Snowden Explains Exactly How the US Government Can Get Access to Private Images

Snowden Explains Exactly How the US Government Can Get Hold of their Private Images

The former NSA contractor whistleblower Edward Snowden speaking to John Oliver on Last Week Tonight, said that the American public don’t understand what ‘bulk government surveillance’ actually means – or how it could affect them in their daily lives.

The files Snowden exposed, some of which it has now become clear he had not read completely, revealed mass US government surveillance programs, and meant he had to flee the country to seek refuge in Russia to avoid being prosecuted.
So Last Week Tonight host John Oliver asked his special guest, Snowden, to explain it to them using a metaphor they’d all understand – the concept that intelligence officers could be intercepting private naked images taken on their phones, or “dick pics”, as they're more widely known.
“The good news is that there's no program named the 'dick pic' program. The bad news... they are still collecting everybody's information, including your dick pics,” Snowden said. “If you have your email somewhere like Gmail hosted on a server overseas or transferred overseas or anytime it crosses outside the borders of the United States, your junk ends up in the database.”
He went on to discuss the PRISM program, which is how the government “pull your junk out of Google, without Google's involvement”. It also collects data from Facebook, Apple and other big companies.
However, Snowden was adamant that Americans shouldn’t stop sharing private information “because of a government agency somewhere that’s doing the wrong thing”. “If you sacrifice your values because you're afraid, you don't care about those values very much.”

And recently the laptop used to store top-secret documents leaked by National Security Agency (NSA) whistleblower Edward Snowden has gone on display at the Victoria and Albert Museum in London. 

The device was smashed apart under the instructions of British intelligence officials. It is part of a wider exhibit exploring freedom of speech and Internet security.

Independent:    BBC

« How Credible is the Anonymous Threat to Israel?
Banks Undermine Chip and PIN Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

Hack in the Box Security Conference (HitBSecConf)

Hack in the Box Security Conference (HitBSecConf)

HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events feature two days of training and a two-day multi-track conference

Apicrypt

Apicrypt

Apicrypt enables secure communications between health professionals by using strong encryption technologies.

Schneider Electric

Schneider Electric

Schneider Electric develops connected technologies and solutions to manage energy and process in ways that are safe, reliable and sustainable.

Carson & SAINT

Carson & SAINT

Carson & SAINT is an award-winning consulting firm with deep experience in cybersecurity technology, software, and management consulting.

Cyber London (CyLon)

Cyber London (CyLon)

CyLon is a leading cyber security accelerator and seed investment programme. We help entrepreneurs from across the globe to build cyber security businesses, raise investment, and develop partnerships.

Turkish Accreditation Agency (TURKAK)

Turkish Accreditation Agency (TURKAK)

TURKAK is the national accreditation body for Turkey. The directory of members provides details of organisations offering certification services for ISO 27001.

EUROCONTROL

EUROCONTROL

EUROCONTROL is a pan-European, civil-military organisation dedicated to supporting European aviation. We help our stakeholders protect themselves against cyber threats.

ReconaSense

ReconaSense

ReconaSense helps protect people, assets, buildings and cities with its next-gen access control and converged physical security intelligence platform.

A3Sec

A3Sec

A3Sec provides professional solutions in the areas of Cybersecurity, Device Monitoring, Business Intelligence and Big Data.

ACROS Security

ACROS Security

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements.

Wipe-Global

Wipe-Global

Wipe-Global is specialized in data erasure with an international established service partner network.

HancomWITH

HancomWITH

Hancomwith is an information security company. We provide optimized blockchain solutions in areas including next-generation authentication, security and digital asset transaction.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

Query.ai

Query.ai

At Query.AI, we are committed to helping companies unlock the power of their security data, so they are empowered to meet security investigation and response goals while simultaneously reducing costs.

Prophaze Technologies

Prophaze Technologies

Prophaze enable organizations and SaaS providers to improve their web application cybersecurity and reduce costs through AI automation.

Paramount Defenses

Paramount Defenses

Paramount Defenses have unrivaled capability in two of the most critical areas in cyber security today – Active Directory Security and Privileged Access.

CASwell

CASwell

Caswell is an industry-leading OEM/ODM specializing in networking, security, SD-WAN, NFV, telecommunication and IoT applications.