{"id":140253,"date":"2014-09-08T13:59:38","date_gmt":"2014-09-08T17:59:38","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nude-photos-phone-records-nsa-data-offer-essential-lessons-for-admins.php"},"modified":"2014-09-08T13:59:38","modified_gmt":"2014-09-08T17:59:38","slug":"nude-photos-phone-records-nsa-data-offer-essential-lessons-for-admins","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nude-photos-phone-records-nsa-data-offer-essential-lessons-for-admins.php","title":{"rendered":"Nude photos, phone records, NSA data offer essential lessons for admins"},"content":{"rendered":"<p><p>    Simon Phipps | Sept. 8, 2014  <\/p>\n<p>    Whether via Apple's iCloud, the DEA, or the NSA, data is    leaking everywhere -- can anyone avoid exposure?  <\/p>\n<p>    As you've heard many times by now, someone with no life or    ethics appears to have hacked into numerous celebrity accounts    on Apple's iCloud service and copied private photographs    wholesale. At least a few of those photographs are intimate and    revealing. As if that juvenile intrusion on adult privacy    wasn't enough, they've then posted them in the Internet's frat    houses for the world's sexually frustrated imbeciles to ogle.  <\/p>\n<p>    This case raises questions about the very act of putting data    online. There may be primary benefits for doing so, but as    technology decision makers, we need to raise questions about    secondary costs. Let's consider additional data points.  <\/p>\n<p>    We also learned this week thatthe DEA has been using phone call data going    back decades-- stored by AT&T for any call in    which it participated, not just for its customers -- as a    covert source in the agency's investigations. Unlike the NSA    data, this is not merely material relating to foreigners --    this iseveryone'sdata, going back as far    as 1987. It can be accessed by officials by filling out a form    -- called an \"administrative subpoena\" but not involving any    judicial review. As the New York Times says:  <\/p>\n<p>      The Hemisphere Project, a partnership between federal and      local drug officials and AT&T that has not previously      been reported, involves an extremely close association      between the government and the telecommunications giant.    <\/p>\n<p>    Was this usage what the developers or executives had in mind a    quarter of a century ago as they started logging the data? Or    has it been stored \"just in case\" because it existed and seemed    valuable and over time has found more and more users? There    must be an enormous database -- the epitome of big data -- and    it's probably used for multiple purposes.  <\/p>\n<p>    As to that NSA data, a great deal of confusion about    \"surveillance\" seems to be floating around. In the United    Kingdom, questions are being asked about all the data-gathering    by the British equivalent of the NSA, GCHQ. In response,    Secretary of State Theresa Mayhas respondedthat \"there is no programme of    mass surveillance and there is no surveillance state\" and    labels claims that GCHQ engages in unlawful hacking as    \"nonsense.\" Yet clearly, a lot of data is being gathered.  <\/p>\n<p>    GCHQ, the NSA, and probably every other intelligence agency    worth the name is actively gathering data from the Internet.    Everything on the Internet is transient, with different decay    periods, so gathering information is a constant process. They    believe everything that can be gathered without illegal action    is fair game, so they gather anything and everything they can,    storing it just in case.  <\/p>\n<p>    They are without doubt capturing and recording all and any    email, instant messages, Web pages, social media traffic, and    so on. Recent disclosures reveal thatthe NSA collects\"nearly everything a    user does on the Internet,\" then offers analysts tools to    search that data. The NSA has a variety of explanations why    it's all legally gathered.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.computerworld.com.sg\/tech\/security\/nude-photos-phone-records-nsa-data-offer-essential-lessons-for-admins\" title=\"Nude photos, phone records, NSA data offer essential lessons for admins\">Nude photos, phone records, NSA data offer essential lessons for admins<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Simon Phipps | Sept. 8, 2014 Whether via Apple's iCloud, the DEA, or the NSA, data is leaking everywhere -- can anyone avoid exposure? As you've heard many times by now, someone with no life or ethics appears to have hacked into numerous celebrity accounts on Apple's iCloud service and copied private photographs wholesale.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nude-photos-phone-records-nsa-data-offer-essential-lessons-for-admins.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-140253","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/140253"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=140253"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/140253\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=140253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=140253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=140253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}