Extraction of state secrets by former contractor for the National Security Agency Edward Snowden expose weaknesses in the security of some of the networks busiest global Internet .
According to The Washington Post , the U.S. National Security Agency and its British counterpart have tapped the movement of electronic information from the data centers of Google and Yahoo and have collected extensive information in text format , audio , video and other forms .
" Those who deal with issues of privacy have been clear that something is feasible and can be done while you are " .
Lance Hoffman heads the Institute for Policy Research and Cyber Security at George Washington University . He says that although companies store data in secure facilities worldwide and fiber optic networks often specifically for their activity in a given moment to go outside the network information specific to another network within the Internet .
" Whenever you move data from point A to point B , there is a possibility for interception ."
National Security Agency says it collects data lawfully to catch signals that can prevent terrorist attacks and other threats to national security .
Not much is known about how intelligence agencies collect data , one of the possible ways is through the router and forgets that directs Internet traffic, says Jeff Tjiputra informatics specialist at the University of Maryland .
" I know that hackers enter and change codes rauterat enabling data to be passed to a third party ."
Tjiputra says it is not the first time that displayed concern for the safety of online communication :
" Currently faced with the same concern as always : if you send something to the Internet is like sending a postcard . Whoever picks up postcard can read . "
A Yahoo spokesman says the company implements strict controls to protect data security . Google says it is expanding its security settings to a greater extent services .
But while a higher percentage of passing information in " electronic cloud " computing professor at Syracuse University provides rain - Kai Chin risks as well as benefits :
" I think that many computer specialists consider " electronic cloud " as a greater risk . This does not mean that you should not use the cloud . Helps me save a lot of videos and music clips , but would not think that it guarded secret codes platform for undertaking a nuclear attack or secret codes Treasury Department . "
Professor Lance Hoffman of George Washington University says it is not surprising that intelligence agencies failed to break the defense parameters of Google and Yahoo services .
" What amazes me is the fact that the public had such a long time to react and to seek tighter controls ."
He says spying and eavesdropping is always present . But he adds that now is the time to open a public debate about how to protect civil rights .
" In a way , privacy is a major concern to the public , is a prerequisite for freedom . If there is no privacy , no freedom . "
According to The Washington Post , the U.S. National Security Agency and its British counterpart have tapped the movement of electronic information from the data centers of Google and Yahoo and have collected extensive information in text format , audio , video and other forms .
" Those who deal with issues of privacy have been clear that something is feasible and can be done while you are " .
Lance Hoffman heads the Institute for Policy Research and Cyber Security at George Washington University . He says that although companies store data in secure facilities worldwide and fiber optic networks often specifically for their activity in a given moment to go outside the network information specific to another network within the Internet .
" Whenever you move data from point A to point B , there is a possibility for interception ."
National Security Agency says it collects data lawfully to catch signals that can prevent terrorist attacks and other threats to national security .
Not much is known about how intelligence agencies collect data , one of the possible ways is through the router and forgets that directs Internet traffic, says Jeff Tjiputra informatics specialist at the University of Maryland .
" I know that hackers enter and change codes rauterat enabling data to be passed to a third party ."
Tjiputra says it is not the first time that displayed concern for the safety of online communication :
" Currently faced with the same concern as always : if you send something to the Internet is like sending a postcard . Whoever picks up postcard can read . "
A Yahoo spokesman says the company implements strict controls to protect data security . Google says it is expanding its security settings to a greater extent services .
But while a higher percentage of passing information in " electronic cloud " computing professor at Syracuse University provides rain - Kai Chin risks as well as benefits :
" I think that many computer specialists consider " electronic cloud " as a greater risk . This does not mean that you should not use the cloud . Helps me save a lot of videos and music clips , but would not think that it guarded secret codes platform for undertaking a nuclear attack or secret codes Treasury Department . "
Professor Lance Hoffman of George Washington University says it is not surprising that intelligence agencies failed to break the defense parameters of Google and Yahoo services .
" What amazes me is the fact that the public had such a long time to react and to seek tighter controls ."
He says spying and eavesdropping is always present . But he adds that now is the time to open a public debate about how to protect civil rights .
" In a way , privacy is a major concern to the public , is a prerequisite for freedom . If there is no privacy , no freedom . "
0 comments :
Post a Comment