Snowden Explains Exactly How the US Government Can Get Access to Private Images

Snowden Explains Exactly How the US Government Can Get Hold of their Private Images

The former NSA contractor whistleblower Edward Snowden speaking to John Oliver on Last Week Tonight, said that the American public don’t understand what ‘bulk government surveillance’ actually means – or how it could affect them in their daily lives.

The files Snowden exposed, some of which it has now become clear he had not read completely, revealed mass US government surveillance programs, and meant he had to flee the country to seek refuge in Russia to avoid being prosecuted.
So Last Week Tonight host John Oliver asked his special guest, Snowden, to explain it to them using a metaphor they’d all understand – the concept that intelligence officers could be intercepting private naked images taken on their phones, or “dick pics”, as they're more widely known.
“The good news is that there's no program named the 'dick pic' program. The bad news... they are still collecting everybody's information, including your dick pics,” Snowden said. “If you have your email somewhere like Gmail hosted on a server overseas or transferred overseas or anytime it crosses outside the borders of the United States, your junk ends up in the database.”
He went on to discuss the PRISM program, which is how the government “pull your junk out of Google, without Google's involvement”. It also collects data from Facebook, Apple and other big companies.
However, Snowden was adamant that Americans shouldn’t stop sharing private information “because of a government agency somewhere that’s doing the wrong thing”. “If you sacrifice your values because you're afraid, you don't care about those values very much.”

And recently the laptop used to store top-secret documents leaked by National Security Agency (NSA) whistleblower Edward Snowden has gone on display at the Victoria and Albert Museum in London. 

The device was smashed apart under the instructions of British intelligence officials. It is part of a wider exhibit exploring freedom of speech and Internet security.

Independent:    BBC

« How Credible is the Anonymous Threat to Israel?
Banks Undermine Chip and PIN Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BetterCloud

BetterCloud

BetterCloud puts IT in control of the modern workplace through user lifecycle management, data discovery, and IT and security automation purpose-built for SaaS.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

NPCore

NPCore

NPCore is specialized in defense solution against unknown APT and Ransomware and provides two-level defense on network and endpoint based on behavior.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

Vysk Communications

Vysk Communications

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication.

Abacode

Abacode

Abacode is a Managed Security Services Provider (MSSP). We help businesses consolidate all of their Regulatory Compliance & Cybersecurity needs, under one roof.

Envelop Risk

Envelop Risk

Envelop Risk is a global specialty cyber insurance firm, combining decades of insurance industry expertise with sophisticated cyber and artificial intelligence-based analytics.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

Allied Telesis

Allied Telesis

Allied Telesis delivers the secure, flexible, and agile solutions needed to meet the expectations of any industry’s critical mission.

Searchlight Cyber

Searchlight Cyber

Searchlight Cyber is a leading darknet intelligence company. Working with law enforcement, industry, and end users to help protect society against the threats of the darknet.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm that has built a reputation for consistently managing complex projects.

Heartland Business Systems (HBS)

Heartland Business Systems (HBS)

Heartland Business Systems serves commercial, public sector and small to medium business with results-driven and dedicated information technology services.

ThreatNix

ThreatNix

ThreatNix is a tight knit group of experienced security professionals who are committed to providing competent cybersecurity solutions that adhere to international standards.

Mindsprint

Mindsprint

Mindsprint (formerly Olam Technology and Business Services - OTBS) are a leading edge technology and business services firm.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.