General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsFeds tell Web firms to turn over user account passwords
Secret demands mark escalation in Internet surveillance by the federal government through gaining access to user passwords, which are typically stored in encrypted form.
The U.S. government has demanded that major Internet companies divulge users' stored passwords, according to two industry sources familiar with these orders, which represent an escalation in surveillance techniques that has not previously been disclosed.
If the government is able to determine a person's password, which is typically stored in encrypted form, the credential could be used to log in to an account to peruse confidential correspondence or even impersonate the user. Obtaining it also would aid in deciphering encrypted devices in situations where passwords are reused.
"I've certainly seen them ask for passwords," said one Internet industry source who spoke on condition of anonymity. "We push back."
A second person who has worked at a large Silicon Valley company confirmed that it received legal requests from the federal government for stored passwords. Companies "really heavily scrutinize" these requests, the person said. "There's a lot of 'over my dead body.'"
http://news.cnet.com/8301-13578_3-57595529-38/feds-tell-web-firms-to-turn-over-user-account-passwords/
dorkzilla
(5,141 posts)Because this may actually allow them to impersonate you!
This is just awful.
JoePhilly
(27,787 posts)Katashi_itto
(10,175 posts)JoePhilly
(27,787 posts)bank statements. GASP.
Read the article closely and see if it argues that something illegal is happening.
Notice the use of the words "demand" and "request" and how and where they are used.
The article is a weak attempt to manufacture some outrage. Nothing more.
Unless you are surprised to learn that the government might make "legal requests" (article uses that phrase too) for computer passwords during an investigation.
If the government suspects 3 individuals of a criminal conspiracy, you don't think they'll try to obtain the email and computer passwords of those being investigated?
Anyone who's been home on a rainy Saturday during a Law and Order marathon knows that happens.
KurtNYC
(14,549 posts)JoePhilly
(27,787 posts)simple enough for you.
dorkzilla
(5,141 posts)RKP5637
(67,112 posts)nothing to hide will come forward defending this, and they will scream WTF when it smacks them in the face for some reason ... or some error. The technology exists to pinpoint every aspect of ones life to intimate detail ... is this really the kind of world we want to live in ... There are so many ramifications to this, I'll stop here.
Puzzledtraveller
(5,937 posts)JoePhilly
(27,787 posts)Everyone should read the article and look for how these two terms are used.
KharmaTrain
(31,706 posts)...once again, the headlines always scream louder than the reality. Peddling this stuff these days is too easy.
Cheers...
JoePhilly
(27,787 posts)of people being investigated.
SHOCKED!
KharmaTrain
(31,706 posts)...to be able to listen to everyone phone call, read words as they type them and now hack all our email. For all those billions and billions of messages, you'd need an army of millions just to sort through things. I guess my ego isn't big enough to think that my life is so important that the government is busy listening to my calls, reading my email and building up some dossier so they can come barging through my door at 3am...
RC
(25,592 posts)Only a few people need be involved. Given enough computer power, speech recognition of digitized voices is actually as good as any human and analog voices. And much faster.
People to pay the utility bills are not even needed, as the computer itself can handle the bills unaided. The same can be said for security.
KharmaTrain
(31,706 posts)...needs to come after me they have plenty to go from that I submit every April. I have always lived with the knowledge that one's privacy ends at one's door...when we go out we leave lots of different footprints that are gathered and datamined. Any transaction with a check or credit card is not only mined, it's sold to other companies. I'm betting your puter is loaded with tracking cookies that feed all sorts of personal browsing data. Welcome to the brave new world. My point is there's many ways for the government or the corporate world to "go after" people through personal data that's already accessible...I'm far more concerned about my information being sold and abused by corporates than I am of the government.
RC
(25,592 posts)My computers are clean. It's not hard with the tools available today, plus knowing what to look for. (I got into computers in 1982, when 300 baud was the norm.)
The government has no business snooping in people's electronic data, without probable cause, period.
And as for the businesses and corporations, be picky who you do business with. With the government snooping, you don't have that choice.
JoePhilly
(27,787 posts)I love the phrase "given enough computer power" ...
Let me play ... "given enough computer power", they wouldn't need your password because they'd be able to bypass all passwords completely.
RC
(25,592 posts)The programs are extra.
Don't be so obtuse.
JoePhilly
(27,787 posts)have the computing power to bypass them?
http://www.democraticunderground.com/10023344812#post15
HereSince1628
(36,063 posts)People always push for things that they believe will make their jobs easier.
RC
(25,592 posts)They, the NSA, etc., can already see and store our private data. The only reasons for wanting the passwords is to defeat any encryption they are having trouble with, and/or to impersonate the person for entrapment reasons, to shut them up.
At one time this country had laws against this sort of thing, barring even the government from doing what our government is doing now, without specific warrants listing exactly what they were looking for. Not this secret, wide open warrants, casting wide nets over everyone, that we currently have. What our government is actually doing is combing through all this digital information looking for evidence against those that may be a threat to them and their total control goal.
Terrorism? Why would that not include our own government's spying on its own citizens, in violation of this country's Constitution. How much more lawless can they get? We should all hope we never find out.
WillyT
(72,631 posts)cthulu2016
(10,960 posts)That is vague to the point of uselessness. It could mean requesting all passwords or two instances with legitimate warrants or anything in between.
The article implies that we are talking about a sweeping program, but the nuts and bolts of the article suggest we are not talking about a sweeping program... so the whole thing ends up relying on insinuation.
I would like to she the (worthwhile) topic revisited with a higher jornalistic bar.
JoePhilly
(27,787 posts)Its no different how some have stopped using the correct phrase "data mining" and switched to the term "spying".
The first (data mining) is specific and rather boring, the second (spying) is far more ambiguous and invites the reader to use their imagination as to what's actually happening.
Same is being done in this article.
RC
(25,592 posts)JoePhilly
(27,787 posts)But you do help prove my point ... some will take an ambigious word like "spying" and claim it means anything they want it to mean.
RC
(25,592 posts)There is little public about the operations, rules and laws they go by. The warrants are just paper for the rubber stamp.
And you defend this?
JoePhilly
(27,787 posts)who sit on it are selected, does not turn "data mining", into "spying".
There are lots of things about the FISA court that could and should be improved.
But none of that turns mining meta data into spying either.
See, what I actually defend is the importance of getting the details right.
The people who are running around screaming about "spying", screaming that the 4th amendment has been "executed", screaming that we live in a "totalitarian police state" or screaming that the government is "demanding" passwords when in fact the "requests" that they make are perfectly legal, are not helping anyone get to the actual details of any of what's going on.
But that is not their goal.
Their goal is to use misleading terms and wild hyperbole to create outrage and generate eyeballs for their sites.
And it seems to be an effective tactic.
RC
(25,592 posts)Good to know.
JoePhilly
(27,787 posts)having a discussion with you rather difficult.
In that one sentence you use 3 very broad (and therefore meaningless) phrases.
They are:
1) "government hovering" ... specific data gathering technique unspecified.
2) "our private data" ... specific private data is unspecified.
3) "huge data bases" ... data held by these scary data bases unspecified.
The specifics matter. Unless one is just running in circles with their hair on fire.
RC
(25,592 posts)! through 3 are specific for those that realize and understand what our government is doing to our electronic data.
"Hoovering" is a good descriptive term for what our government is doing to our electronic communications.
Private data, vs public data? Seems rather clear to me. Private data example: Our phone calls and E-mail. Public data example: TV/radio/web pages.
There are 5 huge data collection centers - so far. The last one is in Utah
http://nsa.gov1.info/utah-data-center/
While I have a nice head of hair, it is far for on fire.
1StrongBlackMan
(31,849 posts)The article would suggest the Demands represent the latter, since the demands are legal requests. But, WE
MUST
BE
OUT-RAGED
by thinly sourced reporting.
woo me with science
(32,139 posts)I never in my life believed it would progress to this.
K&R
Sheepshank
(12,504 posts)and yet no form or legal desgnation provided in the exerpt, for the type of legal request or under what circumstances. Yet quick to make assumptions what if could be used for.
Pretty easy to get distressed over 1/2 the info or misleading info.
Yet the courts have provided for a private corporation to have access to private and personal e-mail content, the link is provided here on DU and barely a peep out of anyone.
Trying really hard to be alarmed, but the posturing here on DU makes is pretty "meh"
bunnies
(15,859 posts)If the NSA can already get any communication, from anyone, any time. Getting the password seems moot.
Laelth
(32,017 posts)Thought I'd quote this one, in particular.
-Laelth