<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VR World &#187; NSA</title>
	<atom:link href="http://www.vrworld.com/tag/nsa/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.vrworld.com</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2015 04:26:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>John Oliver Grills Edward Snowden on &#8216;Last Week Tonight&#8217;</title>
		<link>http://www.vrworld.com/2015/04/06/john-oliver-grills-edward-snowden-on-last-week-tonight/</link>
		<comments>http://www.vrworld.com/2015/04/06/john-oliver-grills-edward-snowden-on-last-week-tonight/#comments</comments>
		<pubDate>Mon, 06 Apr 2015 14:59:59 +0000</pubDate>
		<dc:creator><![CDATA[Sam Reynolds]]></dc:creator>
				<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[Global Politics]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[John Oliver]]></category>
		<category><![CDATA[Last Week Tonight]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[NSA Leaks]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=51605</guid>
		<description><![CDATA[<p>The Oliver-Snowden interview is uncomfortable to watch, and good journalism. </p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/04/06/john-oliver-grills-edward-snowden-on-last-week-tonight/">John Oliver Grills Edward Snowden on &#8216;Last Week Tonight&#8217;</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="630" height="354" src="http://cdn.vrworld.com/wp-content/uploads/2015/04/johnoliver_hbo.jpg" class="attachment-post-thumbnail wp-post-image" alt="johnoliver_hbo" /></p><p>NSA whistleblower <a href="http://www.vrworld.com/tag/edward-snowden/">Edward Snowden</a> is no stranger to the press. He’s appeared in dozens of interviews with major media outlets as well as an Oscar nominated documentary called <a href="http://www.vrworld.com/2015/02/23/edward-snowden-documentary-citizenfour-nabs-oscar-doc/"><i>Citizen Four</i></a><i>.</i></p>
<p>But HBO funnyman <a href="http://www.hbo.com/last-week-tonight-with-john-oliver#/">John Oliver</a> provided what is no doubt the toughest interview yet for Snowden. Granted there was plenty of light banter, such as if the NSA can intercept your “dick picks”, but there were a number of sharp, pointed questions on whether Snowden’s mass disclosure of documents was well-warranted whistleblowing or reckless behavior.</p>
<h2>John Oliver &#8211; Edward Snowden interview</h2>
<p><iframe src="https://www.youtube.com/embed/XEVlyP4_11M" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<p><strong><strong> </strong></strong></p>
<p>“How many of those documents have you actually read?” Oliver asked.</p>
<p>“I’ve evaluated all the documents that are in the archive,” Snowden responded.</p>
<p>Pressed he elaborated further: “I do understand what I turned over.”</p>
<p>But for Oliver that wasn’t good enough.</p>
<p>“There’s a difference between <i>understanding</i> what’s in the documents and <i>reading</i> what’s in the documents. Because when you’re handing over thousands of NSA documents the last thing you’d want to do is <i>read </i>them,” Oliver said. “So <i>The New York Times</i> took a slide, didn’t redact it properly, and in the end it was possible for people to see that something was being used in Mosul on al Qaeda.”</p>
<p>“That is a problem,” Snowden replied.</p>
<p>“Well, that’s a <i>fuckup</i>,” said Oliver.</p>
<p>The interview is hard hitting and well worth the watch. Check it out in the video embedded above.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/04/06/john-oliver-grills-edward-snowden-on-last-week-tonight/">John Oliver Grills Edward Snowden on &#8216;Last Week Tonight&#8217;</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/04/06/john-oliver-grills-edward-snowden-on-last-week-tonight/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Is the Newest U.S Cybersecurity Agency Necessary?</title>
		<link>http://www.vrworld.com/2015/03/01/newest-u-s-cybersecurity-agency-necessary/</link>
		<comments>http://www.vrworld.com/2015/03/01/newest-u-s-cybersecurity-agency-necessary/#comments</comments>
		<pubDate>Sun, 01 Mar 2015 12:02:36 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Shutt]]></dc:creator>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Global Politics]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[CTIIC]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Obama]]></category>
		<category><![CDATA[U.S]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=48092</guid>
		<description><![CDATA[<p>The US has created another cybersecurity agency to deal with incoming threats. Is it really necessary?</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/03/01/newest-u-s-cybersecurity-agency-necessary/">Is the Newest U.S Cybersecurity Agency Necessary?</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="2800" height="1867" src="http://cdn.vrworld.com/wp-content/uploads/2015/03/Arg.jpg" class="attachment-post-thumbnail wp-post-image" alt="Obama speaks at  the National Cybersecurity and Communications Integration Center in Arlington, Va (AP Photo/Evan Vucci)" /></p><p>The last two years have been rife with reasons to be concerned about national cyber security in the United States: From Edward Snowden&#8217;s leaks regarding NSA domestic and international surveillance, to the allegedly North Korean attack on Sony Pictures, to a <a href="http://www.slate.com/blogs/future_tense/2014/10/29/an_unclassified_white_house_network_was_hacked_perhaps_by_the_russian_government.html">recent Russian attack on a White House network</a>, to the GAO&#8217;s &#8220;high-risk&#8221; listing on the terrible gaps in U.S cybersecurity. It should therefore come as no surprise that we find the U.S government flailing to haphazardly establish various and poorly connected initiatives in a desperate attempt to stay above water in a brave new world.</p>
<p>The latest step in these efforts is the establishment of the Cyber Threat Intelligence Integration Center. During a keynote at the Wilson Center in Washington D.C, assistant to the president for homeland security and counterterrorism Lisa Monaco said: &#8220;Currently, no single government entity is responsible for producing coordinated cyber threat assessments, ensuring that information is shared rapidly among existing cyber centers &#8230; and supporting the work of operators and policymakers with timely intelligence about the latest cyber threats and threat actors. The CTIIC is intended to fill these gaps.&#8221;</p>
<p>The &#8220;gaps&#8221; to which Monaco refers are really tremendous chasms between U.S agencies like the FBI, CIA and NSA which traditionally don&#8217;t like talking to one another. In the golden age of espionage, this could be a good thing that aided national security. But in the information age, more information is better, and sharing is the only way to improve national safety.</p>
<p>With an increasingly large number of organizations dedicated to handling the daunting task of keeping the United States safe from outside attacks, it is all the more paramount that they communicate with one another and stay organized and transparent.</p>
<p>&#8220;In the cyber context, we need to share threat information more broadly and to coordinate our actions so that we are all working to achieve the same goal,&#8221; said Monaco.</p>
<h2>Just another agency</h2>
<p>But not everyone is convinced that the CTIIC is necessary, or that it will really accomplish its stated purpose. One new member in a sea of acronyms, the CTIIC is considered extraneous by some, or a potential excuse for the government to collate and collect private information: not worth the $35 million it will cost to establish.</p>
<div id="attachment_48102" style="width: 610px" class="wp-caption alignnone"><a href="http://cdn.vrworld.com/wp-content/uploads/2015/03/FDR-New-Deal.jpg" rel="lightbox-0"><img class="wp-image-48102 size-medium" src="http://cdn.vrworld.com/wp-content/uploads/2015/03/FDR-New-Deal-600x504.jpg" alt="FDR New Deal" width="600" height="504" /></a><p class="wp-caption-text">A huge influx of governemnt programs to fix a national crisis is an American tradition</p></div>
<p>&nbsp;</p>
<p>Greg Nojeim of the Center for Democracy and Technology is one such skeptic, and has been quoted as saying: &#8220;Given the number of other agencies that have cybersecurity threat integration responsibilities, it’s not clear that a new agency is needed.&#8221;</p>
<p>Speaking with <em><a href="http://www.theguardian.com/world/2015/feb/10/obama-cyber-threat-agency-privacy">The Guardian</a> </em>Norjem added, &#8220;We are keen to hear from the White House about the measures it will impose to ensure that this new agency operates transparently, with effective independent oversight, and does not become a repository for personal information unnecessary to counter cyber threats.&#8221;</p>
<p>What&#8217;s more, the CTIIC follows a familiar template, and is modeled after the National Counterterrorism Center which deals with terrorist threats at home and abroad.  The U.S government understands terrorism, and knows all too well how to fight it, and thinks that the same methods will help it to manage a cybersecurity crisis.</p>
<p>But the facts show this strategy is failing miserably. The CTIIC is not the first effort the U.S government has made in the last few years to improve public IT, as the government has already spent billions of dollars to manage the digital frontier &#8211; the Pentagon itself spends $5 billion every year on cybersecurity. And <a href="http://www.gao.gov/products/GAO-15-290">according to this month&#8217;s GAO report</a>, national cybersecurity is still plagued by terrible problems, and words like &#8220;inadequate&#8221;, &#8220;inconsistent&#8221; and &#8220;partial&#8221; were used to describe the government&#8217;s efforts. Since 2006, the number of information security incidents reported by federal agencies to the US-CERT <a href="http://www.gao.gov/highrisk/protecting_the_federal_government_information_systems/why_did_study">have increased by 1,121%</a></p>
<p>.<img class="alignnone size-full wp-image-48101" src="http://cdn.vrworld.com/wp-content/uploads/2015/03/CERT.jpg" alt="CERT" width="484" height="328" /></p>
<p>Cyber threats and terrorism are apples and oranges: both fruits, but of completely different kinds. The U.S government is trying to manage a 21st century problem with 20th century solutions, <a href="http://www.nytimes.com/2015/02/27/technology/net-neutrality-fcc-vote-internet-utility.html">much as the FCC has done by trying to regulate the Internet as utility</a>. Leading technology companies are feeling the brunt of these moves, and<a href="http://publicpolicy.verizon.com/blog/entry/fccs-throwback-thursday-move-imposes-1930s-rules-on-the-internet"> Verizon released a satirical statement in morse code regarding the FCC&#8217;s new rules</a> to emphasize the inadequacy of outdated methods where new problems are concerned.</p>
<p>So is the CTIIC good or necessary? Perhaps, with proper oversight, it could marginally improve the existing nature of U.S cybersecurity. But perhaps the time has come to stop thinking of ways we can glue the old system together, and come up with something better suited for the decidedly unique threats of the modern world.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/03/01/newest-u-s-cybersecurity-agency-necessary/">Is the Newest U.S Cybersecurity Agency Necessary?</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/03/01/newest-u-s-cybersecurity-agency-necessary/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Edward Snowden Documentary ‘CitizenFour’ Nabs Oscar Doc</title>
		<link>http://www.vrworld.com/2015/02/23/edward-snowden-documentary-citizenfour-nabs-oscar-doc/</link>
		<comments>http://www.vrworld.com/2015/02/23/edward-snowden-documentary-citizenfour-nabs-oscar-doc/#comments</comments>
		<pubDate>Mon, 23 Feb 2015 12:28:38 +0000</pubDate>
		<dc:creator><![CDATA[Sam Reynolds]]></dc:creator>
				<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[Global Politics]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Oscars 2015]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=47685</guid>
		<description><![CDATA[<p>Documentary profiling NSA whistleblower grabs an Oscar, with Snowden calling it a “brave and brilliant” film. </p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/23/edward-snowden-documentary-citizenfour-nabs-oscar-doc/">Edward Snowden Documentary ‘CitizenFour’ Nabs Oscar Doc</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="634" height="898" src="http://cdn.vrworld.com/wp-content/uploads/2015/02/25EEB1E800000578-2964821-Edward_Snowden_congratulated_director_Laura_Poitras_after_her_fi-a-94_1424675889781.jpg" class="attachment-post-thumbnail wp-post-image" alt="25EEB1E800000578-2964821-Edward_Snowden_congratulated_director_Laura_Poitras_after_her_fi-a-94_1424675889781" /></p><p><i>CitizenFour</i>, a documentary on Edward Snowden and the surveillance state by filmmaker Laura Poitras, took home the top Oscar for documentary features Sunday night with Lindsay Mills, Snowden’s girlfriend, accepting the Oscar on stage with Poitras and journalist Glenn Greenwald.</p>
<p>“The disclosures that Edward Snowden revealed don’t only expose a threat to our privacy but to our democracy itself,” Poitras said in her acceptance speech. “Thank you to Edward Snowden for his courage and for the many other whistleblowers.”</p>
<p>The bulk of <i>CitizenFour </i>is from footage Poitras shot over the course of eight days in Hong Kong, where Snowden first hid after making contact with Poitras and Greenwald. Once Snowden was offered political asylum in Russia, Poitras travelled there to interview him on his life after he revealed himself to the public.</p>
<p>Snowden sent his best wishes to Poitras for the Oscar win in a statement via the American Civil Liberties Union.</p>
<p>“When Laura Poitras asked me if she could film our encounters, I was extremely reluctant. I’m grateful that I allowed her to persuade me,” Snowden said in the statement. “The result is a brave and brilliant film that deserves the honor and recognition it has received. My hope is that this award will encourage more people to see the film and be inspired by its message that ordinary citizens, working together, can change the world.”</p>
<p>Poitras earned two previous Oscar nominations for her Iraq war documentary <i>My Country, My Country</i>, released in 2006, and 2010’s <i>The Oath, </i>about prisoners in Guantánamo Bay.</p>
<p><strong></p>
<p></strong></p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/23/edward-snowden-documentary-citizenfour-nabs-oscar-doc/">Edward Snowden Documentary ‘CitizenFour’ Nabs Oscar Doc</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/02/23/edward-snowden-documentary-citizenfour-nabs-oscar-doc/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Security Researcher Claims iOS Devices Have a Backdoor</title>
		<link>http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/</link>
		<comments>http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/#comments</comments>
		<pubDate>Wed, 23 Jul 2014 19:29:35 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Rumors]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[com.apple.mobile.pcapd]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Firmware]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[Jonathan Zdziarski]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Secure]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Vulnerability]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=36690</guid>
		<description><![CDATA[<p>A security researcher is claiming to have found a set of services in iOS that appear to be a firmware-level backdoor in iOS devices. What&#8217;s ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/">Security Researcher Claims iOS Devices Have a Backdoor</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="960" height="960" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/AppleLogo1.jpg" class="attachment-post-thumbnail wp-post-image" alt="Apple Logo iMessage iWatch Backdoor" /></p><p>A <a href="http://www.zdziarski.com/blog/?p=3441" target="_blank">security researcher is claiming to have found</a> a set of services in iOS that appear to be a firmware-level backdoor in iOS devices. What&#8217;s more interesting is that Apple has, in a very non-Apple manner, responded to his claims by <a href="https://support.apple.com/kb/HT6331?viewlocale=en_US&amp;locale=en_US" target="_blank">posting a support page about it</a>. He claims that these are confirmations of the backdoors that he found in iOS and that Apple claims to use them for diagnostic and enterprise purposes. These backdoors can only be accessed by Apple (or anyone that has access to Apple&#8217;s services) so they&#8217;re mostly secure backdoors, but they are backdoors nonetheless. Most consumers are completely and wholly unaware that alternative pathways into their devices exist and can be exploited by ANYONE (in this case Apple) other than themselves. This is also why remote bricking and other &#8216;security&#8217; features being pushed through legislatures are also a problem, but at least we&#8217;re aware of their existence unlike these services on iOS.</p>
<p>The services in question, om.apple.mobile.pcapd, com.apple.mobile.file_relay, com.apple.mobile.house_arrest among others have been addressed in <a href="https://support.apple.com/kb/HT6331?viewlocale=en_US&amp;locale=en_US" target="_blank">Apple&#8217;s knowledge base article</a>. Apple does not directly address <a href="https://twitter.com/JZdziarski" target="_blank">Jonathan Zdziarski&#8217;</a>s claims but instead tries to illuminate their use of these services and what they&#8217;re supposed to be used for. Apple claims that some of these services are used for diagnostic purposes internally as well as for iTunes and Apple Care support. However, the fact that these supposed backdoor services exist without users&#8217; or developers&#8217; knowledge is a bit worrisome.</p>
<p>The real truth here is that no matter what happens, or is really happening, customers should be aware of how intrusive some of these services are or can be. Sure, some of them are limited in scope in terms of what they can access, but even so, Apple should notify customers when they use such services or sign up for the operating system that there are services running on their devices that give Apple access to their device. Backdoor systems are not a joke and some of them are open invitations to hackers to try to hack into a backdoor and use it for their own purposes. Backdoors are inherently insecure and consumers should be made aware of them, malicious or not.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/">Security Researcher Claims iOS Devices Have a Backdoor</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Which Americans The NSA Spies On</title>
		<link>http://www.vrworld.com/2014/07/09/americans-nsa-spies/</link>
		<comments>http://www.vrworld.com/2014/07/09/americans-nsa-spies/#comments</comments>
		<pubDate>Wed, 09 Jul 2014 14:42:57 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Agha Saeed]]></category>
		<category><![CDATA[Asim Ghafoor]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Faisal Gill]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[FISA]]></category>
		<category><![CDATA[FISA Recap]]></category>
		<category><![CDATA[FISC]]></category>
		<category><![CDATA[Glenn Greenwald]]></category>
		<category><![CDATA[Hooshang Amirahmadi]]></category>
		<category><![CDATA[Nihad Awad]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Spying]]></category>
		<category><![CDATA[The Intercept]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=36393</guid>
		<description><![CDATA[<p>The Intercept is reporting that the NSA is unsurprisingly spying on countless American citizens without there being any reasonable justification for doing so. This is ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/09/americans-nsa-spies/">Which Americans The NSA Spies On</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="650" height="637" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/NSA-Logo1.jpeg" class="attachment-post-thumbnail wp-post-image" alt="NSA Logo" /></p><p>The Intercept <a href="https://firstlook.org/theintercept/article/2014/07/09/under-surveillance/" target="_blank">is reporting</a> that the NSA is unsurprisingly spying on countless American citizens without there being any reasonable justification for doing so. This is being reported based on the documents that Edward Snowden gave Glenn Greenwald including a &#8220;FISA recap&#8221; spreadsheet that details thousands of email addresses being monitored. Out of those email accounts being monitored, 202 addresses were marked as US persons, while 1,782 were marked as non-US persons and 5,501 were marked as unknown or simply left blank. The Intercept identified five Americans on the list from their email addresses and helped build the story that we&#8217;re reporting on today.</p>
<p>The NSA is monitoring the emails (and likely more) of multiple Muslim-Americans even though they have never had any ties to any terrorist groups or anti-American sentiment. There was, however, one lawyer involved in the spying on Americans who represented clients in terrorism cases, but that is <em>merely</em> a breach of due process. A breach where the NSA could pass on confidential information to the prosecution and help create a case where there is none. Obviously, such lawyers would probably suspect that they&#8217;re already being watched, but not by the NSA. Even so, he is one of five Americans basically put on a &#8216;watch list&#8217; for who they are and what they do, not a justification for being spied on as an American.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2014/07/NSASpying1.jpg" rel="lightbox-0"><img class="aligncenter size-full wp-image-36400" src="http://cdn.vrworld.com/wp-content/uploads/2014/07/NSASpying1.jpg" alt="NSASpying" width="1968" height="560" /></a></p>
<p>The five Americans that are being spied on were discovered in Edward Snowden&#8217;s leaked NSA documents. These five men, that are Americans, Faisal Gill, Asim Ghafoor, Hooshang Amirahmadi, Agha Saeed and Nihad Awad are all obviously people that could easily be considered Muslim Americans. But the fact is that with the exception of Asim Ghafoor, none of these men have ANY remote ties with terrorists in any way, shape, or form. In fact, Asim Ghafoor only does because its part of his job as a lawyer to represent them, which is still an American thing to do in order to ensure due process.</p>
<p>&nbsp;</p>
<div id="attachment_36399" style="width: 2560px" class="wp-caption aligncenter"><a href="http://cdn.vrworld.com/wp-content/uploads/2014/07/FISA-Recap1.jpg" rel="lightbox-1"><img class="size-full wp-image-36399" src="http://cdn.vrworld.com/wp-content/uploads/2014/07/FISA-Recap1.jpg" alt="FISA Recap" width="2550" height="1083" /></a><p class="wp-caption-text">FISA Recap Spreadsheet</p></div>
<p>These men&#8217;s email addresses were found in a FISA recap spreadsheet which basically broke down who was and wasn&#8217;t being spied on and whether or not their account owners were American, non-American or unknown. Unfortunately for all of us Americans, it doesn&#8217;t really seem to make much of a difference whether or not people are American if the NSA really wants to spy on them. Because the truth is that the FISA courts are basically granting the NSA any and all permissions that they need to &#8216;do their job&#8217;. In the 35 years that the FISA court (FISC) has been in existence, the court has approved 35,434 government requests for surveillance, while rejecting only 12. Giving you merely a small idea of how strictly these requests are really being &#8216;judged&#8217;.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2014/07/HooshangAmirahmadi1.jpg" rel="lightbox-2"><img class="aligncenter size-full wp-image-36394" src="http://cdn.vrworld.com/wp-content/uploads/2014/07/HooshangAmirahmadi1.jpg" alt="HooshangAmirahmadi" width="2583" height="518" /></a></p>
<p>What&#8217;s worse is that some of these men have grown up and served their country, like Faisal Gill, who has served in the military and worked for the White House under President George W. Bush. In fact, he was a staunch supporter of the Republican party and their ideals. He also did lots of work under the Department of Homeland security and after he was done working there, the NSA spied on him, while George W. Bush was still president. In fact, after he left the Department of Homeland security, where he had very high level security clearance, the spying on him began.</p>
<p>&nbsp;</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2014/07/FaisalGill1.jpg" rel="lightbox-3"><img class="aligncenter size-full wp-image-36398" src="http://cdn.vrworld.com/wp-content/uploads/2014/07/FaisalGill1.jpg" alt="FaisalGill" width="2593" height="436" /></a></p>
<p>The Intercept interviewed some of these men to talk about the spying and their experiences, and there are some really powerful words being said, especially towards the end.</p>
<p>The problem with all of this is that our government, The NSA, the FBI and the FISA courts that enable them are really toeing a very dangerous line. If it is okay to spy on American citizens with basically no supporting evidence (as it appears that these men were) then what prevents the NSA, CIA, FBI and other government agencies from monitoring everything we do, waiting until we trip up?</p>
<p>Just because these men are Muslim-Americans should not mean that they are suddenly dangerous to Americans and our freedom. In fact, singling them out because of what religion they are might be one of the most grave transgressions the NSA has committed so far. We already know that the NSA is spying on people that use Tor, so who&#8217;s next? Tor Users, American Muslims&#8230; Communists? Chinese-American Immigrants? Mexican-Americans? Where does it end?</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/09/americans-nsa-spies/">Which Americans The NSA Spies On</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/07/09/americans-nsa-spies/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>The NSA Gathers 90% Irrelevant Data</title>
		<link>http://www.vrworld.com/2014/07/08/nsa-gathers-90-irrelevant-data/</link>
		<comments>http://www.vrworld.com/2014/07/08/nsa-gathers-90-irrelevant-data/#comments</comments>
		<pubDate>Tue, 08 Jul 2014 23:14:12 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Mobile Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Intercept]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Records]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Spying]]></category>
		<category><![CDATA[Washington Post]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=36381</guid>
		<description><![CDATA[<p>The Washington Post is reporting via documents obtained from Edward Snowden that the NSA is collection hundreds of thousands of records, upwards of 160,000 communications, ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/08/nsa-gathers-90-irrelevant-data/">The NSA Gathers 90% Irrelevant Data</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1200" height="698" src="http://cdn.vrworld.com/wp-content/uploads/2014/07/GreenpeaceSpying_12001.jpg" class="attachment-post-thumbnail wp-post-image" alt="NSA Spying" /></p><p>The Washington Post <a href="http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-are/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html" target="_blank">is reporting</a> via documents obtained from Edward Snowden that the NSA is collection hundreds of thousands of records, upwards of 160,000 communications, most of which are completely irrelevant to the target person or people. After spending four months analyzing the data which included 22,000 reports and 160,000 data intercepts, the Washington Post was able to discern that a whopping 89% of the total data collected was from non-targets or mere bystanders.</p>
<p>The records obtained by Edward Snowden and passed on to the Washington post spanned 4 years of records that started in 2009 and ended in 2012. Obviously, they are merely a sliver of what was actually collected, but gave a fairly good idea of what kind of net the NSA has been casting with their programs and how unabashedly they are collecting innocent people&#8217;s data.</p>
<div id="attachment_36384" style="width: 1666px" class="wp-caption aligncenter"><a href="http://cdn.vrworld.com/wp-content/uploads/2014/07/SnowdenCache1.jpg" rel="lightbox-0"><img class="size-full wp-image-36384" src="http://cdn.vrworld.com/wp-content/uploads/2014/07/SnowdenCache1.jpg" alt="NSA Snowden Cache" width="1656" height="1524" /></a><p class="wp-caption-text">Washington Post Diagram of Data Collection</p></div>
<p>The data above also shows a vast increase in spying on people as Obama took office, indicating that the NSA&#8217;s activities only increased under his presidency. This would make a lot of Obama&#8217;s own biggest supporters very worried as he was supposedly working to curtail such programs as a senator. Nonetheless, the Washington Post and Edward Snowden never disclosed that they had these reports and documents which detail the scope and detail of the NSA&#8217;s spying from 2009 to 2012.</p>
<p>Ultimately, these programs are a self-fullfilling prophecy where the government continues to spy on more and more people without any probable cause and doing so on such a scale that it becomes almost impossible to control. These programs, like many other government programs seek to enlarge themselves from year to year and in many cases result in larger and larger bureaucracies that seek to increase their own size regardless the cost. A good example of that is with the war on drugs, many agencies involved in such programs are become ever more militarized and as a result have stepped up the scale of the war on drugs which results in needing more funding to maintain competitiveness. The real truth is that the NSA spent $1.5 billion on a data center to warehouse all of the data they&#8217;re collecting on us and it won&#8217;t be the last either. If we continue to allow the NSA to spy with the use of FISA as a vehicle, they will only become more and more invasive and dangerous.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/08/nsa-gathers-90-irrelevant-data/">The NSA Gathers 90% Irrelevant Data</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/07/08/nsa-gathers-90-irrelevant-data/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>NSA Can Spy on Any Country Not in the &quot;Five Eyes&quot;</title>
		<link>http://www.vrworld.com/2014/07/01/nsa-can-spy-country-five-eyes/</link>
		<comments>http://www.vrworld.com/2014/07/01/nsa-can-spy-country-five-eyes/#comments</comments>
		<pubDate>Wed, 02 Jul 2014 01:07:07 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Five Eyes]]></category>
		<category><![CDATA[GCHQ]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[UK]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[USA]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=36310</guid>
		<description><![CDATA[<p>According to documents obtained by the Washington Post, the US court that oversees the FISA-based activities, also known as the FISA Court, has given the ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/01/nsa-can-spy-country-five-eyes/">NSA Can Spy on Any Country Not in the &quot;Five Eyes&quot;</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="650" height="637" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/NSA-Logo1.jpeg" class="attachment-post-thumbnail wp-post-image" alt="NSA Logo" /></p><p>According to documents obtained by the <a href="http://www.washingtonpost.com/world/national-security/court-gave-nsa-broad-leeway-in-surveillance-documents-show/2014/06/30/32b872ec-fae4-11e3-8176-f2c941cf35f1_story.html" target="_blank">Washington Post</a>, the US court that oversees the FISA-based activities, also known as the FISA Court, has given the NSA the ability to effectively spy on any country that isn&#8217;t part of the Five Eyes alliance. The countries included in the Five Eyes alliance are all English-speaking powers that are England or former English colonies. These include, The UK (who has GCHQ), Canada, Australia and New Zealand. The US is also part of the Five Eyes alliance, which is the fifth member of this English-speaking alliance. And due to agreements signed by these five countries, they have all agreed to not spy on each other. They also have various information sharing agreements among each other in order to cement these relationships legally.</p>
<p>What does this mean, exactly? It means that the NSA&#8217;s scope is virtually unlimited and incredibly broad and they realistically are not going to be able to filter out the citizens of 5 countries out of the hundreds they spy on every day. The court that granted the NSA these rights clearly did not give the NSA a tight enough scope within who and why they could spy. The NSA is merely spying for the sake of spying, meaning that they will continue to grow in size and scope until they have a definite mission. When a government-funded organization such as the NSA is allowed to spy as freely as they do, they&#8217;re effectively going to do everything within their power to increase their scope, which ultimately increases their power and even more importantly, their funding. After all, they did <a href="http://nsa.gov1.info/utah-data-center/" target="_blank">build a $1.5 billion facility in Utah</a> to warehouse all that unnecessary surveillance.</p>
<div id="attachment_36311" style="width: 1210px" class="wp-caption aligncenter"><a href="http://cdn.vrworld.com/wp-content/uploads/2014/07/GreenpeaceSpying_12001.jpg" rel="lightbox-0"><img class="wp-image-36311 size-full" src="http://cdn.vrworld.com/wp-content/uploads/2014/07/GreenpeaceSpying_12001.jpg" alt="Five Eyes" width="1200" height="698" /></a><p class="wp-caption-text">A coalition of grassroots groups from across the political spectrum joined forces to fly an airship over the NSA&#8217;s data center in Bluffdale, Utah on Friday, June 27, 2014, to protest the government&#8217;s illegal mass surveillance program. The environmental group Greenpeace flew its 135&#8242; long thermal airship over the data center carrying the message &#8220;NSA Illegal Spying Below&#8221;. Photo by Greenpeace</p></div>
<p>When you take into account that many of the countries in the Five Eyes alliance have already collaborated on multiple spying operations and shared that data, it comes as little surprise that the NSA is involved in such activities. These activities include the NSA cooperating with Canada to spy on diplomats and leaders in the <a href="http://www.theguardian.com/world/2013/nov/28/canada-nsa-spy-g8-g20-summits" target="_blank">G8 and G20 summits in Canada</a> and the <a href="http://www.theguardian.com/uk/2013/jun/16/gchq-intercepted-communications-g20-summits" target="_blank">GCHQ spying on the diplomats and leaders in London at a G20 summit as well</a>. Ultimately, even if we reduce the scope of what the NSA can do, they will merely work with their Five Eyes partners to achieve similar goals if necessary, which means that the courts (or congress) need to strictly set the goals of the NSA as opposed to the general goal of &#8216;national security&#8217; and &#8216;terrorism&#8217;.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/01/nsa-can-spy-country-five-eyes/">NSA Can Spy on Any Country Not in the &quot;Five Eyes&quot;</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/07/01/nsa-can-spy-country-five-eyes/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>German Government Ditches Verizon Amid NSA Fears</title>
		<link>http://www.vrworld.com/2014/06/26/german-government-ditches-verizon-amid-nsa-fears/</link>
		<comments>http://www.vrworld.com/2014/06/26/german-government-ditches-verizon-amid-nsa-fears/#comments</comments>
		<pubDate>Fri, 27 Jun 2014 00:47:40 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Der Spiegel]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[German Government]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Internet Service]]></category>
		<category><![CDATA[Internet Service Provider]]></category>
		<category><![CDATA[ISP]]></category>
		<category><![CDATA[ISPO]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Verizon]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=36257</guid>
		<description><![CDATA[<p>The German government has announced that they will be switching away from Verizon for internet services as an ISP for the German government. They noted ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/06/26/german-government-ditches-verizon-amid-nsa-fears/">German Government Ditches Verizon Amid NSA Fears</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1958" height="931" src="http://cdn.vrworld.com/wp-content/uploads/2014/06/Verizon1.jpg" class="attachment-post-thumbnail wp-post-image" alt="Verizon" /></p><p>The German <a href="https://www.bmi.bund.de/SharedDocs/Kurzmeldungen/DE/2014/06/bund-wechselt-netzbetreiber.html" target="_blank">government has announced</a> that they will be switching away from Verizon for internet services as an ISP for the German government. They noted that the reasons for this decision had to do with increased demands on the network and the prevalence of the NSA in Verizon&#8217;s business. Based on the translation that was available, it appears as though the German government is merely using this as an opportunity to switch internet services to a company that is German. Sure, the likelihood that their networks will get snooped on by the NSA will probably go down, or at least become more difficult.</p>
<p>However, usually, such moves are usually just being used by the companies not involved to gain an upper hand on their competition, which is in this case Verizon. While the German government hasn&#8217;t quite made it clear who they intend to replace Verizon with, it is quite clear that the NSA&#8217;s snooping and relationship with Verizon has made doing business in Germany difficult for Verizon. This will likely not be the end of such moves by European governments and I suspect there will be more companies that will lobby their governments to switch to local ISPs or technology companies in order to &#8216;better protect&#8217; themselves. While simultaneously taking an opportunity of bad PR on the part of American companies to snatch away their business.</p>
<p>According to <a href="http://time.com/2927561/germany-ends-verizon-contract-nsa-spying/" target="_blank">an AP report</a>, Verizon was unable to keep the contract (which they&#8217;ve held since 2010) due to the fact that they weren&#8217;t able to meet some core requirements of the German government put on the company, likely as a result of the NSA&#8217;s snooping revealed by Edward Snowden and publications like Der Spiegel. As a result of not meeting the German government&#8217;s demands on these requirements, Verizon is losing the contract in 2015 to another company, likely one based in Europe or even Germany.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/06/26/german-government-ditches-verizon-amid-nsa-fears/">German Government Ditches Verizon Amid NSA Fears</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/06/26/german-government-ditches-verizon-amid-nsa-fears/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>The NSA Claims They Have No Control Over Their Systems</title>
		<link>http://www.vrworld.com/2014/06/11/nsa-claims-control-systems/</link>
		<comments>http://www.vrworld.com/2014/06/11/nsa-claims-control-systems/#comments</comments>
		<pubDate>Wed, 11 Jun 2014 11:54:18 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Court]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[EFF]]></category>
		<category><![CDATA[FISA]]></category>
		<category><![CDATA[FISA Court]]></category>
		<category><![CDATA[Foreign Intelligence Surveillance Act]]></category>
		<category><![CDATA[James Clapper]]></category>
		<category><![CDATA[Jeffrey S. White]]></category>
		<category><![CDATA[Jewel v NSA]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[US District]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=35751</guid>
		<description><![CDATA[<p>As a result of the Snowden revelations regarding the NSA&#8217;s spying on basically the whole world, some privacy advocates have filed lawsuits against the NSA in ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/06/11/nsa-claims-control-systems/">The NSA Claims They Have No Control Over Their Systems</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="650" height="637" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/NSA-Logo1.jpeg" class="attachment-post-thumbnail wp-post-image" alt="NSA Logo" /></p><p>As a result of the Snowden revelations regarding the NSA&#8217;s spying on basically the whole world, some privacy advocates have filed lawsuits against the NSA in US courts. Naturally, this results in the NSA having to gather evidence by subpoena to prove their side of the story. This is especially true when you consider that James Clapper, the Director of the NSA, lied to Congress about exactly what the NSA was and wasn&#8217;t doing. Yet, somehow the guy is still in power and has not faced any repercussions for his lies. As such, there are multiple lawsuits claiming that the NSA has overstepped the boundaries of what the law permits and require the NSA to provide evidence of this one way or another.</p>
<p>Now, according to the <a href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/06/09/nsa-our-systems-are-so-complex-we-cant-stop-them-from-deleting-data-wanted-for-lawsuit/" target="_blank">Washington Pos</a>t, the NSA claims that their systems are far too complex and as a result of that, they are unable to save evidence that is being required for them to hold by the court. This is because of court cases like Jewel v NSA and the EFF&#8217;s countless lawsuits against the NSA as well. In a hearing in the US District for California&#8217;s Northern District court, Judge Jeffrey S. White reversed an emergency order he had issued earlier the same week barring the government from destroying data that the EFF had asked be preserved for the case. The data is collected under Section 702 of the Amendments Act to the FISA (Foreign Intelligence Surveillance Act).</p>
<p>The NSA argued that it would be too much of a burden on them to hold the data. The NSA&#8217;s Deputy Director, Richard Ledgett, in a court filing stated, <em>&#8220;A requirement to preserve all data acquired under section 702 presents significant operational problems, only one of which is that the NSA may have to shut down all systems and databases that contain Section 702 information.&#8221;</em></p>
<p>He states that the complexity of the NSA&#8217;s systems means that preservation efforts might not work, but would have <em>&#8220;an immediate, specific, and harmful impact on the national security of the United States.&#8221;</em> After dropping that NSA standard tagline, which the department regularly uses to protect their programs, he stated that part of the complexity of these systems has to do with the privacy restrictions placed on the programs by the FISA court. Which, if their scope were not so wide, would be believable, but I have a feeling it has a lot more to do with the amount of data they collect and the amount of warehousing they have. I don&#8217;t think anyone honestly buys the fact that the NSA&#8217;s respecting our privacy is the reason why we can&#8217;t get evidence from automatically getting deleted. Plus, if they can&#8217;t back up what they&#8217;re doing in court with evidence, maybe they shouldn&#8217;t be doing it in the first place?</p>
<p>The amount of data the NSA goes through on a daily basis is probably nearing petabytes, if it isn&#8217;t petabytes of data. So, naturally, they would need to delete data they do not believe is relevant fairly quickly in order to be able to store the more important data for longer periods of time. After all, they don&#8217;t have millions of hard drives at their disposal to store everything they record, even if they wish they could. They probably do have close to that, though.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/06/11/nsa-claims-control-systems/">The NSA Claims They Have No Control Over Their Systems</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/06/11/nsa-claims-control-systems/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Glenn Greenwald Will Publish List of Americans Spied on by NSA</title>
		<link>http://www.vrworld.com/2014/05/28/glenn-greenwald-will-publish-list-americans-spied-nsa/</link>
		<comments>http://www.vrworld.com/2014/05/28/glenn-greenwald-will-publish-list-americans-spied-nsa/#comments</comments>
		<pubDate>Wed, 28 May 2014 19:17:04 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Americans]]></category>
		<category><![CDATA[Brian Williams]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Glenn Greenwald]]></category>
		<category><![CDATA[NBC]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[The Intercept]]></category>
		<category><![CDATA[USA Freedom Act]]></category>
		<category><![CDATA[Wikileaks]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=35399</guid>
		<description><![CDATA[<p>As we come closer and closer to Edward Snowden&#8217;s interview tonight with none other than Brian Williams of NBC, Glenn Greenwald has said (while promoting ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/28/glenn-greenwald-will-publish-list-americans-spied-nsa/">Glenn Greenwald Will Publish List of Americans Spied on by NSA</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="650" height="637" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/NSA-Logo1.jpeg" class="attachment-post-thumbnail wp-post-image" alt="NSA Logo" /></p><p>As we come closer and closer to Edward Snowden&#8217;s interview tonight with none other than Brian Williams of NBC, Glenn Greenwald has said (while promoting his new book) that he <a href="http://www.washingtontimes.com/news/2014/may/26/glenn-greenwald-publish-list-us-citizens-nsa-spied/" target="_blank">will be publishing a list</a> of Americans (likely high profile individuals) that are being spied upon by the NSA. This list of NSA targets that are American citizens (something the NSA cannot really do without specific permission) will likely open up exactly who the NSA is spying on in terms of people inside the US. We will discover what kinds of groups they&#8217;re targeting and where those people come from as well, and it will likely make the NSA look a lot worse than they already do with the American public. After all, the people of Aghanistan and The Bahamas probably aren&#8217;t very happy with the NSA either once they found out that <a title="The NSA is Recording all Calls in Afghanistan, Says Wikileaks" href="http://www.brightsideofnews.com/2014/05/23/nsa-recording-calls-afghanistan-says-wikileaks/" target="_blank">all of their calls were being recorded by the NSA</a>.</p>
<p>Additionally, I have a very strong feeling that many of the Americans that the NSA is spying on are probably the very people that are cooperating with them, including the employees of 80-some companies that are cooperating with them, <a title="80 Tech Companies Cooperating with NSA, Claims Wikileaks" href="http://www.brightsideofnews.com/2014/05/14/80-tech-companies-cooperating-nsa-claims-wikileaks/" target="_blank">according to a recent Wikileaks disclosure</a>. Greenwald also said that the NSA&#8217;s data security isn&#8217;t necessarily the greatest when you consider that Edward Snowden had successfully stolen 1.7 million files from their systems and was not caught  during his entire process. This alone should be a grave worry of anyone that believes that the NSA should be allowed to capture and then warehouse billions of records across the world, including those of American citizens. Ultimately, the NSA should not be trusted to the degree that they are today and that there should be more oversight of the agency, more than the <a title="USA Freedom Act Passes House, Snowden Vindicated" href="http://www.brightsideofnews.com/2014/05/22/usa-freedom-act-passes-house-snowden-vindicated/">recently passed USA Freedom Act</a> which was gutted the day before it was passed in order to give the US security apparatus more freedoms than were originally intended in the bill.</p>
<p>Glenn Greenwald hasn&#8217;t given a specific date or time when he will release these names, but there&#8217;s a good chance he&#8217;ll do it after <a href="http://www.nbcumv.com/nbc-news-exclusive-edward-snowden-one-one-brian-williams-first-american-television-interview?division=1&amp;network=33130" target="_blank">Edward Snowden&#8217;s interview with Brian Williams</a> airs on NBC tonight. This will be the first interview that Edward Snowden has with any American network since his disclosures of NSA spying last year and will be aired at 10pm/9pm central on NBC. While we don&#8217;t know the details of that interview, we can assume that it&#8217;ll probably rehash a lot of things that have already been disclosed and won&#8217;t likely talk much about any new disclosures since Snowden has left many of those to be released by journalists. Although don&#8217;t forget, Brian Williams is a journalist and there&#8217;s a good chance we could hear something new during that interview, we simply don&#8217;t know what Snowden wants to say about the NSA directly to the American public.</p>
<p>Either way, this week sounds like it should pan out to be pretty interesting if both Snowden and Greenwald release new info.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/28/glenn-greenwald-will-publish-list-americans-spied-nsa/">Glenn Greenwald Will Publish List of Americans Spied on by NSA</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/05/28/glenn-greenwald-will-publish-list-americans-spied-nsa/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>The NSA is Recording all Calls in Afghanistan, Says Wikileaks</title>
		<link>http://www.vrworld.com/2014/05/23/nsa-recording-calls-afghanistan-says-wikileaks/</link>
		<comments>http://www.vrworld.com/2014/05/23/nsa-recording-calls-afghanistan-says-wikileaks/#comments</comments>
		<pubDate>Fri, 23 May 2014 23:24:22 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Mobile Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Bahamas]]></category>
		<category><![CDATA[Calls]]></category>
		<category><![CDATA[Collection]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Drone Strike]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Glenn Greenwald]]></category>
		<category><![CDATA[Kenya]]></category>
		<category><![CDATA[Killing]]></category>
		<category><![CDATA[Mass Collection]]></category>
		<category><![CDATA[Metadata]]></category>
		<category><![CDATA[Mexico]]></category>
		<category><![CDATA[Mystic]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[Recording]]></category>
		<category><![CDATA[The Intercept]]></category>
		<category><![CDATA[Wikileaks]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=35338</guid>
		<description><![CDATA[<p>According to the latest release by Wikileaks, the NSA is recording all calls coming in and out of Afghanistan. They reported this even though other ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/23/nsa-recording-calls-afghanistan-says-wikileaks/">The NSA is Recording all Calls in Afghanistan, Says Wikileaks</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1000" height="653" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/AfghanistanNSA1.jpg" class="attachment-post-thumbnail wp-post-image" alt="Afghanistan NSA" /></p><p>According to the latest release by Wikileaks, <a href="https://twitter.com/wikileaks/status/469755185276145664" target="_blank">the NSA is recording all calls coming in and out of Afghanistan</a>. They reported this even though other publications and journalists strictly opposed to releasing the name of Afghanistan in their disclosures that the NSA was recording all calls in the Bahamas. Under a week ago, <a href="https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/" target="_blank">The Intercept</a> (Glenn Greenwald and co.) along with Wikileaks and a few other publications had disclosed that all cellular calls were being recorded by the NSA and that there was another country that had yet to be named that was getting a similar treatment. However, The Intercept refused to publish the name of the second country for fear that it would cause actual and gave harm to people&#8217;s lives if that country&#8217;s name were to be released.</p>
<p>However, Wikileaks did not agree with The Intercept and The Washington Post on the Afghanistan topic and <a href="https://twitter.com/wikileaks/status/468451149495148544" target="_blank">chastised them publicly on Twitter</a> for not wanting to disclose the name of the second target country, even though Wikileaks did not believe that the truth should be withheld or that knowing the truth would actually affect anyone&#8217;s lives or put anyone in danger. The Washington Post and The Intercept both chose to withhold the name of the second country but really, it seems quite pointless to have done so if Wikileaks was already going to release that information. Additionally, I don&#8217;t quite understand how The Intercept and The Washington Post necessarily rationalized that releasing Afghanistan&#8217;s name would somehow endanger lives. If anything, it would merely result in the US being pushed out of Afghanistan sooner rather than later, which is already an inevitability as it is already.</p>
<p>Not to mention, the Afghani people have the full right to know that the US is effectively spying on all of their cellular communications without their consent. They are already living with a heavy US military presence but in addition to that, everything they&#8217;re doing is effectively being monitored by the NSA and likely passed on to the military and CIA who are partaking in drone strikes. Overall, this information is certainly not surprising, but it is still quite worrying that the NSA is capable of spying on an entire country&#8217;s cellular communications and record every bit of it as well. Also don&#8217;t forget that the NSA is also collecting metadata on people in Mexico, Kenya and the Philippines as well. None of this is surprising, but the sad part is that the NSA is allowed to continue to violate people&#8217;s electronic privacy in the name of &#8216;national security&#8217;.</p>
<p>It will be interesting, however, to see how the US&#8217; dipolmatic relations and military engagements with the aforementioned countries will be as a result of this disclosure. No, I don&#8217;t think people&#8217;s lives are in danger, just the political climate is a bit more difficult than it was a few days ago.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/23/nsa-recording-calls-afghanistan-says-wikileaks/">The NSA is Recording all Calls in Afghanistan, Says Wikileaks</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/05/23/nsa-recording-calls-afghanistan-says-wikileaks/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>USA Freedom Act Passes House, Snowden Vindicated</title>
		<link>http://www.vrworld.com/2014/05/22/usa-freedom-act-passes-house-snowden-vindicated/</link>
		<comments>http://www.vrworld.com/2014/05/22/usa-freedom-act-passes-house-snowden-vindicated/#comments</comments>
		<pubDate>Fri, 23 May 2014 00:35:48 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Bill]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[H.R. 3361]]></category>
		<category><![CDATA[House of Representatives]]></category>
		<category><![CDATA[Jim Sensenbrenner]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Obama]]></category>
		<category><![CDATA[Pass]]></category>
		<category><![CDATA[Patriot Act]]></category>
		<category><![CDATA[Senate]]></category>
		<category><![CDATA[Sensenbrenner]]></category>
		<category><![CDATA[US House]]></category>
		<category><![CDATA[US Senate]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=35288</guid>
		<description><![CDATA[<p>So, remember when the US Government was painting Edward Snowden out as an evil guy and someone that was harming our country? Well, today&#8217;s vote ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/22/usa-freedom-act-passes-house-snowden-vindicated/">USA Freedom Act Passes House, Snowden Vindicated</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1000" height="1000" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/USHouseOfRep1.jpg" class="attachment-post-thumbnail wp-post-image" alt="USA Freedom Act" /></p><p>So, remember when the US Government was painting Edward Snowden out as an evil guy and someone that was harming our country? Well, today&#8217;s vote of the United States House of Representatives appears to suggest otherwise. Sure, the USA Freedom Act that was passed by the House today <a href="https://www.eff.org/deeplinks/2014/05/eff-dismayed-houses-gutted-usa-freedom-act" target="_blank">was a gutted and signifcantly weaker version of the bill that the EFF had originally backed</a>, but now at least we can agree that Snowden&#8217;s disclosures were without a doubt pivotal in passing this legislation. Sure, it still needs to go to the US Senate and be passed there and then passed by Obama himself, but judging by how gutted this version of the bill is, it will likely be seen as enough compromise by many of the opposing parties to get passed the whole way up through Obama.</p>
<p>The USA Freedom Act&#8217;s creator (and creator of the despicable Patriot Act) Congressman Jim Sensenbrenner of Wisconsin&#8217;s 5th district <a href="http://sensenbrenner.house.gov/legislation/theusafreedomact.htm" target="_blank">gave an extensive explanation</a> of what the USA Freedom Act was intended to do, based upon Snowden&#8217;s revelations of NSA activities. However, Snowden&#8217;s name is not mentioned ANYWHERE on Sensenbrenner&#8217;s site nor the US Congress&#8217; site even though without his leaks we would never know of these vast oversteppings of the NSA&#8217;s activities and therefore arrive at today&#8217;s bill. The USA Freedom Act should really be called shut down the NSA act, but the reality of the situation is that nobody in the US government want to be responsible for that or dealing with all of the military and political consequences of not having the NSA. The NSA gives the US an edge and they know it, but they need to make it appear that it isn&#8217;t violating the rights of its citizens at the same time. So, below you have HR 3361, or the political name, the USA Freedom Act.</p>
<p style="text-align: center;"><strong>H.R. 3361/ S. 1599</strong></p>
<address>Purpose: To rein in the dragnet collection of data by the National Security Agency (NSA) and other government agencies, increase transparency of the Foreign Intelligence Surveillance Court (FISC), provide businesses the ability to release information regarding FISA requests, and create an independent constitutional advocate to argue cases before the FISC.</address>
<address><strong>End bulk collection of Americans’ communications records</strong><br />
• The USA Freedom Act ends bulk collection under Section 215 of the Patriot Act.<br />
• The bill would strengthen the prohibition on &#8220;reverse targeting&#8221; of Americans—that is, targeting a foreigner with the goal of obtaining communications involving an American.<br />
• The bill requires the government to more aggressively filter and discard information about Americans accidentally collected through PRISM and related programs.</address>
<address><strong>Reform the Foreign Intelligence Surveillance Court</strong><br />
• The USA Freedom Act creates an Office of the Special Advocate (OSA) tasked with promoting privacy interests before the FISA court’s closed proceedings. The OSA will have the authority to appeal decisions of the FISA court.<br />
• The bill creates new and more robust reporting requirements to ensure that Congress is aware of actions by the FISC and intelligence community as a whole.<br />
• The bill would grant the Privacy and Civil Liberties Oversight Board subpoena authority to investigate issues related to privacy and national security.</address>
<address><strong>Increase Transparency</strong><br />
• The USA Freedom Act would end secret laws by requiring the Attorney General to publicly disclose all FISC decisions issued after July 10, 2003 that contain a significant construction or interpretation of law.<br />
• Under the bill, Internet and telecom companies would be allowed to publicly report an estimate of (1) the number of FISA orders and national security letters received, (2) the number of such orders and letters complied with, and (3) the number of users or accounts on whom information was demanded under the orders and letters.<br />
• The bill would require the government to make annual or semiannual public reports estimating the total number of individuals and U.S. persons that were subject to FISA orders authorizing electronic surveillance, pen/trap devices, and access to business records.</address>
<address><strong>National Security Letters</strong><br />
• The USA Freedom Act adopts a single standard for Section 215 and NSL protection to ensure the Administration doesn’t use different authorities to support bulk collection. It also adds a sunset date to NSLs requiring that Congress reauthorize the government’s authority thereby ensuring proper congressional review.</address>
<p>You can read the full text of the passed bill <a href="http://beta.congress.gov/bill/113th-congress/house-bill/3361" target="_blank">on the US Congress&#8217; website</a> which was passed 303-121 with 70 democrats and 50 republicans voting against. But ultimately, it doesn&#8217;t really matter who voted against it because it was already a fairly gutted version of the bill that was fairly weaker than had originally been intended. Sure, there&#8217;s always going to be give and take in politics, but there was a lot more give in this than anyone, including the EFF would have liked to see. Sure, the USA Freedom Act is a step in the right direction, but ultimately, the Patriot Act should have never been passed to begin with. Without the Patriot Act, many of the things that the NSA partook  (and probably continues to partake in) would be flat out illegal and have no legal framework protecting it.</p>
<p>Furthermore, we now have to pass a bill called the USA Freedom Act after we allowed something so horrendous as the Patriot Act to pass? We get our freedom after we go for our patriotism? I don&#8217;t know, but I think that a lot of people are not going to be happy with how far this bill has gone and the fact that it completely and wholly ignores why it was even created. And the fact that the Patriot Act&#8217;s creator is the one that wrote is both ironic and a sign of how awful the Patriot Act has become in terms of violating Americans&#8217; civil liberties that we supposedly cherish so greatly.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/22/usa-freedom-act-passes-house-snowden-vindicated/">USA Freedom Act Passes House, Snowden Vindicated</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/05/22/usa-freedom-act-passes-house-snowden-vindicated/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>80 Tech Companies Cooperating with NSA, Claims Wikileaks</title>
		<link>http://www.vrworld.com/2014/05/14/80-tech-companies-cooperating-nsa-claims-wikileaks/</link>
		<comments>http://www.vrworld.com/2014/05/14/80-tech-companies-cooperating-nsa-claims-wikileaks/#comments</comments>
		<pubDate>Wed, 14 May 2014 16:58:29 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Rumors]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[AT&T]]></category>
		<category><![CDATA[Centurylink]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[COMINT]]></category>
		<category><![CDATA[EDS]]></category>
		<category><![CDATA[HP]]></category>
		<category><![CDATA[IBM]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Motorola]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Oracle]]></category>
		<category><![CDATA[PRISM]]></category>
		<category><![CDATA[Qualcomm]]></category>
		<category><![CDATA[Qwest]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Strategic Partnerships]]></category>
		<category><![CDATA[Verizon]]></category>
		<category><![CDATA[Wiki leaks]]></category>
		<category><![CDATA[Wikileaks]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=35115</guid>
		<description><![CDATA[<p>Since we&#8217;ve had quite a bit of time between Snowden disclosures of NSA activities, it appears as though Wikileaks has gotten ahold of some secret ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/14/80-tech-companies-cooperating-nsa-claims-wikileaks/">80 Tech Companies Cooperating with NSA, Claims Wikileaks</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="646" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/Wikileaks1.jpg" class="attachment-post-thumbnail wp-post-image" alt="Wikileaks" /></p><p>Since we&#8217;ve had quite a bit of time between Snowden disclosures of NSA activities, it appears as though <a href="https://twitter.com/wikileaks/status/466354362902937600" target="_blank">Wikileaks has gotten ahold</a> of some secret NSA documents that name names as to whom has been cooperating with them. They claim that they have over 80 different companies in their strategic partnerships.</p>
<div id="attachment_35116" style="width: 610px" class="wp-caption aligncenter"><a href="http://cdn.vrworld.com/wp-content/uploads/2014/05/BnfzRoECUAAPiNw1.jpg" rel="lightbox-0"><img class="size-full wp-image-35116" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/BnfzRoECUAAPiNw1.jpg" alt="Wikileaks Tech NSA" width="600" height="449" /></a><p class="wp-caption-text">Wikileaks Tech NSA</p></div>
<p>The Wikileaks obtained slide states that these 80 &#8220;Major Global Corporations&#8221; are supporting BOTH missions. However, the document doesn&#8217;t specify exactly what both of those missions are, exactly. However, since this slide is labelled as COMINT that means it specifically pertains to communications between people, which may narrow exactly what those missions might be.</p>
<p>They list that those 80 companies are in a long laundry list of businesses including:</p>
<p style="text-align: center;"><strong>Telecommunications and Network Service Providers</strong> &#8211; AT&amp;T, Verizon and Qwest (now part of Centurylink).</p>
<p style="text-align: center;"><strong>Network Infrastructure</strong> &#8211; Cisco and HP</p>
<p style="text-align: center;"><strong>Hardware Platforms Desktops/Servers</strong> &#8211; HP, Intel, Qualcomm, IBM, EDS (now HP)</p>
<p style="text-align: center;"><strong>Operating Systems</strong> &#8211; Microsoft</p>
<p style="text-align: center;"><strong>Applications Software</strong> &#8211; Oracle, EDS (now HP) and Microsoft</p>
<p style="text-align: center;"><strong>Security Hardware and Software</strong> &#8211; Cisco, Oracle, EDS (now HP)</p>
<p style="text-align: center;"><strong>System Integrators</strong> &#8211; HP, IBM, Cisco and EDS (now HP)</p>
<p>However, if you do look at this list, it only specifically names 12 of the 80 companies that they&#8217;re cooperating with. This is the first time that companies are specifically being named as cooperative partners in NSA activities. Back when the <a title="The Internet and Our Freedoms Are in Danger" href="http://www.brightsideofnews.com/2013/06/07/the-internet-and-our-freedoms-are-in-danger/" target="_blank">NSA&#8217;s PRISM activities were disclosed</a> most of the companies were able to feign their being victims of the NSA activities as completely unknowing as to the PRISM program. However, there have been numerous suspicions that many of these companies had been cooperating with the NSA on certain backdoors and such in order to obtain government contracts and such. Additionally, some executives even claimed that they were attacked by the government because they wouldn&#8217;t cooperate, namely <a href="http://rt.com/usa/qwest-ceo-nsa-jail-604/" target="_blank">Qwest&#8217;s former CEO Joseph Nacchio</a>.</p>
<p>While Wikileaks has been known to leak documents that the US government doesn&#8217;t particularly like being seen by the public, this is a rare disclosure by Wikileaks that doesn&#8217;t come with much more information. While we would like to know the full list of companies involved and the rest of the slides in this deck, we&#8217;ll have to go off of what we have now. However, we will be contacting our people at the companies mentioned above to see what they have to say about their involvement with NSA security programs. On the record.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/14/80-tech-companies-cooperating-nsa-claims-wikileaks/">80 Tech Companies Cooperating with NSA, Claims Wikileaks</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/05/14/80-tech-companies-cooperating-nsa-claims-wikileaks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>NSA Bugged Foreign-Bound Networking Equipment</title>
		<link>http://www.vrworld.com/2014/05/12/nsa-bugged-foreign-bound-network-equipment/</link>
		<comments>http://www.vrworld.com/2014/05/12/nsa-bugged-foreign-bound-network-equipment/#comments</comments>
		<pubDate>Tue, 13 May 2014 01:42:07 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Rumors]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Brocade]]></category>
		<category><![CDATA[Bugged]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Dell]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[HP]]></category>
		<category><![CDATA[Huawei]]></category>
		<category><![CDATA[Juniper]]></category>
		<category><![CDATA[Meraki]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[networking]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[server]]></category>
		<category><![CDATA[SIGINT]]></category>
		<category><![CDATA[ZTE]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=35093</guid>
		<description><![CDATA[<p>According to Glenn Greenwald, who seemingly quotes himself in his own titles, the NSA has routinely been intercepting US-based networking hardware bound for countries abroad. ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/12/nsa-bugged-foreign-bound-network-equipment/">NSA Bugged Foreign-Bound Networking Equipment</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="650" height="637" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/NSA-Logo1.jpeg" class="attachment-post-thumbnail wp-post-image" alt="NSA Logo" /></p><p>According to Glenn Greenwald, <a href="http://www.theguardian.com/books/2014/may/12/glenn-greenwald-nsa-tampers-us-internet-routers-snowden" target="_blank">who seemingly quotes himself in his own titles</a>, the NSA has routinely been intercepting US-based networking hardware bound for countries abroad. While Glenn Greenwald doesn&#8217;t specifically implicate any networking companies, it would be safe to assume that companies like Cisco, Juniper, Brocade, Dell, HP and many more. This is in the face of the fact that the US government had been criticizing the use of Huawei networking hardware due to the beliefs that the Chinese would be presenting a security risk to the US. They essentially claimed that Huawei was bugging their networking equipment for the Chinese government and that their routers weren&#8217;t safe, meanwhile the NSA was doing exactly what the US was accusing the Chinese of doing.</p>
<p>Glenn Greenwald states that this is among many other revelations in his new book due out tomorrow, called <em>No Place to Hide</em> which chronicles Edward Snowden, the NSA, and the U.S. Surveillance State. It is a bit curious that he would release such news from Edward Snowden a day before his book&#8217;s release and alluding to the fact that there would be more details buried within his book. A lot of people are going to look at this as an obvious money grab and are going to question his motives and whether he&#8217;s doing all of this to personally enrich himself. While he doesn&#8217;t address this <a href="http://www.gq.com/news-politics/newsmakers/201406/glenn-greenwald-edward-snowden-no-place-to-hide?printable=true" target="_blank">in his interview with GQ directly</a>, he clearly has a lot to say about a multitude of topics, including Edward Snowden himself. This is in addition to <a href="http://www.theguardian.com/books/2014/may/12/glenn-greenwald-nsa-tampers-us-internet-routers-snowden" target="_blank">having left The Guardian</a>, the publication that had originally helped him run all of the Snowden documents and gain worldwide attention to the US&#8217; vast surveillance apparatus <a href="https://firstlook.org/theintercept/" target="_blank">to start The Intercept</a>.</p>
<p>So, How does the NSA do it? Well, according to a 2010 NSA document obtained by Glenn Greenwald, they would receive (intercept) routers, servers and other computer networking devices planned on being exported from the US before they were to be delivered to their final international destination. The NSA&#8217;s secret division would then implant backdoor surveillance tools and repackage the hardware with a factory seal and send them on their way. The NSA would then be able to gain access to those companies&#8217; networks and all of their users and possibly data through these backdoors. He even states that the NSA document gleefully states that, <em>&#8220;<a href="http://en.wikipedia.org/wiki/Signals_intelligence" target="_blank">SIGINT</a> tradecraft … is very hands-on (literally!),&#8221; </em>clearly alluding to their physical tampering with hardware. Eventually, the bugged hardware connects back to the NSA and provides them with the data they want. The report continues, <em>&#8220;In one recent case, after several months a beacon implanted through supply-chain interdiction called back to the NSA covert infrastructure. This call back provided us access to further exploit the device and survey the network.&#8221;</em></p>
<p>Clearly, the NSA has a very detailed and well-established structure for these activities and likely has been doing so for quite some time. The NSA are probably much more careful about how they do things nowadays with all of the attention drawn to them because of the Snowden disclosures, but it would be foolish to assume they&#8217;ve stopped.</p>
<p>If you&#8217;re interested in getting Glenn Greenwald&#8217;s book, I recommend you <a href="http://www.amazon.com/No-Place-Hide-Snowden-Surveillance/dp/162779073X" target="_blank">head over here</a>.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/12/nsa-bugged-foreign-bound-network-equipment/">NSA Bugged Foreign-Bound Networking Equipment</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/05/12/nsa-bugged-foreign-bound-network-equipment/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Google&#039;s Relationship with the NSA Closer Than Believed</title>
		<link>http://www.vrworld.com/2014/05/07/googles-relationship-nsa-closer-believed/</link>
		<comments>http://www.vrworld.com/2014/05/07/googles-relationship-nsa-closer-believed/#comments</comments>
		<pubDate>Wed, 07 May 2014 23:27:18 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Rumors]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Eric Schmidt]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Keith Alexander]]></category>
		<category><![CDATA[Larry Page]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[PRISM]]></category>
		<category><![CDATA[Sergey Brin]]></category>
		<category><![CDATA[Snoden]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=34978</guid>
		<description><![CDATA[<p>Google has consistently tried to make themselves look like they are forced to cooperate with the NSA and that they aren&#8217;t participating in the NSA&#8217;s ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/07/googles-relationship-nsa-closer-believed/">Google&#039;s Relationship with the NSA Closer Than Believed</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="2398" height="800" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/GoogleLogoNSA1.jpg" class="attachment-post-thumbnail wp-post-image" alt="Google NSA" /></p><p>Google has consistently tried to make themselves look like they are forced to cooperate with the NSA and that they aren&#8217;t participating in the NSA&#8217;s programs to monitor the general population, but <a href="http://america.aljazeera.com/articles/2014/5/6/nsa-chief-google.html" target="_blank">Al Jazeera America has obtained documents via the Freedom of Information Act</a>  that show a fairly close level of cooperation between Google and the NSA. Sure, the documents obtained by Al Jazeera don&#8217;t show any sort of cooperating &#8216;smoking gun&#8217; but they do show that the NSA does work fairly closely with Google on National Security measures that might affect the security of Google and ultimately the security of the USA. In the letters, Keith Alexander is communicating with Sergey Brin through Eric Schmidt about meeting up in San Jose at a secure location to be briefed about security threats to Google and the US back in 2012, pre Edward Snowden. And if you read Eric Schmidt&#8217;s response to Keith Alexander, he clearly seems to have a very relaxed and familiar relationship with the head of the NSA, Keith Alexander.</p>
<p>He then gets a reply from Brin explaining that it isn&#8217;t his primary email but rather to communicate with him at another email address that he actually checks often. He is asking Brin to join an 18 CEO steering group that would help the NSA address security issues more effectively without issue, however the details of the documents themselves are very vague (intentionally) and are clearly designed to make the NSA&#8217;s mission to appear to be defensive security-based rather than offensive security based like the PRISM program. That program, Google claims, they had no awareness of, and that the NSA had effectively been doing behind everyone&#8217;s backs. So, either the NSA is working with these companies at the same time as working behind their backs, or there&#8217;s a level of cooperating that we&#8217;re not aware of and that the companies aren&#8217;t willing to admit.</p>
<p>For Google&#8217;s sake, we really hope its just the NSA being douchebags and not being forthcoming with exactly what they&#8217;re doing, which wouldn&#8217;t be a surprise to anyone. Its just that Google&#8217;s relationship with the NSA appears to be closer than they&#8217;ve led on, and there has been no mention of Google cooperating with the NSA on this ESF (enduring security framework).</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/07/googles-relationship-nsa-closer-believed/">Google&#039;s Relationship with the NSA Closer Than Believed</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/05/07/googles-relationship-nsa-closer-believed/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Whitehouse Says They Have Right to Withhold a Security Vulnerability</title>
		<link>http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/</link>
		<comments>http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/#comments</comments>
		<pubDate>Thu, 01 May 2014 18:49:57 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Heartbleed]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Whitehouse]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=34849</guid>
		<description><![CDATA[<p>On Monday, as a follow up to the awareness around the Heartbleed bug and all of the rumors that circulated around it, The Whitehouse posted ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/">The Whitehouse Says They Have Right to Withhold a Security Vulnerability</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="2000" height="1361" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/WhiteHouse_Logo1.png" class="attachment-post-thumbnail wp-post-image" alt="Whitehouse Logo" /></p><p>On Monday, as a follow up to the awareness around <a title="The NSA Exploited the OpenSSL Heartbleed Bug for 2 Years" href="http://www.brightsideofnews.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/">the Heartbleed bug</a> and all of the rumors that circulated around it, <a href="http://www.whitehouse.gov/blog/2014/04/28/heartbleed-understanding-when-we-disclose-cyber-vulnerabilities" target="_blank">The Whitehouse posted a blog</a> clarifying their stance on how they approach vulnerabilities such as Heartbleed. In fact, the NSA categorically denied any knowledge of the<a href="https://twitter.com/NSA_PAO/status/454720059156754434" target="_blank"> Heartbleed bug officially on Twitter</a>, even though they have been known to lie to Congress and the American people without hesitation, so their honesty is a little more than at question.</p>
<p>So, what exactly are they going to disclose and when? Well, there&#8217;s a nifty little check list that the Whitehouse has provided us with so that we know when an agency should withhold information from the public and when it should make it public.</p>
<blockquote>
<p class="p1">We have also established a disciplined, rigorous and high-level decision-making process for vulnerability disclosure. This interagency process helps ensure that all of the pros and cons are properly considered and weighed. While there are no hard and fast rules, here are a few things I want to know when an agency proposes temporarily withholding knowledge of a vulnerability:</p>
</blockquote>
<ul>
<li class="p2">
<blockquote><p>How much is the vulnerable system used in the core internet infrastructure, in other critical infrastructure systems, in the U.S. economy, and/or in national security systems?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Does the vulnerability, if left unpatched, impose significant risk?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How much harm could an adversary nation or criminal group do with knowledge of this vulnerability?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How likely is it that we would know if someone else was exploiting it?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How badly do we need the intelligence we think we can get from exploiting the vulnerability?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Are there other ways we can get it?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Could we utilize the vulnerability for a short period of time before we disclose it?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How likely is it that someone else will discover the vulnerability?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Can the vulnerability be patched or otherwise mitigated?</p></blockquote>
</li>
</ul>
<p>&nbsp;</p>
<p>So, basically, The Whitehouse and the administration of Obama are basically saying that if a vulnerability doesn&#8217;t really affect us too much, but can gain us lots of valuable intelligence we should keep our mouths shut. What is interesting about this supposed &#8220;rigorous&#8221; process for vulnerability disclosure is that there is no time limit set for how long they are allowed to wait until they disclose a vulnerability. There is no limitation on how long they can leave a vulnerability open if it passes all of these checks that they&#8217;ve established. They mention utilizing the vulnerability for a short period of time, but that doesn&#8217;t actually mean anything because a short period of time could be a day, a week, a month, or a year.</p>
<p>With the Heartbleed bug and the public disclosure around it, there were a lot of companies scrambling to patch the bug and some attacks that utilized it immediately after its disclosure. However, if left unpatched, Heartbleed could have disasterous implications and would give any government with knowledge of it almost unlimited access across the web. As a result, many people simply don&#8217;t believe that The Whitehouse and the NSA were unaware of such a bug, especially since the NSA had quietly exploited countless other bugs continually without any concern.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/">The Whitehouse Says They Have Right to Withhold a Security Vulnerability</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>The Guardian and Washington Post Win Pulitzer Prize for NSA Coverage</title>
		<link>http://www.vrworld.com/2014/04/14/the-guardian-and-washington-post-win-pulitzer-prize-for-nsa-coverage/</link>
		<comments>http://www.vrworld.com/2014/04/14/the-guardian-and-washington-post-win-pulitzer-prize-for-nsa-coverage/#comments</comments>
		<pubDate>Tue, 15 Apr 2014 02:57:32 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Guardian]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Pulitzer]]></category>
		<category><![CDATA[Pulitzer Prize]]></category>
		<category><![CDATA[Snowden]]></category>
		<category><![CDATA[The Guardian]]></category>
		<category><![CDATA[The Washington Post]]></category>
		<category><![CDATA[WaPo]]></category>
		<category><![CDATA[Washington Post]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=34454</guid>
		<description><![CDATA[<p>The Guardian and Washington Post have both won a shared Pulitzer Prize for their coverage of the Edward Snowden leak that ultimately led to the ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/04/14/the-guardian-and-washington-post-win-pulitzer-prize-for-nsa-coverage/">The Guardian and Washington Post Win Pulitzer Prize for NSA Coverage</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>The Guardian and Washington Post have<a href="http://www.pulitzer.org/citation/2014-Public-Service"> both won a shared Pulitzer Prize</a> for their coverage of the Edward Snowden leak that ultimately led to the world discovering the breadth of the NSA&#8217;s surveillance programs. Their initial coverage, <a href="http://www.brightsideofnews.com/2013/06/07/the-internet-and-our-freedoms-are-in-danger/">which we covered</a>, we have followed and <a href="http://www.brightsideofnews.com/?s=NSA">covered numerous NSA-related revelations</a> that have come out of both the Washington Post and The Guardian, even though, I would have liked to see Der Spiegel included in the recognition of publications that have served the public beneficially by researching and publicly denouncing the NSA&#8217;s actions.</p>
<p>For their part, there is no denying that the Washington Post and The Guardian have done a great public service for the world in remaining steadfast in their journalistic principals, even when the <a href="http://www.brightsideofnews.com/2014/01/31/how-gchq-forced-the-guardian-to-destroy-their-computers/">GCHQ forced The Guardian</a> to destroy their laptops and computers.</p>
<p><a href="http://www.brightsideofnews.com/wp-content/uploads/2014/02/TheGuardianTeardown.jpg" rel="lightbox-0"><img class="aligncenter size-full wp-image-18459" alt="TheGuardianTeardown" src="http://www.brightsideofnews.com/wp-content/uploads/2014/02/TheGuardianTeardown.jpg" width="689" height="388" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>However, one must not forget that these newspapers are still businesses, and even though Jeff Bezos recently purchased the Washington Post to protect it and keep it safe, it doesn&#8217;t change the fact that they are still businesses. This means that many of the revelations that have been published about the NSA have slowly trickled out and resulted in many millions of hits for each publication, worth millions of dollars in advertising revenue. Sure, there&#8217;s a value in slowly letting out the information in order for certain important things not to be missed, but there&#8217;s also some criticism that they are milking the Snowden leak for their maximum benefit as Snowden is not responsible for how they distribute the documents.</p>
<p>In the end, the world is a better place with the Snowden leaks, at least in our eyes, and they have done the world a huge service by helping Snowden show the world the grave oversteppings of the NSA under the guise of national security and the protection of the United States of America&#8217;s interests. Sure, it makes the NSA&#8217;s job harder, but a lot of the things they&#8217;ve been doing are highly questionable, even with the ambiguity of the Patriot Act.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/04/14/the-guardian-and-washington-post-win-pulitzer-prize-for-nsa-coverage/">The Guardian and Washington Post Win Pulitzer Prize for NSA Coverage</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/04/14/the-guardian-and-washington-post-win-pulitzer-prize-for-nsa-coverage/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The NSA Exploited the OpenSSL Heartbleed Bug for 2 Years</title>
		<link>http://www.vrworld.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/</link>
		<comments>http://www.vrworld.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/#comments</comments>
		<pubDate>Fri, 11 Apr 2014 20:59:19 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Bloomberg]]></category>
		<category><![CDATA[Certificate]]></category>
		<category><![CDATA[Heartbeat]]></category>
		<category><![CDATA[Heartbleed]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[TLS]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=34422</guid>
		<description><![CDATA[<p>According to a report coming out of Bloomberg, the NSA supposedly knew of the OpenSSL Heartbleed bug for nearly 2 years and used it to ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/">The NSA Exploited the OpenSSL Heartbleed Bug for 2 Years</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="341" height="341" src="http://cdn.vrworld.com/wp-content/uploads/2014/04/NSAHeartbleed1.jpg" class="attachment-post-thumbnail wp-post-image" alt="NSAHeartbleed" /></p><p>According to <a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html">a report coming out of Bloomberg,</a> the NSA supposedly knew of the <a href="https://www.openssl.org/news/secadv_20140407.txt">OpenSSL Heartbleed bug</a> for nearly 2 years and used it to their advantage when they needed to. This makes the entire belief that the bug was an accidental mistake in the code that hadn&#8217;t been noticed much less probable. Not to mention the fact that the heartbleed bug is effecting almost the entire internet and puts the security of most passwords into question. The problem, however, is that not enough websites have fixed their certificates to patch this issue. There are hundreds of thousands if not millions of affected sites that handle critical user email accounts, bank accounts and various other sensitive data. The day that the bug was found and announced a fix was also issued to resolve the issue, however, system administrators are slow to <a href="https://www.openssl.org/source/">implement the fix</a> as attacks are already supposedly under way.</p>
<p>In any case, it is advisable to change all of your passwords to sensitive accounts and to enable 2-step authentication as well, considering the fact that such issues could be discovered in the future and that you could be vulnerable until then, like now. The real truth of the matter is that this issue is an unfortunate situation and in today&#8217;s online world there is no doubt that one has to remain vigilant and stay on top of all potential security risks. It also doesn&#8217;t help that the NSA and CIA are building backdoors into hardware across the entire IT industry and that they are effectively building in backdoors for hackers to exploit if they figure out how and where to look. The fact that these governmental agencies are doing this in light of trying to claim that foreign companies cannot be trusted (see Huawei) is hypocritical at the very least and damaging to the US economy at the very most. There is no doubt in my mind that the government&#8217;s involvement in both covert espionage and industrial espionage is causing other countries to not want to do business with US companies, even if those companies have absolutely no knowledge of their insecurities.</p>
<p>As far as this Heartbleed bug goes, you should be mindful of your passwords and accounts and likely change them over the course of the next few days as companies update their OpenSSL and issue new certificates. Unfortunately, until then, you&#8217;re pretty much cannon fodder for any hackers that want to exploit this. So, be careful and enable 2-step authentication wherever possible, because even if they have your password, the likelihood that they ALSO have access to your phone is very narrow. However, some 2-step authenticaion does use email, so be careful of that and change your email passwords ASAP.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/">The NSA Exploited the OpenSSL Heartbleed Bug for 2 Years</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Content Delivery Network via Amazon Web Services: CloudFront: cdn.vrworld.com

 Served from: www.vrworld.com @ 2015-04-10 14:06:49 by W3 Total Cache -->