In 10 years, the dark clouds of the "prism" will not disperse! The collusion and misuse of data between US technology companies and intelligence agencies is a profound systemic problem

Release time:Apr 13, 2024 20:42 PM

On June 5th, China Daily reported that after Edward Snowden exposed that US intelligence agencies had abused their power to monitor their own country and countries around the world for more than a decade, the shadow of global surveillance still lingers. Within the United States, Congress is considering expanding its monitoring power; Outside the United States, Irish regulatory authorities have just imposed a huge fine on Facebook's parent company Meta under EU law, aimed at addressing the issue of government theft of data obtained by private companies. This incident indicates that the days when the United States illegally obtained user personal information through its technology giants are not over.

Screenshot of rational magazine website report

Just as the 9/11 attacks brought new powers to the US national security agency to intercept communications, the Snowden incident intensified concerns about the excessive expansion of surveillance agency power. According to a recent report by American Politician News Network, "Ireland's decision is related to information disclosed by Snowden, a contractor employee of the US National Security Agency, in 2013, that US spies illegally obtained people's personal information through the country's technology giants."

The term "related to the inspiration from the 2013 Snowden incident" mentioned in the report refers to the European Parliament's adoption of the General Data Protection Regulations when there were reports that intelligence agencies in English speaking countries were hoarding information collected by private companies. In 2019, Harry Cohen, an assistant researcher at the American Enterprise Research Institute, discussed in a paper published in the Cyber Defense Review that "Snowden's leak had a significant impact on the development of GDPR in the European Union - this legislation fundamentally changed the nature of data privacy in the European Union and even worldwide."

In the United States, there are also discussions about prying into privacy. The Wall Street Journal said in a recent report, "The FBI used a foreign spy tool to search the information of the defendants in the January 6 riots in the United States Congress and the George Freud protest in 2020, which frustrated the Biden administration's efforts to re authorize a so-called key tool of national security." This law, known as Article 702 of the Foreign Intelligence Surveillance Act, allows the National Security Agency to intercept the communications of foreign terrorists or spying suspects through American telecommunications and Internet companies. But the tool also collects data on American citizens residing in the United States.

Snowden pointed out that Article 702 was abused by spies to monitor Americans. A few years later, amidst calls for reform, people learned that the US National Security Agency "collected phone records of over 150 million Americans in 2016," as reported in the magazine Rationality. It is difficult to accurately determine to what extent US surveillance countries still use their power to monitor foreign targets to monitor Americans, as the US Supreme Court conceals many voyeuristic behaviors behind the argument that exposing abuse poses a threat to national security. This is another example of the long-standing "state secret privilege" of concealing improper behavior and incompetence.

"The newly released U.S. Foreign Intelligence Surveillance Court opinion in April 2022 shows that the Federal Bureau of Investigation continues to misuse information collected under Section 702 of the Foreign Intelligence Surveillance Act, including searching for racial justice protesters, activist groups, and political campaign donors," the U.S. Electronic Privacy Information Center stated last week in a recent report. "FISC provides a detailed explanation of the Federal Bureau of Investigation's model of 'conducting extensive and unsubstantiated searches' on information collected under Section 702, which is a comprehensive unlicensed foreign intelligence surveillance authority."


In 10 years, the dark clouds of the "prism" will not disperse! The collusion and misuse of data between US technology companies and intelligence agencies is a profound systemic problem

In a recent research report, privacy advocacy group Electronic Frontier Foundation stated that "Snowden's disclosure is like a light, allowing people to better see and understand what is happening in the black box of the US government monitoring millions of innocent people in the country and around the world." The Prism program is still in operation, and the US government continues to monitor foreigners and US citizens within the same legal framework. An analyst from the organization said, "It has been 10 years since this incident, and the US Congress needs to wake up and ultimately pass some legislation to truly protect public privacy from direct influence from US technology companies and the US National Security Agency.".

Bruce Schneier, an American security expert, wrote in the Snowden Review written for the Internet Engineering Task Force: "Nothing has changed. Although the National Security Agency canceled a project here and a project there, I believe that whether it is large-scale monitoring or targeted monitoring, its aggressiveness will not diminish. Of course, the government's power is not restricted. Monitoring capitalism is still the business model of the Internet."

In recent years, it is not uncommon for the United States to use its technological advantages and commodity exports to monitor and collect data globally. According to a recent report by American journalist Bradley Blankenship, according to German security company Nitrokey, American chip giant Qualcomm sends user information, such as IP addresses, unique IDs, mobile country codes, and other datasets, back to the chip manufacturer's servers. It is estimated that this will affect about 30% of mobile phones worldwide, regardless of their operating system, model, or whether they have a SIM card. The company did not say that this was any form of "backdoor" and denied this news.

Blankenshipp said that regardless, even if it is not a "backdoor" in itself, it still reveals some things. This clearly violates the data regulations of many countries and may be used by US intelligence agencies for digital forensics. Although the US government technically does not allow direct seizure of private company data, it has the right to purchase private data sold by data brokers, who in turn sell data collected by technology companies and various applications.

Blankenship emphasized in the article that it is certain that almost all large technology companies in the United States have won or bid for contracts with the US defense department at some point, which is very profitable. The problem of US technology companies abusing customer data and colluding directly or indirectly with US intelligence agencies is a profound systemic issue. That's why he believes that people around the world should be very cautious about how to use American technology, as these risks are well founded.

Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case
Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case

According to Hong Kong's Wen Wei Po, a bloody knife stabbing case occurred at Hollywood Square in Diamond Hill last Friday. The police arrested a 39 year old man on suspicion of stabbing two young women, one of whom was stabbed over 30 times. The suspect appeared in the Kwun Tong Magistrates Court this morning. The police at the Kwun Tong Magistrate's Court temporarily charged the suspect with two counts of murder last Sunday. The suspect appeared in court this morning at the Kwun Tong Magistrate's Court. Acting Chief Magistrate Zheng Jihang, after listening to the opinions of both the prosecution and defense, decided to postpone the hearing for two weeks until 9:30 am on June 19th, waiting for two psychiatric expert reports to be obtained. The defense did not object. Zheng Jihang approved the application, and the defendant needs to be temporarily detained at Xiaolan Mental Hospital. When the suspect appeared in court, he wore black framed glasses, a light gray shirt, and camouflage green shorts, and was able to answer the judge's questions normally. accordingly

Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest
Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest

Currently, the highly anticipated summer harvest work in Henan has shifted its focus to the northern region of Henan. According to the Henan Daily client, on June 4th, Lou Yangsheng, Secretary of the Henan Provincial Party Committee, presided over a special video scheduling meeting on the "Three Summers" work in the province, listened to the situation report, analyzed and judged the situation, and arranged and deployed the next steps of work. Governor Wang Kai made specific arrangements. On the evening of May 31, 2023, in Xiafutou Village, Xuliang Town, Boai County, Jiaozuo, Henan Province, villagers braved light rain in the wheat fields to harvest wheat. Visual China Map Lou Yangsheng pointed out that the current summer harvest battle in the province has entered the decisive stage. Doing a good job in summer harvest in northern Henan Province is related to the summer grain yield and seed safety. We should focus on seizing opportunities and make every effort to organize the wheat harvesting work in the northern Henan region, minimize losses, and protect the interests of farmers to the greatest extent possible. Accurate forecasting is essential

Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology
Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology

On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Astronauts Fei Junlong, Deng Qingming, and Zhang Lu all safely and smoothly exited the spacecraft, and the Shenzhou-15 manned flight mission was a complete success. What innovative technologies are there to safeguard the return journey of Shenzhou 15 in this mission? On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Xinhua News Agency reporter Lian Zhen photographed that "the sky and the ground" ensure the high-precision return of spacecraft. For the Shenzhou series spacecraft, the return and re-entry GNC technology is directly related to the life safety of astronauts. Taking the success of this return mission as a symbol, China has comprehensively upgraded its GNC system since the Shenzhou-12 manned spacecraft, which features autonomous rapid rendezvous and docking, autonomous adaptive prediction and re-entry return guidance, and has completed a comprehensive update and replacement

The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet
The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet

At noon today, a Chinese naval fleet consisting of Zhanjiang and Xuchang ships arrived at the assembly area of the "Comodo-2023" multinational maritime joint exercise. It is understood that the assembly anchorage for this exercise is 3 nautical miles long and 1.5 nautical miles wide, capable of anchoring up to 50 ships. Naval vessels from various countries participating in the exercise will also arrive at the anchorage today to complete the assembly of the "Komodo 2023" multinational maritime joint exercise, which is held every two years by the Indonesian Navy. This year is already the fourth edition of the exercise. The exercise will be held from June 5th to 8th in the city of Jakarta, South Sulawesi Province, Indonesia, including the port and sea phases. In the coming days, participating navies from various countries will participate in ship reading style search and rescue exercises, maritime interception and damage management exercises, aerial exercises, and other course objectives exercises

New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale
New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale

On the evening of June 1st, the US Senate passed a bill on the federal government's debt ceiling and budget, and the flame of the US debt bomb was temporarily extinguished at the last moment. The two parties in the United States have staged an extreme tug of war over the US debt bomb. Some experts believe that the US debt crisis is the result of the reckless politics promoted by the US dollar hegemony, and the underlying cause of this crisis is the highly polarized political system of the US. Since the end of World War II, the US Congress has adjusted the debt ceiling more than a hundred times. The recurring debt crisis will not only have a catastrophic impact on the US economy and people's livelihoods, but also continuously erode the value of US dollar assets such as government credit and US bonds, bringing significant and far-reaching impacts to the global economic landscape. 【