{"id":169189,"date":"2014-12-24T14:00:44","date_gmt":"2014-12-24T19:00:44","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nsa-rules-leave-privacy-vulnerable-experts.php"},"modified":"2014-12-24T14:00:44","modified_gmt":"2014-12-24T19:00:44","slug":"nsa-rules-leave-privacy-vulnerable-experts","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-rules-leave-privacy-vulnerable-experts.php","title":{"rendered":"NSA rules leave privacy vulnerable: experts"},"content":{"rendered":"<p><p>      Eyes open: Sarah Harbi protests against the NSA outside the      Department of Justice in Washington, DC. Photo:      Reuters    <\/p>\n<p>    Cyber security experts are questioning whether US President    Barack Obama can make good on his assurance that intelligence    agencies aren't spying on \"ordinary folks.\"  <\/p>\n<p>    That promise is especially dubious, experts say, in instances    where Americans are communicating with US citizens living    abroad and other people overseas.  <\/p>\n<p>    \"It's very clear there are enormous loopholes,\" said Jonathan    Mayer, a cyber security fellow at Stanford University's Centre    for International Security and Co-operation, who is reverse    engineering the NSA surveillance program to learn how much    collection if taken to extremes is legally    possible. \"Their rules, combined with their capabilities, cut    against the classical protections built into our legal system.\"  <\/p>\n<p>    Advertisement  <\/p>\n<p>    The US National Security Agency (NSA) and the CIA are tasked    with gathering foreign not domestic intelligence.    Agency rules say they must have a \"reasonable, articulated    suspicion\" about the people they target, and are required to    sift through all the data they collect and eliminate any that    might have been intercepted from an innocent American, on US    soil or abroad.  <\/p>\n<p>    This week the Obama Administration proposed that Congress    overhaul the electronic surveillance program by having phone    companies hold onto the call records as they do now.  <\/p>\n<p>    But there remain a number of significant ambiguities that allow    Americans' data to be swept up, saved and analysed, according    to a series of disclosures from former intelligence contractor    Edward Snowden, WikiLeaks source Private Chelsea (previously    known as Bradley) Manning and the US government itself:  <\/p>\n<p>    - Analysts need to be just \"51 per cent confident\" that someone    is not in the US, based on phone numbers, Internet Protocol    addresses and email addresses, before they can target the    person.  <\/p>\n<p>    -The NSA is allowed to store encrypted communications,    domestic or foreign, at least until analysts can decrypt it to    find out whether it contains information relating to national    security. With widely used services like Gmail and Facebook    adding encryption, this could encompass a vast amount of    domestic communications.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to read the rest: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/rss.feedsportal.com\/c\/34697\/f\/644136\/s\/38a86912\/sc\/1\/l\/0L0Ssmh0N0Bau0Cit0Epro0Csecurity0Eit0Cnsa0Erules0Eleave0Eprivacy0Evulnerable0Eexperts0E20A140A3270Ezqnkv0Bhtml\/story01.htm\/RK=0\/RS=JcpstnJ3Ffa6PQ2Le7AelmgrRDI-\" title=\"NSA rules leave privacy vulnerable: experts\">NSA rules leave privacy vulnerable: experts<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Eyes open: Sarah Harbi protests against the NSA outside the Department of Justice in Washington, DC. Photo: Reuters Cyber security experts are questioning whether US President Barack Obama can make good on his assurance that intelligence agencies aren't spying on \"ordinary folks.\" That promise is especially dubious, experts say, in instances where Americans are communicating with US citizens living abroad and other people overseas.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-rules-leave-privacy-vulnerable-experts.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-169189","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/169189"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=169189"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/169189\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=169189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=169189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=169189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}