{"id":7036,"date":"2013-06-17T13:30:10","date_gmt":"2013-06-17T03:30:10","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=7036"},"modified":"2013-06-28T12:49:37","modified_gmt":"2013-06-28T02:49:37","slug":"looking-through-the-prism","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/looking-through-the-prism\/","title":{"rendered":"Looking through the Prism"},"content":{"rendered":"
<\/a>Coming at a time when the US has been increasingly turning the screw on China about its persistent hacking of US computer networks, the revelation that the US government itself has been gathering metadata on large swathes of its own population through a programme codenamed ‘Prism’ could have scarcely been more embarrassing. Having just finished his first round of Presidential talks with Xi Jinping where cyber intrusions were high on the agenda, Obama found himself having to defend one of the largest data collection programs ever established.<\/p>\n What is ‘Prism’, and what does it do that’s created such a heated reaction from the press and the public? According to the self-confessed whistle-blower, Ed Snowden, the National Security Agency has large-scale access to individual chat logs, stored data, voice traffic, file transfers and social networking data of individuals. Following the leaking of this information, the US government confirmed it had requested millions of phone records from Verizon, which had included call duration, location and the phone numbers of both parties on individual calls. Additionally Prism had allegedly enabled access to the servers of nine major technology companies<\/a>, including Google, Microsoft, AOL, Apple, YouTube, Yahoo, Facebook, PalTalk and Skype.<\/p>\n These powers had been enabled in efforts to counter terrorism and serious crime, both of which were, and still do, utilise new internet-based communications methodologies. When appearing in front of US Senators<\/a> last week, NSA Director General Keith Alexander claimed that having such surveillance powers had assisted in thwarting ‘dozens’ of terrorist attacks, including a planned suicide attack on the New York City subway system and a plot to attack a Danish newspaper by a Pakistani American. It’s expected that more details on how these plots and others were foiled using the surveillance powers enabled by Prism will be declassified in the coming weeks<\/a>. This will be in an attempt to inform the public on what the capability is used for, and to counter the ‘1984’ Orwellian dystopian narrative that’s currently dominating.<\/p>\n The existence of such intrusive surveillance powers is clearly worrying on the surface for most members of the public, for whom the idea that anything they do online is monitored and stored is deeply troubling. Richard Lempert of the Brookings Institution, and previously of the Science and Technology Directorate at the Department of Homeland Security, believes that concerns over one’s online conversations<\/a> are nothing to lose sleep over\u2014unless you’re plotting a terrorist attack. Yet he feels there’s a broader concern about the level of power put into hands of few when you add the totality of surveillance powers together:<\/p>\n This does not mean, however, that the NSA programs and the capacities they reveal are of no concern. They should be regarded as canaries in the coal mine; they provide warning of dangers we may be confronting. These capacities, along with increasingly ubiquitous surveillance cameras, photo recognition software, the ongoing development rapid recognition DNA analysis, drones that spy or kill and DNA, fingerprint, photo and other searchable digital databases together relate what I have called the infrastructure of tyranny.<\/p><\/blockquote>\n