<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: What the NSA revelations mean for you?</title>
	<atom:link href="http://www.epanorama.net/blog/2013/11/07/what-the-nsa-revelations-mean-for-you/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2013/11/07/what-the-nsa-revelations-mean-for-you/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 18 Apr 2026 22:36:12 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Candida Burris</title>
		<link>https://www.epanorama.net/blog/2013/11/07/what-the-nsa-revelations-mean-for-you/comment-page-1/#comment-1476932</link>
		<dc:creator><![CDATA[Candida Burris]]></dc:creator>
		<pubDate>Thu, 03 Mar 2016 03:56:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=22806#comment-1476932</guid>
		<description><![CDATA[Timely writing . I learned a lot from the analysis , Does anyone know if my business might find a blank a form example to work with ?]]></description>
		<content:encoded><![CDATA[<p>Timely writing . I learned a lot from the analysis , Does anyone know if my business might find a blank a form example to work with ?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/11/07/what-the-nsa-revelations-mean-for-you/comment-page-1/#comment-34623</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 09 Jan 2014 08:35:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=22806#comment-34623</guid>
		<description><![CDATA[The Year in NSA
http://threatpost.com/the-year-in-nsa/103329

rather than trying to rank the NSA revelations on any sort of scale, we’ve put together an admittedly simplified list of some of the more interesting NSA-related stories to emerge in 2013.

Least Surprising NSA Capability: Breaking/Subverting Crypto

Most Surprising NSA Capability: Defeating the Collective Security Prowess of Silicon Valley

Most Interesting People to Emerge From the NSA Story: Jacob Appelbaum and Matthew Green]]></description>
		<content:encoded><![CDATA[<p>The Year in NSA<br />
<a href="http://threatpost.com/the-year-in-nsa/103329" rel="nofollow">http://threatpost.com/the-year-in-nsa/103329</a></p>
<p>rather than trying to rank the NSA revelations on any sort of scale, we’ve put together an admittedly simplified list of some of the more interesting NSA-related stories to emerge in 2013.</p>
<p>Least Surprising NSA Capability: Breaking/Subverting Crypto</p>
<p>Most Surprising NSA Capability: Defeating the Collective Security Prowess of Silicon Valley</p>
<p>Most Interesting People to Emerge From the NSA Story: Jacob Appelbaum and Matthew Green</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/11/07/what-the-nsa-revelations-mean-for-you/comment-page-1/#comment-34622</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Dec 2013 13:37:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=22806#comment-34622</guid>
		<description><![CDATA[30c3: To Protect And Infect, Part 2
https://www.youtube.com/watch?v=b0w36GAyZIA]]></description>
		<content:encoded><![CDATA[<p>30c3: To Protect And Infect, Part 2<br />
<a href="https://www.youtube.com/watch?v=b0w36GAyZIA" rel="nofollow">https://www.youtube.com/watch?v=b0w36GAyZIA</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/11/07/what-the-nsa-revelations-mean-for-you/comment-page-1/#comment-34621</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 27 Dec 2013 12:59:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=22806#comment-34621</guid>
		<description><![CDATA[2013 in Review: Revelations, Tragedy, and Fighting Back
https://www.eff.org/deeplinks/2013/12/2013-review

When it comes to the fight for free expression and privacy in technology, 2013 changed everything.

This was the year we received confirmation and disturbing details about the NSA programs that are sweeping up information on hundreds of millions of people in the United States and around the world.

In December, a federal judge even found the surveillance likely unconstitutional, calling it &quot;almost-Orwellian.&quot;]]></description>
		<content:encoded><![CDATA[<p>2013 in Review: Revelations, Tragedy, and Fighting Back<br />
<a href="https://www.eff.org/deeplinks/2013/12/2013-review" rel="nofollow">https://www.eff.org/deeplinks/2013/12/2013-review</a></p>
<p>When it comes to the fight for free expression and privacy in technology, 2013 changed everything.</p>
<p>This was the year we received confirmation and disturbing details about the NSA programs that are sweeping up information on hundreds of millions of people in the United States and around the world.</p>
<p>In December, a federal judge even found the surveillance likely unconstitutional, calling it &#8220;almost-Orwellian.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/11/07/what-the-nsa-revelations-mean-for-you/comment-page-1/#comment-34620</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 27 Dec 2013 12:57:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=22806#comment-34620</guid>
		<description><![CDATA[2013 in Review: The Year the NSA Finally Admitted Its &quot;Collect It All&quot; Strategy
https://www.eff.org/deeplinks/2013/12/2013-year-nsas-collect-it-all-strategy-was-revealed

As the year draws to a close, EFF is looking back at the major trends influencing digital rights in 2013 and discussing where we are in the fight for free expression, innovation, fair use, and privacy.]]></description>
		<content:encoded><![CDATA[<p>2013 in Review: The Year the NSA Finally Admitted Its &#8220;Collect It All&#8221; Strategy<br />
<a href="https://www.eff.org/deeplinks/2013/12/2013-year-nsas-collect-it-all-strategy-was-revealed" rel="nofollow">https://www.eff.org/deeplinks/2013/12/2013-year-nsas-collect-it-all-strategy-was-revealed</a></p>
<p>As the year draws to a close, EFF is looking back at the major trends influencing digital rights in 2013 and discussing where we are in the fight for free expression, innovation, fair use, and privacy.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi</title>
		<link>https://www.epanorama.net/blog/2013/11/07/what-the-nsa-revelations-mean-for-you/comment-page-1/#comment-34619</link>
		<dc:creator><![CDATA[Tomi]]></dc:creator>
		<pubDate>Thu, 19 Dec 2013 05:45:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=22806#comment-34619</guid>
		<description><![CDATA[&#039;NSA ruined it!&#039; Brazil ditches Boeing jets, grants $4.5 bln contract to Saab
http://rt.com/news/brazil-nsa-defense-contract-454/

Brazil has rejected a contract for Boeing’s F/A-18 fighter jets in favor of the Swedish Saab’s JAS 39 Gripens. The unexpected move to reject the US bid comes amid the global scandal over the NSA’s involvement in economic espionage activities.

The announcement for the purchase of 36 fighters was made Wednesday by Brazilian Defense Minister Celso Amorim and Air Force Commander Junti Saito. The jets will cost US$4.5 billion, well below the estimated market value of around US$7 billion.]]></description>
		<content:encoded><![CDATA[<p>&#8216;NSA ruined it!&#8217; Brazil ditches Boeing jets, grants $4.5 bln contract to Saab<br />
<a href="http://rt.com/news/brazil-nsa-defense-contract-454/" rel="nofollow">http://rt.com/news/brazil-nsa-defense-contract-454/</a></p>
<p>Brazil has rejected a contract for Boeing’s F/A-18 fighter jets in favor of the Swedish Saab’s JAS 39 Gripens. The unexpected move to reject the US bid comes amid the global scandal over the NSA’s involvement in economic espionage activities.</p>
<p>The announcement for the purchase of 36 fighters was made Wednesday by Brazilian Defense Minister Celso Amorim and Air Force Commander Junti Saito. The jets will cost US$4.5 billion, well below the estimated market value of around US$7 billion.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/11/07/what-the-nsa-revelations-mean-for-you/comment-page-1/#comment-34618</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 17 Dec 2013 12:36:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=22806#comment-34618</guid>
		<description><![CDATA[CIOs do not have to panic at the NSA

The revelations of the massive U.S. government tietourkinnasta have scared the ordinary citizens , undermined the credibility of our policies and outraged defend the privacy of guard dogs , but senior IT managers are not panicking , at least not yet.

So far, they have been content to follow the situation , gather information about , and to make a variety of measures to minimize the risks. Despite the alarming news of IT management does not , however, have not withdrawn their decisions to outsource their respective companies and data applications in the cloud.

This became apparent when a pair of ten U.S. and European CIO of the respondents were asked how the NSA&#039;s doings have influenced their cloud services strategy.

Many of the interviewed top-level IT executives told , however, to be more cautious cloud service plans , and the transition to the cloud . The spy scandal because they are also re- visited through the cloud service providers&#039; agreements, just double checked the best practices and tighten the security controls .

No surprise

The revelations do not come to the CIO for a complete surprise , but the fact that the Board of Directors oversees the telecom and internet traffic, has been common knowledge .

&quot;The government&#039;s control has not changed our opinion on cloud computing . The cloud is an attractive model for us . On the other hand , I have never been so naïve that I would have never thought that this type of control should be going , &quot;

For many respondents , the government &#039;s information systems and traffic spy is not part of their security threat to the top of their lists .

&quot;Every CIO has every minute of every day among other things, concerned about security, privacy, business continuity and disaster recovery. We are likely to be paranoid friends across the globe, &quot;

Also, the fact that all had been behind a firewall , its risks associated with their own . IT leaders concerned about the cost and complexity that arises when servers are rotated in their own data centers . Run the risk of loss of competitiveness if the competitors have to take the benefits from cloud services.

Source:
CIO ei joudu NSA-paniikkiin
http://www.tietoviikko.fi/cio/cio+ei+joudu+nsapaniikkiin/a954723]]></description>
		<content:encoded><![CDATA[<p>CIOs do not have to panic at the NSA</p>
<p>The revelations of the massive U.S. government tietourkinnasta have scared the ordinary citizens , undermined the credibility of our policies and outraged defend the privacy of guard dogs , but senior IT managers are not panicking , at least not yet.</p>
<p>So far, they have been content to follow the situation , gather information about , and to make a variety of measures to minimize the risks. Despite the alarming news of IT management does not , however, have not withdrawn their decisions to outsource their respective companies and data applications in the cloud.</p>
<p>This became apparent when a pair of ten U.S. and European CIO of the respondents were asked how the NSA&#8217;s doings have influenced their cloud services strategy.</p>
<p>Many of the interviewed top-level IT executives told , however, to be more cautious cloud service plans , and the transition to the cloud . The spy scandal because they are also re- visited through the cloud service providers&#8217; agreements, just double checked the best practices and tighten the security controls .</p>
<p>No surprise</p>
<p>The revelations do not come to the CIO for a complete surprise , but the fact that the Board of Directors oversees the telecom and internet traffic, has been common knowledge .</p>
<p>&#8220;The government&#8217;s control has not changed our opinion on cloud computing . The cloud is an attractive model for us . On the other hand , I have never been so naïve that I would have never thought that this type of control should be going , &#8221;</p>
<p>For many respondents , the government &#8216;s information systems and traffic spy is not part of their security threat to the top of their lists .</p>
<p>&#8220;Every CIO has every minute of every day among other things, concerned about security, privacy, business continuity and disaster recovery. We are likely to be paranoid friends across the globe, &#8221;</p>
<p>Also, the fact that all had been behind a firewall , its risks associated with their own . IT leaders concerned about the cost and complexity that arises when servers are rotated in their own data centers . Run the risk of loss of competitiveness if the competitors have to take the benefits from cloud services.</p>
<p>Source:<br />
CIO ei joudu NSA-paniikkiin<br />
<a href="http://www.tietoviikko.fi/cio/cio+ei+joudu+nsapaniikkiin/a954723" rel="nofollow">http://www.tietoviikko.fi/cio/cio+ei+joudu+nsapaniikkiin/a954723</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/11/07/what-the-nsa-revelations-mean-for-you/comment-page-1/#comment-34617</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 05 Dec 2013 10:01:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=22806#comment-34617</guid>
		<description><![CDATA[Microsoft’s General Counsel: N.S.A. Hacks Were an ‘Earthquake’ for Tech
http://bits.blogs.nytimes.com/2013/12/05/microsofts-general-counsel-n-s-a-hacks-were-an-earthquake-for-tech/?_r=0

Microsoft is the latest company to try to protect its data from its own government.

An article on Thursday indicates that Microsoft is in the process of expanding and strengthening the encryption for popular services including the email service Outlook.com, Office 365 apps, the Azure cloud-computing service and Skydrive online storage. It is also adding an encryption technology, called Perfect Forward Secrecy, that thwarts eavesdropping.

The company is also scrambling the links between its data centers in an effort to assure users and foreign governments that their data is not free for the National Security Agency’s taking.

The company says encryption and Perfect Forward Secrecy will become the default setting for users by the end of 2014.

Microsoft will also open up so-called transparency centers, where governments can inspect its products code for back doors.

“The idea that the government may be hacking into corporate data centers was a bit like an earthquake, sending shock waves across the tech sector,” Mr. Smith said in an interview. “We concluded that we better assume that there might be such an attempt at Microsoft, or has already been.”

And therein lies the rub. Microsoft’s efforts — and for that matter Google’s, Twitter’s, Mozilla’s, Facebook’s and Yahoo’s — still do not prevent the government from gaining access to their data through a court order. And some security experts point out that even if companies like Microsoft allow outsiders to inspect their code, that only eliminates one mode of attack; snoops could still find holes in other parts of the system.

 Lavabit and Silent Circle, two secure message providers, have been lobbying major Internet companies to adopt a new Dark Mail e-mail protocol that would encrypt user data and metadata in such a way that it would leave the keys with the user, not the provider. Dark Mail would thereby force governments, or hackers, to go straight to the user to unscramble their data.

“The real friction point is that Yahoo, Google and Microsoft make money mining off free email,” Mr. Janke said in an interview. “They say they’re concerned about user privacy. Now we’ll see if they really care.”]]></description>
		<content:encoded><![CDATA[<p>Microsoft’s General Counsel: N.S.A. Hacks Were an ‘Earthquake’ for Tech<br />
<a href="http://bits.blogs.nytimes.com/2013/12/05/microsofts-general-counsel-n-s-a-hacks-were-an-earthquake-for-tech/?_r=0" rel="nofollow">http://bits.blogs.nytimes.com/2013/12/05/microsofts-general-counsel-n-s-a-hacks-were-an-earthquake-for-tech/?_r=0</a></p>
<p>Microsoft is the latest company to try to protect its data from its own government.</p>
<p>An article on Thursday indicates that Microsoft is in the process of expanding and strengthening the encryption for popular services including the email service Outlook.com, Office 365 apps, the Azure cloud-computing service and Skydrive online storage. It is also adding an encryption technology, called Perfect Forward Secrecy, that thwarts eavesdropping.</p>
<p>The company is also scrambling the links between its data centers in an effort to assure users and foreign governments that their data is not free for the National Security Agency’s taking.</p>
<p>The company says encryption and Perfect Forward Secrecy will become the default setting for users by the end of 2014.</p>
<p>Microsoft will also open up so-called transparency centers, where governments can inspect its products code for back doors.</p>
<p>“The idea that the government may be hacking into corporate data centers was a bit like an earthquake, sending shock waves across the tech sector,” Mr. Smith said in an interview. “We concluded that we better assume that there might be such an attempt at Microsoft, or has already been.”</p>
<p>And therein lies the rub. Microsoft’s efforts — and for that matter Google’s, Twitter’s, Mozilla’s, Facebook’s and Yahoo’s — still do not prevent the government from gaining access to their data through a court order. And some security experts point out that even if companies like Microsoft allow outsiders to inspect their code, that only eliminates one mode of attack; snoops could still find holes in other parts of the system.</p>
<p> Lavabit and Silent Circle, two secure message providers, have been lobbying major Internet companies to adopt a new Dark Mail e-mail protocol that would encrypt user data and metadata in such a way that it would leave the keys with the user, not the provider. Dark Mail would thereby force governments, or hackers, to go straight to the user to unscramble their data.</p>
<p>“The real friction point is that Yahoo, Google and Microsoft make money mining off free email,” Mr. Janke said in an interview. “They say they’re concerned about user privacy. Now we’ll see if they really care.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/11/07/what-the-nsa-revelations-mean-for-you/comment-page-1/#comment-34616</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Dec 2013 08:27:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=22806#comment-34616</guid>
		<description><![CDATA[Techies vs. NSA: Encryption arms race escalates
http://bigstory.ap.org/article/techies-vs-nsa-encryption-arms-race-escalates

Encrypted email, secure instant messaging and other privacy services are booming in the wake of the National Security Agency’s recently revealed surveillance programs. But the flood of new computer security services is of variable quality, and much of it, experts say, can bog down computers and isn’t likely to keep out spies.

In the end, the new geek wars —between tech industry programmers on the one side and government spooks, fraudsters and hacktivists on the other— may leave people’s PCs and businesses’ computer systems encrypted to the teeth but no better protected from hordes of savvy code crackers.

“Every time a situation like this erupts you’re going to have a frenzy of snake oil sellers who are going to throw their products into the street,” says Carson Sweet, CEO of San Francisco-based data storage security firm CloudPassage. “It’s quite a quandary for the consumer.”

The revelations are sparking fury and calls for better encryption from citizens and leaders in France, Germany, Spain and Brazil who were reportedly among those tapped. Both Google and Yahoo, whose data center communications lines were also reportedly tapped, have committed to boosting encryption and online security. Although there’s no indication Facebook was tapped, the social network is also upping its encryption systems.

For those who want to take matters into their own hands, encryption software has been proliferating across the Internet since the Snowden revelations broke.

Heml.is — Swedish for “secret” — is marketed as a secure messaging app for your phone. MailPile aims to combine a Gmail-like user friendly interface with a sometimes clunky technique known as public key encryption. Younited hopes to keep spies out of your cloud storage, and Pirate Browser aims to keep spies from seeing your search history. A host of other security-centered programs with names like Silent Circle, RedPhone, Threema, TextSecure, and Wickr all promise privacy.

Many of the people behind these programs are well known for pushing the boundaries of privacy and security online.

The quality of these new programs and services is uneven, and a few have run into trouble.

“What we found is the encryption services range in quality,” says George Kurtz, CEO of Irvine, Calif.-based CrowdStrike, a big data, security technology company. “I feel safe using some built by people who know what they are doing , but others are Johnny-come-latelies who use a lot of buzzwords but may not be all that useful.”

Even so, private services report thousands of new users, and nonprofit, free encryption services say they have also see sharp upticks in downloads.

And for many users, encryption really isn’t enough to avoid the U.S. government’s prying eyes.

In any case, most attacks don’t happen because some cybercriminal used complicated methods to gain entry into a network, he adds.

“Most attacks occur because someone made a mistake. With phishing emails, it just takes one person to unwittingly open an attachment or click on a malicious link, and from there, cybercriminals are able to get a foothold,” Peterson says.]]></description>
		<content:encoded><![CDATA[<p>Techies vs. NSA: Encryption arms race escalates<br />
<a href="http://bigstory.ap.org/article/techies-vs-nsa-encryption-arms-race-escalates" rel="nofollow">http://bigstory.ap.org/article/techies-vs-nsa-encryption-arms-race-escalates</a></p>
<p>Encrypted email, secure instant messaging and other privacy services are booming in the wake of the National Security Agency’s recently revealed surveillance programs. But the flood of new computer security services is of variable quality, and much of it, experts say, can bog down computers and isn’t likely to keep out spies.</p>
<p>In the end, the new geek wars —between tech industry programmers on the one side and government spooks, fraudsters and hacktivists on the other— may leave people’s PCs and businesses’ computer systems encrypted to the teeth but no better protected from hordes of savvy code crackers.</p>
<p>“Every time a situation like this erupts you’re going to have a frenzy of snake oil sellers who are going to throw their products into the street,” says Carson Sweet, CEO of San Francisco-based data storage security firm CloudPassage. “It’s quite a quandary for the consumer.”</p>
<p>The revelations are sparking fury and calls for better encryption from citizens and leaders in France, Germany, Spain and Brazil who were reportedly among those tapped. Both Google and Yahoo, whose data center communications lines were also reportedly tapped, have committed to boosting encryption and online security. Although there’s no indication Facebook was tapped, the social network is also upping its encryption systems.</p>
<p>For those who want to take matters into their own hands, encryption software has been proliferating across the Internet since the Snowden revelations broke.</p>
<p>Heml.is — Swedish for “secret” — is marketed as a secure messaging app for your phone. MailPile aims to combine a Gmail-like user friendly interface with a sometimes clunky technique known as public key encryption. Younited hopes to keep spies out of your cloud storage, and Pirate Browser aims to keep spies from seeing your search history. A host of other security-centered programs with names like Silent Circle, RedPhone, Threema, TextSecure, and Wickr all promise privacy.</p>
<p>Many of the people behind these programs are well known for pushing the boundaries of privacy and security online.</p>
<p>The quality of these new programs and services is uneven, and a few have run into trouble.</p>
<p>“What we found is the encryption services range in quality,” says George Kurtz, CEO of Irvine, Calif.-based CrowdStrike, a big data, security technology company. “I feel safe using some built by people who know what they are doing , but others are Johnny-come-latelies who use a lot of buzzwords but may not be all that useful.”</p>
<p>Even so, private services report thousands of new users, and nonprofit, free encryption services say they have also see sharp upticks in downloads.</p>
<p>And for many users, encryption really isn’t enough to avoid the U.S. government’s prying eyes.</p>
<p>In any case, most attacks don’t happen because some cybercriminal used complicated methods to gain entry into a network, he adds.</p>
<p>“Most attacks occur because someone made a mistake. With phishing emails, it just takes one person to unwittingly open an attachment or click on a malicious link, and from there, cybercriminals are able to get a foothold,” Peterson says.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/11/07/what-the-nsa-revelations-mean-for-you/comment-page-1/#comment-34615</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 27 Nov 2013 08:16:23 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=22806#comment-34615</guid>
		<description><![CDATA[UN passes anti-spying resolution
http://news.yahoo.com/un-passes-anti-spying-resolution-193128274.html

UNITED NATIONS (United States) (AFP) – A UN rights committee on Tuesday passed a “right to privacy” resolution pressed by Germany and Brazil, which have led international outrage over reports of US spying on their leaders.

The resolution says that surveillance and data interception by governments and companies “may violate or abuse human rights.”

Fifty-five countries, including France, Russia and North Korea, co-sponsored the text which did not name any target but made lightly veiled references to spying which has put the US National Security Agency at the center of global controversy.

The United States and key allies Britain, Australia, Canada and New Zealand — who together make up the so-called “Five-Eyes” intelligence group — joined a consensus vote passing the resolution after language suggesting that foreign spying would be a rights violation was weakened.]]></description>
		<content:encoded><![CDATA[<p>UN passes anti-spying resolution<br />
<a href="http://news.yahoo.com/un-passes-anti-spying-resolution-193128274.html" rel="nofollow">http://news.yahoo.com/un-passes-anti-spying-resolution-193128274.html</a></p>
<p>UNITED NATIONS (United States) (AFP) – A UN rights committee on Tuesday passed a “right to privacy” resolution pressed by Germany and Brazil, which have led international outrage over reports of US spying on their leaders.</p>
<p>The resolution says that surveillance and data interception by governments and companies “may violate or abuse human rights.”</p>
<p>Fifty-five countries, including France, Russia and North Korea, co-sponsored the text which did not name any target but made lightly veiled references to spying which has put the US National Security Agency at the center of global controversy.</p>
<p>The United States and key allies Britain, Australia, Canada and New Zealand — who together make up the so-called “Five-Eyes” intelligence group — joined a consensus vote passing the resolution after language suggesting that foreign spying would be a rights violation was weakened.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
