{"id":46,"date":"2014-01-05T17:56:48","date_gmt":"2014-01-05T17:56:48","guid":{"rendered":"http:\/\/www.opensource.im\/?p=46"},"modified":"2014-01-05T17:56:48","modified_gmt":"2014-01-05T17:56:48","slug":"businesses-deny-helping-nsa-plant-bugs-in-americans-gadgets","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/businesses-deny-helping-nsa-plant-bugs-in-americans-gadgets.php","title":{"rendered":"Businesses Deny Helping NSA Plant Bugs in Americans&#8217; Gadgets"},"content":{"rendered":"<p><p>NSA spying could  wreak havoc on the national economy, cost the IT space $35-45  billion, creating a digital recession  <\/p>\n<p>    The stuff of dystopian science fiction has    become the reality that Americans are living in. Newly    published documents reveal the U.S. National Security Agency    (NSA) is engaging in     behavior that many Constitutional experts condemn as    criminal.  <\/p>\n<p>    I. No One is Safe From Those Who Claim to Protect Our    Safety  <\/p>\n<p>    To the NSA     every American is a potential criminal. So it uses        techniques it borrowed from cybercriminals against     every American.  <\/p>\n<p>    Every American is a target.     Your data is mined. It is \"temporarily\" stored for 15    years. If you type a suspicious query in search engines    or social networks, the NSA's     autonomous attack system, targets you for deep    attacks. These deep attacks reportedly literally    watch tens of thousands, if not millions of Americans via    compromised webcams.<\/p>\n<p>    The NSA has admitted to     violating the law \"accidentally\" thousands of times a year,    but refuses to allow outside parties to inspect its    behavior. It won't even given special Congressional    committees the full story on its tactics. Agents have    spied on former lovers. And documents show the last two    Presidents have spied on political rivals (including Quakers    and Occupy Wall Street activists).  <\/p>\n<p>    But the NSA documents reveal in Germany this week show there's    more.  <\/p>\n<p>    II. Complicit or Victims? Either Way the Sabotage    Threatens to Create an American IT Industry Recession  <\/p>\n<p>    Jacob Appelbaum, a University of Washington (UW) security research    remarked in a weekend keynote:  <\/p>\n<p>      This part of a constant theme of      sabotaging and undermining American companies and American      ingenuity. As an American, while generally not a nationalist      I find this disgusting, especially as someone that writes      free software and would like my tax dollars spent on      improving these things. And when they know about them I don't      want them to keep it a secret because all of us are      vulnerable. It's a really scary thing.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original: <\/p>\n<p><a target=\"_blank\" href=\"http:\/\/dailytech.feedsportal.com\/c\/34650\/f\/635057\/s\/3566db7c\/sc\/30\/l\/0L0Sdailytech0N0CBusinesses0KDeny0KHelping0KNSA0KPlant0KBugs0Kin0KAmericans0KGadgets0Carticle340A220Bhtm\/story01.htm\" title=\"Businesses Deny Helping NSA Plant Bugs in Americans' Gadgets\">Businesses Deny Helping NSA Plant Bugs in Americans' Gadgets<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> NSA spying could wreak havoc on the national economy, cost the IT space $35-45 billion, creating a digital recession The stuff of dystopian science fiction has become the reality that Americans are living in. Newly published documents reveal the U.S<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-46","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/46"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=46"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/46\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=46"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=46"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=46"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}