How does one hack a system to steal information?

delia25

Let me state first: I’m not looking for a how-to guide to become a cybercriminal. I simply have garnered some concerns because of recent stories that surfaced in the media. One concern comes from the recent ‘whistleblowing’ action by Edward Snowden who blew the cover off the NSA operation.

So how is the government hacking into people’s private information with the PRISM system?

Tags: hacking, NSA, PRISM
Topic: Security
Answer this Question

Answers

2 total
wstark
Vote Up (10)

It’s not exactly a case of hacking with the PRISM system. It is an “authorized” form of information retention that has been “legally” in effect for certain systems since Bill Clinton passed the CALEA Act in the 1990s.

 

 

Today, telecom providers that offer both traditional voice services and IP telephony as well as ISPs, have backdoors open in their system that allow government intelligence networks like PRISM and the FBI’s DCSnet to monitor certain communications. Originally, CALEA did not include clauses to monitor internet communications but that started to change with introduction of the Patriot Act. This is called lawful (or legal) intercept, which is often abbreviated LI. Both Microsoft and a company called Voip-Pal.com have their hands in this technology, which you can learn about by following the links.

jimlynch
Vote Up (9)

I do not know exactly what the government is doing, that's a tough question to answer. However, if you are looking to opt out of Prism, then this page might be helpful:

http://prism-break.org

"Opt out of PRISM, the NSA’s global data surveillance program. Stop reporting your online activities to the American government with these free alternatives to proprietary software."

Ask a question

Join Now or Sign In to ask a question.
A file-encrypting ransomware program called CryptoWall infected over 600,000 computer systems in the past six months and held 5 billion files hostage, earning its creators more than US$1 million, researchers found.
Former U.S. Secretary of State Hillary Clinton called for a "global compact" on surveillance and the use of collected data, saying the U.S. isn't the only country that does it and American technology companies are unfairly targeted for the government's actions.
Electric carmaker Tesla Motors wants security researchers to hack its vehicles. The Silicon Valley based high-tech carmaker will hire up to 30 full-time hackers whose job will be to find and close vulnerabilities in the sophisticated firmware that controls its cars.
Two recent vulnerabilities are examples of problems that could have been avoided if we had just applied the lessons already learned in similar contexts.
Windows XP users may now download a fourth service pack for the 13-year-old operating system, but it isn't coming from Microsoft.
The growing number of data breaches resulting in massive numbers of payment cards being stolen from retail stores and other businesses is occurring because they're failing to keep up with the Payment Card Industry's data security standard, according to the PCI Security Standards Council.
Email addresses and encrypted passwords of around 97,000 users who tested early builds of the Bugzilla bug tracking software were left exposed for three months following a server migration.
A U.S. Federal Bureau of Investigation spokesman said Wednesday the agency is working with the Secret Service to determine the "scope" of reported cyberattacks against several financial institutions.
A payment card industry security consortium warned retailers on Wednesday of the urgency to secure their systems against "Backoff," a malicious software program that steals card numbers.
randomness