Hatch said Utah was chosen for the project over 37 other locations. He characterized the cyber-security center as the "largest military construction project in recent memory."

Hatch said he promoted Utah's favorable energy costs, Internet infrastructure, thriving software industry and proximity to the Salt Lake City International Airport in the bid process that ended up with Camp Williams earning the data center.

The Army Corps of Engineers is overseeing the project that is under contract to a joint venture between Big-D Construction in Salt Lake City, U.K.-based Balfour Beatty Construction and DPR Construction out of California.

"This project is going to give an opportunity for an awful lot of Utahns" who have seen construction jobs in Utah drop from 100,000 in 2008 to about 66,000 today, said Rob Moore, president and COO of Big-D and chairman of the Associated General Contractors in Utah. "My subcontractors, suppliers and vendors are very appreciative of the work that will be available on this project."

Grading work is already under way for the complex, which is scheduled to include 100,000 square feet for the data center and 900,000 square feet for technical support and administrative space. The center is designed to be capable of generating all of its own power through backup electrical generators and will have both fuel and water storage. Construction is designed to achieve environmentally significant LEED Silver certification.

"It is so unique and so intensive," Hatch said. "This will establish our state as one of the leading states for technology."

Labels: , ,


Friday, October 29, 2010

 
Napolitano: Military to Aid Civilian Cybersecurity
Napolitano: Military agency will be able to help civilian cybersecurity

The Defense Department's supersecret National Security Agency can be used "appropriately" on civilian cybersecurity matters, Homeland Security Secretary Janet Napolitano said Thursday.

Napolitano said the an agreement between the military and Homeland Security, announced this month, takes privacy and civil liberties into account.

"We're not going to have two NSAs, we're going to have one NSA that can appropriately be used for defense purposes but also appropriately used for civilian purposes," Napolitano told National Symposium on Homeland Security and Defense.

"That means that we have to, on the civilian side, be particularly cognizant of privacy issues, of civil liberties issues, and we have built that into the memorandum" laying out the arrangement, she said.

The agreement allows Homeland Security to tap into NSA expertise on cybersecurity issues. Napolitano said her department and the military are responsible for 95 to 99 percent of the federal jurisdiction for cybersecurity, so a partnership was logical and necessary to make the most of both departments' resources and expertise...

[Full Article]

Labels: , , , , , ,


Wednesday, October 13, 2010

 
Invasive Cyber Technologies and Internet Privacy: Big Brother is only a "Ping" or Mouse Click Away

As they walked along the busy, yellow-lit tiers of offices, Anderton said: "You're acquainted with the theory of precrime, of course. I presume we can take that for granted."-- Philip K. Dick, The Minority Report

What do Google, the CIA and a host of so-called "predictive behavior" start-ups have in common?

They're interested in you, or more specifically, whether your online interests--from Facebook to Twitter posts, and from Flickr photos to YouTube and blog entries--can be exploited by powerful computer algorithms and subsequently transformed into "actionable intelligence."

And whether the knowledge gleaned from an IP address is geared towards selling useless junk or entering a name into a law enforcement database matters not a whit. It's all "just data" and "buzz" goes the mantra, along what little is left of our privacy and our rights.

Increasingly, secret state agencies ranging from the CIA to the National Security Agency are pouring millions of dollars into data-mining firms which claim they have a handle on who you are or what you might do in the future.

And to top it off, the latest trend in weeding-out dissenters and nonconformists from the social landscape will soon be invading a workplace near you; in fact, it already has.

Welcome to the sinister world of "Precrime" where capitalist grifters, drug- and torture-tainted spy shops are all laboring mightily to stamp out every last vestige of free thought here in the heimat...


[Full Article]

Labels: , , , , , , , ,


Sunday, October 3, 2010

 

Israeli "Art Students" Asking Questions About NSA Data Center in Utah

Door-to-door spies in Utah County?

SARATOGA SPRINGS, Utah (ABC 4 News) - Sales people working neighborhoods in Northern Utah County have been asking some odd questions that have nothing to do with making the sale. Folks are reporting that they're asking about the new National Security Agency's data center that is being built at Camp Williams.

The sales people say they're Israeli art students and are selling their works to raise money for a gallery. Some have even produced what appear to be legitimate Israeli passports.

So, why would art students be interested in an NSA data center?...

[Full Article]





Utah residents fear ‘Israeli art students’ prying into NSA data center

A local ABC affiliate in Salt Lake City, Utah has caused a stir online with a report suggesting that self-proclaimed Israeli art students, peddling their artwork from door to door, have been asking disturbing questions about plans to build an NSA data center in the area.

"These salespeople say they're Israeli students," ABC4 reporter Brent Hunsaker explained. "They even produce Israeli passports. They say they're selling their own artwork to raise money to open a gallery. So why would the Israeli art students want to know about the National Security Agency?"

According to Hunsaker, warnings about the students are being spread through blogs and church bulletins. One bulletin sent out to Mormon women even claimed that "federal law enforcement groups are actually investigating their ties to organized crime and terrorist groups."

There may, however, be less to the story than meets the eye.

The basis for the suspicions goes back to 2002, when a lengthy article at Salon described how Drug Enforcement Agency field offices were reporting that "young Israelis claiming to be art students and offering artwork for sale had been attempting to penetrate DEA offices for over a year. The Israelis had also attempted to penetrate the offices of other law enforcement and Department of Defense agencies."...

[Full Article]

[Webmaster - This was the same "modus operandi" that occurred immediately before 9/11 happened.]

Labels: , , ,


Friday, July 30, 2010

 
NSA Project To Bring Thousands To Fort Meade

A draft environmental impact statement said that a project by the National Security Agency will bring 6,500 workers to the Fort Meade area, challenging the area's infrastructure.

The NSA statement said the planned expansion will cost at least $2 billion.

The project, called Site M, will include a 1.8 million-square-foot building on land at Fort Meade that is currently used by two golf courses.

While local officials said they are excited about the job growth and benefits to the local economy, they are also worried whether the county can accommodate the growth.

Roads, schools and other infrastructure could become congested, and Anne Arundel County officials said it does not have money for major projects.

Labels: , ,


Wednesday, July 14, 2010

 
Hacking the Electric Grid? You and What Army?

Grid-hacking is back in the news, with the unveiling of “Perfect Citizen,” the National Security Agency’s creepily named effort to protect the networks of electrical companies and nuclear power plants.

People have claimed in the past to be able to turn off the internet, there are reports of foreign penetrations into government systems, “proof” of foreign interest in attacking U.S. critical infrastructure based on studies, and concerns about adversary capabilities based on allegations of successful critical infrastructure attacks. Which begs the question: If it’s so easy to turn off the lights using your laptop, how come it doesn’t happen more often?

The fact of the matter is that it isn’t easy to do any of these things. Your average power grid or drinking-water system isn’t analogous to a PC or even to a corporate network. The complexity of such systems, and the use of proprietary operating systems and applications that are not readily available for study by your average hacker, make the development of exploits for any uncovered vulnerabilities much more difficult than using Metasploit.

To start, these systems are rarely connected directly to the public internet. And that makes gaining access to grid-controlling networks a challenge for all but the most dedicated, motivated and skilled — nation-states, in other words.

Let’s pretend for a moment that hackers were planning to attack the United States. What would they need to do to gather enough information necessary to take out the electrical power in key parts of the country? They don’t want to fiddle at the edges, mind you. They want to have enough data to build the technical capability necessary to shut out the lights in Washington or New York or California at precisely the time and for exactly the duration they want.

For starters, they would need to know things like: Where are the power plants? What kind of plants are they? What sort of fuel do they use? Who built them and when? What sort of materials and technology were used when they were built? Who manufactured the generators, turbines and other key equipment? Whose SCADA software are they running? Who runs the plants? How does fuel, people, supplies get into or out of the plant? What sort of security do they have? And perhaps most importantly: Which plants supply power to which parts of the country?

Where to begin? Even in places like the United States, where there isn’t much you cannot find online, you’re not going to be able to get the depth and detail you need to turn off the lights with a simple network connection. You’re going to have to deploy national-level resources:...

[Full Article]

Labels: , , ,


Saturday, July 10, 2010

 
NSA Denies It Will Spy on Utilities

The NSA is denying a report from the Wall Street Journal that a secret program code-named “Perfect Citizen” will be monitoring civilian networks.

That’s from a rare public statement by the ultra-secret agency responsible for spying on outsiders and defending classified networks. The NSA, as a wing of the military, is largely prohibited from operating within the U.S.

The Journal reported Wednesday that defense contractor Raytheon won a $100 million contract that would involve sensors in the networks of “critical infrastructure” such as utilities and nuclear power plants. The sensors would report anomalies to the NSA via a partnership with Homeland Security, the Journal reported. According to an e-mail cited in the report, a Raytheon employee described it as a “Big Brother” system.

Our take on the original report is here...

[Full Article]

Labels: , , ,


Friday, March 5, 2010

 
Details Of "Einstein" Cyber Shield Disclosed By White House

The Obama administration lifted the veil Tuesday on a highly-secretive set of policies to defend the U.S. from cyber attacks.

It was an open secret that the National Security Agency was bolstering a Homeland Security program to detect and respond to cyber attacks on government systems, but a summary of that program declassified Tuesday provides more details of NSA’s role in a Homeland program known as Einstein.

The current version of the program is widely seen as providing meager protection against attack, but a new version being built will be more robust–largely because it’s rooted in NSA technology. The program is designed to look for indicators of cyber attacks by digging into all Internet communications, including the contents of emails, according to the declassified summary...

Labels: , , , , , , ,


 
Feds Weigh Expansion Of Internet Monitoring

SAN FRANCISCO--Homeland Security and the National Security Agency may be taking a closer look at Internet communications in the future.

The Department of Homeland Security's top cybersecurity official told CNET on Wednesday that the department may eventually extend its Einstein technology, which is designed to detect and prevent electronic attacks, to networks operated by the private sector. The technology was created for federal networks...

Labels: , , , , , , , ,


Sunday, February 21, 2010

 

PAST ARTICLES: Alphabet Agencies On The Move

CIA Plans To Shift Work To Denver

Domestic Division Would Be Moved


The CIA has plans to relocate the headquarters of its domestic division, which is responsible for operations and recruitment in the United States, from the CIA's Langley headquarters to Denver, a move designed to promote innovation, according to U.S. intelligence and law enforcement officials...

...The main function of the domestic division, which has stations in many major U.S. cities, is to conduct voluntary debriefings of U.S. citizens who travel overseas for work or to visit relatives, and to recruit foreign students, diplomats and businesspeople to become CIA assets when they return to their countries. It was unclear how many CIA employees would relocate to Denver under the plan.

Although collecting information on U.S. citizens under suspicion for terrorist links is primarily an FBI function, the CIA may also collect information on citizens under limited circumstances, according to a 1981 executive order. The exact guidelines for those operations are spelled out in a classified document signed by the CIA director and approved by the attorney general...

...Colorado has become a major intelligence hub since Sept. 11, 2001.

The Denver suburb of Aurora is home to the little-known Aerospace Data Facility. Located inside Buckley Air Force Base, it has become the major U.S.-based technical downlink for intelligence satellites operated by the military, the National Security Agency and the National Reconnaissance Office, according to military and government documents obtained by William Arkin, author of "Code Names," a book about secret military plans and programs.

About 70 miles away, the U.S. Northern Command, based at Peterson Air Force Base, in Colorado Springs, is tasked with homeland defense and has been increasing its domestic intelligence work...

------------------------------------------------------------------------------------------------------------

Spies Like Us: NSA To Build Huge Facility In Utah

Hoping to protect its top-secret operations by decentralizing its massive computer hubs, the National Security Agency will build a 1-million-square-foot data center at Utah's Camp Williams...

...The NSA bills itself as the home of America's codemakers and codebreakers, but the Department of Defense agency is perhaps better known for its signals intelligence program, which is reported to have the capacity to tap into a significant amount of the world's communications. The agency also has been the subject of significant criticism by civil libertarians, who have accused it of unwarranted monitoring of the communications of U.S. citizens.

The NSA's heavily automated computerized operations have for years been based at Fort Meade, Maryland, but the agency began looking to decentralize its efforts following the terrorist attacks of Sept. 11, 2001...

Labels: , , , , , , ,


Thursday, February 18, 2010

 
Google's Reported Link To National Security Agency Alarms Privacy Watchdogs

After Chinese hackers tore Google a new cyberhole in December, the tech titan reportedly looked to an unlikely source for help: the ultra-secretive National Security Agency, better known for tapping phones than patching security holes for private companies.

The connection has raised the antennae of Internet privacy experts, who now are warning of the possible risks posed by the close and as-yet undefined ties between the world's top cybersurveillance agency and a corporate behemoth that has amassed more sensitive data about its users than most personal diaries...

Labels: , , , ,


Wednesday, February 10, 2010

 
Google Links Up With US Spy-Master to Thwart to Cyberspace

Google is teaming up with the US National Security Agency to battle cyber-attacks from China in a move that is causing disquiet on the internet.

The alliance of the world’s largest internet search company and the world’s most powerful electronic surveillance agency has provoked concern among privacy advocates. The non-profit Electronic Privacy Information Centre filed a Freedom of Information Act request seeking more details yesterday hours after the deal was disclosed by The Washington Post...

Labels: , ,


Thursday, February 4, 2010

 
Google to Enlist NSA to Help it Ward Off Cyberattacks

The world's largest Internet search company and the world's most powerful electronic surveillance organization are teaming up in the name of cybersecurity.

Under an agreement that is still being finalized, the National Security Agency would help Google analyze a major corporate espionage attack that the firm said originated in China and targeted its computer networks, according to cybersecurity experts familiar with the matter. The objective is to better defend Google -- and its users -- from future attack.

Google and the NSA declined to comment on the partnership. But sources with knowledge of the arrangement, speaking on the condition of anonymity, said the alliance is being designed to allow the two organizations to share critical information without violating Google's policies or laws that protect the privacy of Americans' online communications. The sources said the deal does not mean the NSA will be viewing users' searches or e-mail accounts or that Google will be sharing proprietary data...

Labels: , ,


This page is powered by Blogger. Isn't yours?

Subscribe to Posts [Atom]