How does one hack a system to steal information?

delia25

Let me state first: I’m not looking for a how-to guide to become a cybercriminal. I simply have garnered some concerns because of recent stories that surfaced in the media. One concern comes from the recent ‘whistleblowing’ action by Edward Snowden who blew the cover off the NSA operation.

So how is the government hacking into people’s private information with the PRISM system?

Tags: hacking, NSA, PRISM
Topic: Security
Answer this Question

Answers

2 total
wstark
Vote Up (9)

It’s not exactly a case of hacking with the PRISM system. It is an “authorized” form of information retention that has been “legally” in effect for certain systems since Bill Clinton passed the CALEA Act in the 1990s.

 

 

Today, telecom providers that offer both traditional voice services and IP telephony as well as ISPs, have backdoors open in their system that allow government intelligence networks like PRISM and the FBI’s DCSnet to monitor certain communications. Originally, CALEA did not include clauses to monitor internet communications but that started to change with introduction of the Patriot Act. This is called lawful (or legal) intercept, which is often abbreviated LI. Both Microsoft and a company called Voip-Pal.com have their hands in this technology, which you can learn about by following the links.

jimlynch
Vote Up (7)

I do not know exactly what the government is doing, that's a tough question to answer. However, if you are looking to opt out of Prism, then this page might be helpful:

http://prism-break.org

"Opt out of PRISM, the NSA’s global data surveillance program. Stop reporting your online activities to the American government with these free alternatives to proprietary software."

Ask a question

Join Now or Sign In to ask a question.
Megaupload, the defunct file-storage site, is asking a Hong Kong court to release millions of dollars in assets as part of efforts to allow its former users to reclaim their data.
An Android Trojan app that sends SMS messages to premium-rate numbers has expanded globally over the past year, racking up bills for users in over 60 countries including the U.S., malware researchers from Kaspersky Lab said.
The evolving nature of cyberattacks demands a more dynamic response, according to government CIOs making an effort to implement real-time, continuous monitoring and reporting for security issues.
These tips and tools can help you keep your smartphone close, and protect your data if it strays.
Texas EquuSearch contends that FAA rules do not bar drones for 'humanitarian use'.
Revelations about U.S. secret surveillance programs have left China's Huawei Technologies exhausted on the public relations front, a top company executive said Wednesday.
Some Android apps thought to be vulnerable to the Heartbleed bug were spared because of a common coding error in the way they implemented their own native OpenSSL library.
The panic over the Heartbleed bug is proving to be a convenient distraction for hackers using standard techniques in a fresh wave of attacks targeting at least 18 U.S. universities, according to a computer security researcher.
'Triple-handshake attack' threat quashed in update for OS X Mavericks and Mountain Lion, and iOS 7.
randomness