Sunday, July 14, 2013

US SNOOPING CASE: A REVOLUTION IN IT .

Discussing about the most breaking news of the recent time -  If you feel ur ultimately secure while sharing your personal information or private data on any cloud computing network be it even facebook, Skype, Google,Microsoft,Drop box, Yahoo or Amazon or if you are an Apple user.. There is a "red alert" for you. You are eventually been under prying eyes of the greatest hackers of the world!

If u think you are "SAFE" then your "WRONG"!

Even the so called "customized security" will not help you to keep your information confidential.
yes! im talking about the hacking activities of united states government agents. The revelations about US government snooping case showed up that NSA (national security agency) has evidently violated the conventions against privacy policy and trampled it.

To elucidate the topic - what is SNOOPING???
It is the unauthorized/illegal access to another person's or company's data and is intercepted while data transmission, or keeping an observance.
Infact critically speaking software programs are especially designed to monitor an activity on any network device primarily being computers,laptops,tabs,phones etc.

It can be a designed snoop server which captures network traffic and efficiently process your information an your computer BUS.
So its all limpid that whatever you do, write, or type is constantly been tapped. Whether your talking , doing business , making payments , being on a call or
e-mailing , literally anything is been viewed by US agency to gain personal benefits.

Why they are targeting the overseas is not the only concern but what has been done is worth taking a note.

Some fleshy details:-

1. Edward Snowden, an intelligence contractor leaked the most guarded secrets of NSA snooping. This devastating news leak have triggered a raging debate about privacy on internet.

2. The top secret NSA surveillance coded the whole program as "PRISM" which was efficiently conducted through a special fiber optical network which can carry a huge spectrum of world's voice, data and internet traffic undersea. The US has had four submarines that were outfitted for this special mission.  The  US government agency undoubtedly accessed massive amount of unauthorized data while spying.

from an article which says:- "As people worldwide chat, browse and post images through online services, much of the information flows within the technological reach of US surveillance. Though laws, procedural rules and internal policies limit how that information can be collected and used, the data from billions of devices worldwide flow through internet choke points that the United States and its allies are capable of monitoring."

3. The fiber optic network parallel to the PRISM program allows analyst to access and unwrap data from 9 major companies, including Google, Facebook, Microsoft,Yahoo,Apple.

4. They data being collected along with PRISM, is labelled "UPSTREAM". It contains list of four basic code names  FairView, StormBrew, Blarney, Oakstar.

5. The revealed was a snapshot of superimposed diagram on a map of undersea cable networks, describing the upstream program as "communications on fiber cables and infrastructure as data flow past" .
The diagram points on both "PRISM" and "UPSTREAM", is marked as " You can use use both"

6. The NSA map revealed the statistics of March 2013 stating that the agency collected over 97 billion pieces of intelligence from computer networks worldwide.

The largest amount was gathered from IRAN- 14 billion
Following is PAKISTAN - 13.5 billion
Third came up is JORDAN - 12.7 million
Next followed by EGYPT- 7.6 billion 
Fifth being INDIA- 6.3 billion
 Affecting Japan, South Korea , Swiss and Germany, the US also monitored the global bank transactions and confidential data may be leading to an economic war, US snooping targeted 38 foreign embassies.

The conduct was beyond the imagination and is normal expectation from US. It is not at all an easy task to sniff internet traffic in such a massive amount with such a fiber optic under sea technology, without letting the cable operators doubt that their information is being breached.
However US negotiating the fact that it was just to prevent the terrorist attacks against US and its allies and protecting the security. Does US claims the working officials across the globe to be potential terrorists??

It will be interesting to see how clouds networks will be secured now??cyber world is becoming a new arena of international conflict. What will the Obama administration consider it to be?? and the greatest concern Privacy!