プログは米国、ブルームバーグ(Jun 15 2013)を参考にしていますが、これらの事実が現在も続けられていると言われています。
極東アジアでは主に中国と・・・、NSA(米国家安全保障局)は2009年から現在も香港と中国のコンピューターのハッキングを続行中、香港でのハッキングのターゲットには、香港中文大学や公務員、市内の企業や学生などが含まれていると言われています。手法は香港と中国のネットワークの基幹回線をハック、巨大なインターネットルーターなどが対象としてるようです。コンピューターを1台ずつハッキングしなくても、膨大な数のコンピューターの通信にアクセスできると言われています。、、については・・・(参考、過去・・・中南米では14カ国等を監視対象、アジアではマレーシア、中国、○○、インドネシア、タイなどで諜報活動、ヨーロッパではフランス、ドイツ、スペイン等の通信監視・・・世界中、何処の国でも何時でも自由に・・・)
2013年に暴露された、グーグルやマイクロソフト、フェイスブック、アップル、スカイプ、ユーチューブなどの大手IT企業9社が国の個人情報収集・・・現在も協力しているのは間違いないと言われています。諜報活動に協力している企業は9社どころか数千社以上と言われています。
米政府職員、ならびにデータ提供で政府と合意を結ぶ企業の従業員ら4人が暴露した情報によると、国から機密情報などと引き換えにNSA(米国家安全保障局)のデータ収集活動に協力していた企業は上記で挙げた9社以外に金融や製造、技術関連など数千社にも及ぶことが明確に判明したようです。
一部企業以外には、詳細な企業名に関しては公表されていませんが、インターネットセキュリティ会社や銀行関連会社などの名前が連なっているとのことで、重要な情報はほぼ全てが国側に筒抜け状態だったと言えるでしょう。
Jun 15, 2013(ブルームバーグ):数千社に上るハイテクや金融、製造業企業が米情報機関と緊密に協力し、機密情報を提供していることが事情に詳しい関係者4人の話で分かった。見返りとして極秘扱いの情報へのアクセスなどの恩恵を得ていると言われています。
米国家安全保障局(NSA)の請負企業でコンピューター技術者として働いていたエドワード・スノーデン氏が、米市民の通話記録やネット上でのやり取りを、NSAが裁判所命令の下で米グーグルなどネット関連企業から収集していると同氏が情報を暴露して以来、民間企業の役割が厳しく問われています。
関係者4人によると、こうしたネットや通信関連企業の多くは機器の仕様など追加データを米情報機関に自主的に提供。データには顧客の私的な通信は含まれていないという。同関係者は政府関連の仕事に従事しているか、データ提供で合意を結ぶ企業に勤務しているそうです。
ハードウエアおよびソフトウエアメーカーや銀行、インターネットセキュリティー、衛星通信会社を含む多くの企業もこの政府プログラムに参加。一部のケースでは、収集された情報が国を守るためだけでなく、敵対勢力のコンピューターへの侵入を助けるために利用される可能性があると言われています。
NSAのほかに中央情報局 (CIA)、連邦捜査局(FBI)、軍関連機関が、当たり障りがないように見えても情報機関やサイバー戦争対策部門にとって極めて有用となり得るデータの収集でこうした企業と合意していると言われています。
情報収集計画はPRISM(プリズム)」と名付けられており、参加企業は諜報活動やサイバー攻撃対策に極めて有用となり得るデータをNSAやCIA、FBI、その他軍関連機関へ提供することで合意しています。具体的にはソフトウエア世界最大手のマイクロソフトが、自社製品で発生する不具合(バグ)の情報を米当局へ通知したことなどがあったようです。
インターネット電子ネットワークは米国政府が軍事目的のために設置した物!日本の経済関連企業などの情報も重視されていたとのことですが、それについても何十年も前から指摘されていたことでした。現在も堂々と(故意を含め)情報は流れていると言われています・・・
現在も世界の通信網や情報収集に関してはアメリカが独占状態、暴露があったり反対運動があったりしても、それを跳ね除けてドンドン個人情報を調べあげるような体制が世界規模で進行中だと言われ、マトリックスなどの映画で書かれているような個人が国に繋がれて管理・・・アメリカ国防総省などの文章に書かれていますが、彼らは最終的に世界を5~6個の地域にまとめて管理(NOW)する方針にしていると言われています。
記事は以下をを参考にしています。
・S・ Agencies Said to Swap Data With Thousands of Firms
Michael Riley Jun 15, 2013
June 14 (Bloomberg) -- Bloomberg chief Washington correspondent Peter Cook provides details of the exchange of information between the U.S government and companies beyond the Prism program. He speaks on Bloomberg Television's "In The Loop."
Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said.
These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency. The role of private companies has come under intense scrutiny since his disclosure this month that the NSA is collecting millions of U.S. residents’ telephone records and the computer communications of foreigners from Google Inc. (GOOG) and other Internet companies under court order.
Many of these same Internet and telecommunications companies voluntarily provide U.S. intelligence organizations with additional data, such as equipment specifications, that don’t involve private communications of their customers, the four people said.
Makers of hardware and software, banks, Internet security providers, satellite telecommunications companies and many other companies also participate in the government programs. In some cases, the information gathered may be used not just to defend the nation but to help infiltrate computers of its adversaries.
In addition to private communications, information about equipment specifications and data needed for the Internet to work -- much of which isn’t subject to oversight because it doesn’t involve private communications -- is valuable to intelligence, U.S. law-enforcement officials and the military. Close
In addition to private communications, information about equipment specifications and...
In addition to private communications, information about equipment specifications and data needed for the Internet to work -- much of which isn’t subject to oversight because it doesn’t involve private communications -- is valuable to intelligence, U.S. law-enforcement officials and the military.
Along with the NSA, the Central Intelligence Agency, the Federal Bureau of Investigation and branches of the U.S. military have agreements with such companies to gather data that might seem innocuous but could be highly useful in the hands of U.S. intelligence or cyber warfare units, according to the people, who have either worked for the government or are in companies that have these accords.
Microsoft Corp. (MSFT), the world’s largest software company, provides intelligence agencies with information about bugs in its popular software before it publicly releases a fix, according to two people familiar with the process. That information can be used to protect government computers and to access the computers of terrorists or military foes.
Redmond, Washington-based Microsoft and other software or Internet security companies have been aware that this type of early alert allowed the U.S. to exploit vulnerabilities in software sold to foreign governments, according to two U.S. officials. Microsoft doesn’t ask and can’t be told how the government uses such tip-offs, said the officials, who asked not to be identified because the matter is confidential.
Microsoft Corp., the world’s largest software company, provides intelligence agencies with information about bugs in its popular software before it publicly releases a fix, according to two people familiar with the process.
Microsoft Corp., the world’s largest software company, provides intelligence agencies with information about bugs in its popular software before it publicly releases a fix, according to two people familiar with the process.
Frank Shaw, a spokesman for Microsoft, said those releases occur in cooperation with multiple agencies and are designed to give government “an early start” on risk assessment and mitigation.
In an e-mailed statement, Shaw said there are “several programs” through which such information is passed to the government, and named two which are public, run by Microsoft and for defensive purposes.
Some U.S. telecommunications companies willingly provide intelligence agencies with access to facilities and data offshore that would require a judge’s order if it were done in the U.S., one of the four people said.
In these cases, no oversight is necessary under the Foreign Intelligence Surveillance Act, and companies are providing the information voluntarily.
The extensive cooperation between commercial companies and intelligence agencies is legal and reaches deeply into many aspects of everyday life, though little of it is scrutinized by more than a small number of lawyers, company leaders and spies. Company executives are motivated by a desire to help the national defense as well as to help their own companies, said the people, who are familiar with the agreements.
Larry Page, chief executive officer of Google Inc., said in a blog posting June 7 that he hadn’t heard of a program called Prism until after Edward Snowden’s disclosures and that the company didn’t allow the U.S. government direct access to its servers or some back-door to its data centers. Close Larry Page, chief executive officer of Google Inc., said in a blog posting June 7 that he hadn’t heard of a program called Prism until after Edward Snowden’s disclosures and that the company didn’t allow the U.S. government direct access to its servers or some back-door to its data centers.
Most of the arrangements are so sensitive that only a handful of people in a company know of them, and they are sometimes brokered directly between chief executive officers and the heads of the U.S.’s major spy agencies, the people familiar with those programs said.
Michael Hayden, who formerly directed the National Security Agency and the CIA, described the attention paid to important company partners: “If I were the director and had a relationship with a company who was doing things that were not just directed by law but were also valuable to the defense of the Republic, I would go out of my way to thank them and give them a sense as to why this is necessary and useful.”
“You would keep it closely held within the company and there would be very few cleared individuals,” Hayden said.
Cooperation between nine U.S. Internet companies and the NSA’s Special Source Operations unit came to light along with a secret program called Prism. According to a slide deck provided by Snowden, the program gathers e-mails, videos, and other private data of foreign surveillance targets through arrangements that vary by company, overseen by a secret panel of judges.
U.S. intelligence agencies have grown far more dependent on such arrangements as the flow of much of the world’s information has grown exponentially through switches, cables and other network equipment maintained by U.S. companies.
In addition to private communications, information about equipment specifications and data needed for the Internet to work -- much of which isn’t subject to oversight because it doesn’t involve private communications -- is valuable to intelligence, U.S. law-enforcement officials and the military.
Typically, a key executive at a company and a small number of technical people cooperate with different agencies and sometimes multiple units within an agency, according to the four people who described the arrangements.
If necessary, a company executive, known as a “committing officer,” is given documents that guarantee immunity from civil actions resulting from the transfer of data. The companies are provided with regular updates, which may include the broad parameters of how that information is used.
Intel Corp. (INTC)’s McAfee unit, which makes Internet security software, regularly cooperates with the NSA, FBI and the CIA, for example, and is a valuable partner because of its broad view of malicious Internet traffic, including espionage operations by foreign powers, according to one of the four people, who is familiar with the arrangement.
Such a relationship would start with an approach to McAfee’s chief executive, who would then clear specific individuals to work with investigators or provide the requested data, the person said. The public would be surprised at how much help the government seeks, the person said.
McAfee firewalls collect information on hackers who use legitimate servers to do their work, and the company data can be used to pinpoint where attacks begin. The company also has knowledge of the architecture of information networks worldwide, which may be useful to spy agencies who tap into them, the person said.
McAfee’s data and analysis doesn’t include information on individuals, said Michael Fey, the company’s worldwide chief technology officer.
“We do not share any type of personal information with our government agency partners,” Fey said in an e-mailed statement. “McAfee’s function is to provide security technology, education, and threat intelligence to governments. This threat intelligence includes trending data on emerging new threats, cyber-attack patterns and vector activity, as well as analysis on the integrity of software, system vulnerabilities, and hacker group activity.”
In exchange, leaders of companies are showered with attention and information by the agencies to help maintain the relationship, the person said.
In other cases, companies are given quick warnings about threats that could affect their bottom line, including serious Internet attacks and who is behind them.
Following an attack on his company by Chinese hackers in 2010, Sergey Brin, Google’s co-founder, was provided with highly sensitive government intelligence linking the attack to a specific unit of the People’s Liberation Army, China’s military, according to one of the people, who is familiar with the government’s investigation. Brin was given a temporary classified clearance to sit in on the briefing, the person said.
According to information provided by Snowden, Google, owner of the world’s most popular search engine, had at that point been a Prism participant for more than a year.
Google CEO Larry Page said in a blog posting June 7 that he hadn’t heard of a program called Prism until after Snowden’s disclosures and that the Mountain View, California-based company didn’t allow the U.S. government direct access to its servers or some back-door to its data centers. He said Google provides user data to governments “only in accordance with the law.”
Leslie Miller, a spokeswoman for Google, didn’t provide an immediate response June 13.
The information provided by Snowden also exposed a secret NSA program known as Blarney. As the program was described in the Washington Post (WPO), the agency gathers metadata on computers and devices that are used to send e-mails or browse the Internet through principal data routes, known as a backbone.
That metadata includes which version of the operating system, browser and Java software are being used on millions of devices around the world, information that U.S. spy agencies could use to infiltrate those computers or phones and spy on their users.
“It’s highly offensive information,” said Glenn Chisholm, the former chief information officer for Telstra Corp. (TLS), one of Australia’s largest telecommunications companies, contrasting it to defensive information used to protect computers rather than infiltrate them.
According to Snowden’s information, Blarney’s purpose is “to gain access and exploit foreign intelligence,” the Post said.
It’s unclear whether U.S. Internet service providers gave information to the NSA as part of Blarney, and if so, whether the transfer of that data required a judge’s order.
Stewart Baker, former general counsel for the NSA, said if metadata involved communications between two foreign computers that just happened to be crossing a U.S. fiber optic cable “then the likelihood is it would demand less legal scrutiny than when communications are being extracted one by one.”
Lawmakers who oversee U.S. intelligence agencies may not understand the significance of some of the metadata being collected, said Jacob Olcott, a former cybersecurity assistant for Senator John D. Rockefeller IV of West Virginia, the Democratic chairman of the Senate Commerce Committee.
“That’s what makes this issue of oversight so challenging,” said Olcott, now a principal at Good Harbor Security Risk Management in Washington. “You have a situation where the technology and technical policy is far outpacing the background and expertise of most elected members of Congress or their staffs.”
While companies are offered powerful inducements to cooperate with U.S. intelligence, many executives are motivated by patriotism or a sense they are defending national security, the people familiar with the trusted partner programs said.
U.S telecommunications, Internet, power companies and others provide U.S. intelligence agencies with details of their systems’ architecture or equipment schematics so the agencies can analyze potential vulnerabilities.
“It’s natural behavior for governments to want to know about the country’s critical infrastructure,” said Chisholm, chief security officer at Irvine, California-based Cylance Inc.
Even strictly defensive systems can have unintended consequences for privacy. Einstein 3, a costly program originally developed by the NSA, is meant to protect government systems from hackers. The program, which has been made public and is being installed, will closely analyze the billions of e-mails sent to government computers every year to see if they contain spy tools or malicious software.
Einstein 3 could also expose the private content of the e-mails under certain circumstances, according to a person familiar with the system, who asked not to be named because he wasn’t authorized to discuss the matter.
Before they agreed to install the system on their networks, some of the five major Internet companies -- AT&T Inc. (T), Verizon Communications Inc. (VZ), Sprint Nextel Corp., Level 3 Communications Inc. (LVLT) and CenturyLink Inc. (CTL) -- asked for guarantees that they wouldn’t be held liable under U.S. wiretap laws. Those companies that asked received a letter signed by the U.S. attorney general indicating such exposure didn’t meet the legal definition of a wiretap and granting them immunity from civil lawsuits, the person said.
Mark Siegel, a spokesman for Dallas-based AT&T, the nation’s biggest phone carrier, declined to comment. Edward McFadden, a spokesman for New York-based Verizon, the second-largest phone company, declined to comment.
Scott Sloat, a spokesman for Overland Park, Kansas-based Sprint, and Monica Martinez, a spokeswoman for Broomfield, Colorado-based Level 3, didn’t immediately respond to requests for comment.
Linda Johnson, a spokeswoman for Centurylink, formerly Qwest Corp., said her Monroe, Louisiana-based company participates in the Enhanced Cybersecurity Services program and the Intrusion Prevention Security Services program, which includes Einstein 3. Both programs are managed by the U.S. Department of Homeland Security