{"id":1342,"date":"2014-01-28T21:42:44","date_gmt":"2014-01-29T02:42:44","guid":{"rendered":"http:\/\/www.opensource.im\/?p=1342"},"modified":"2014-01-28T21:42:44","modified_gmt":"2014-01-29T02:42:44","slug":"nsa-spying-on-apps-like-angry-birds-does-surveillance-violate-civil-liberties","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/nsa-spying-on-apps-like-angry-birds-does-surveillance-violate-civil-liberties.php","title":{"rendered":"NSA Spying On Apps Like &#8216;Angry Birds,&#8217; Does Surveillance Violate Civil Liberties?"},"content":{"rendered":"<p><p>    Alluding to private documents provided by former CIA employee    and former NSA contractor Edward Snowden, 30, various    reports detail attempts to amass large amounts of personal    information from users via cell phone carriers and smartphones    by utilizing leaky apps. Snowden disclosed documents to the    Guardian in late 2012 that gave a detailed (and somewhat    disturbing) history of the agency's surveillance on gaming and    electronic activities. The NSA documents also stated that British    and American intelligence organizations forcibly spied on    online activity through Xbox Live, the virtual world Second    Life and the popular MMO World of Warcraft since 2006. 2006.    That means the government has been monitoring your eight-hour    long Gears of War sessions for seven years.  <\/p>\n<p>        Edward Snowden, 30 Courtesy\/Wikipedia  <\/p>\n<p>    When a smartphone user opens Angry Birds, the popular game    application, and starts slinging birds at chortling green pigs,    spies could be lurking in the background to snatch data    revealing the players location, age, sex and other personal    information, the New York Times reported on Jan. 27. The    N.S.A. and Britains Government Communications Headquarters    were working together on how to collect and store data from    dozens of smartphone apps by 2007, according to the documents,    provided by Edward J. Snowden.  <\/p>\n<p>    The shady efforts were part of an initiative entitled the    mobile surge, according to a 2011 British document that    targeted mobile users, calling iPhones and Android phones rich    resources of information.  <\/p>\n<p>    The amount of data aggregated from users wasnt clear. The    documents show the NSA and the British agency regularly    collecting information from specific apps, especially older    applications. With newer apps and games, like 2009s Angry Birds, the agencies have    the ability openly gather personal information from users, but    it remains unclear what government spies are considering    useful. Certain information is possibly more sensitive  a    secret British document from 2012 stated that spies can scrub    apps to find data like an individuals political alignment    and sexual preference. A 2008 document also stated that anyone    using Google Maps on a smartphone is working in support of a    GCHQ system.  <\/p>\n<p>     The NSA has    been tapping into users' smartphones, according to leaked    documents from Edward Snowden. Courtesy\/Wikipedia  <\/p>\n<p>    Earlier this January, President Obama acknowledged    that the electronic invasion of privacy posed a threat to the    civil liberties of Americans and announced major changes to the    manner in which the government finds and uses telephone    records. Americas capabilities are unique, President Obama    said in a speech at the Justice Department    on Jan. 17. And the power of new technologies means that    there are fewer and fewer technical constraints on what we can    do. That places a special obligation on us to ask tough    questions about what we should do.  <\/p>\n<p>    President Obama also empathized with Americans who may be    worrying about electronic personal freedom. In our rush to    respond to a very real and novel set of threats, the risk of    government overreach, the possibility that we lose some of our    core liberties in pursuit of security also became more    pronounced, he added. The combination of increased digital    information and powerful supercomputers offers intelligence    agencies the possibility of sifting through massive amounts of    bulk data to identify patterns or pursue leads that may thwart    impending threats. Its a powerful tool. But the government    collection and storage of such bulk data also creates a    potential for abuse.  <\/p>\n<p>    Yes, we as Americans desire a government that cares about the    safety of its individual citizens  but at what cost? Is it    necessary to usurp a considerable amount of information from    unknowing individuals in the name of protection and safety? Do    you think the NSA is within its rights to monitor our online    and cell phone activity? Leave a comment below.  <\/p>\n<p>    Tweet me!  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to see the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.ibtimes.com\/nsa-spying-apps-angry-birds-does-surveillance-violate-civil-liberties-1549911\" title=\"NSA Spying On Apps Like 'Angry Birds,' Does Surveillance Violate Civil Liberties?\">NSA Spying On Apps Like 'Angry Birds,' Does Surveillance Violate Civil Liberties?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Alluding to private documents provided by former CIA employee and former NSA contractor Edward Snowden, 30, various reports detail attempts to amass large amounts of personal information from users via cell phone carriers and smartphones by utilizing leaky apps. Snowden disclosed documents to the Guardian in late 2012 that gave a detailed (and somewhat disturbing) history of the agency's surveillance on gaming and electronic activities<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-1342","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1342"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=1342"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1342\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=1342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=1342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=1342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}