Snowden Explains Exactly How the US Government Can Get Access to Private Images

Snowden Explains Exactly How the US Government Can Get Hold of their Private Images

The former NSA contractor whistleblower Edward Snowden speaking to John Oliver on Last Week Tonight, said that the American public don’t understand what ‘bulk government surveillance’ actually means – or how it could affect them in their daily lives.

The files Snowden exposed, some of which it has now become clear he had not read completely, revealed mass US government surveillance programs, and meant he had to flee the country to seek refuge in Russia to avoid being prosecuted.
So Last Week Tonight host John Oliver asked his special guest, Snowden, to explain it to them using a metaphor they’d all understand – the concept that intelligence officers could be intercepting private naked images taken on their phones, or “dick pics”, as they're more widely known.
“The good news is that there's no program named the 'dick pic' program. The bad news... they are still collecting everybody's information, including your dick pics,” Snowden said. “If you have your email somewhere like Gmail hosted on a server overseas or transferred overseas or anytime it crosses outside the borders of the United States, your junk ends up in the database.”
He went on to discuss the PRISM program, which is how the government “pull your junk out of Google, without Google's involvement”. It also collects data from Facebook, Apple and other big companies.
However, Snowden was adamant that Americans shouldn’t stop sharing private information “because of a government agency somewhere that’s doing the wrong thing”. “If you sacrifice your values because you're afraid, you don't care about those values very much.”

And recently the laptop used to store top-secret documents leaked by National Security Agency (NSA) whistleblower Edward Snowden has gone on display at the Victoria and Albert Museum in London. 

The device was smashed apart under the instructions of British intelligence officials. It is part of a wider exhibit exploring freedom of speech and Internet security.

Independent:    BBC

« How Credible is the Anonymous Threat to Israel?
Banks Undermine Chip and PIN Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CyTech Services

CyTech Services

CyTech provides Forensics Incident Response, Cyber Security and Training services.

ZeroFox

ZeroFox

ZeroFox safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.

National Cybersecurity and Communications Integration Center (NCCIC)

National Cybersecurity and Communications Integration Center (NCCIC)

NCCIC is a cyber situational awareness, incident response, and management center for the US Government, intelligence community, and law enforcement.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

Scientific Cyber Security Association (SCSA)

Scientific Cyber Security Association (SCSA)

The main goal of Scientific Cyber Security Association is the development of scientific and practical directions of cyber security.

Guardian Data Destruction

Guardian Data Destruction

Guardian Data Destruction provides a comprehensive suite of onsite e-data destruction services.

Tesserent

Tesserent

Tesserent (formerly Pure Security) is a full-service cybersecurity solutions provider. We partner with clients across Australia and New Zealand in the protection of their digital assets.

MyCena

MyCena

MyCena has developed a complete system of security, control and management for decentralised credentials.

Citizen Lab - University of Toronto

Citizen Lab - University of Toronto

Citizen Lab focuses on research and development at the intersection of cyberspace, global security & human rights.

Software Improvement Group (SIG)

Software Improvement Group (SIG)

Software Improvement Group helps business and technology leaders drive their organizational objectives by fundamentally improving the health and security of their software applications.

Onyxia

Onyxia

Onyxia's unique dynamic cybersecurity platform identifies gaps and prioritizes recommendations for proactive cybersecurity strategy, performance, remediation and management.

National Cybersecurity Alliance

National Cybersecurity Alliance

The National Cybersecurity Alliance is a non-profit organization on a mission to create a more secure, interconnected world.

Cynical Technology

Cynical Technology

Cynical Technology is a Nepalese cybersecurity company with expertise in security consulting, auditing, testing and compliance.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.

BioID

BioID

BioID are a German company offering deepfake detection, liveness detection, facial authentication & identity verification as a Service.