Selasa, 25 Juni 2019

What If Google Was An Tidings Agency?

(Updated: September 15, 2014)

This fourth dimension nosotros introduce an article written inwards cooperation alongside the French weblog nigh intelligence as well as defence Zone d'Intérêt inwards which nosotros compare the information collection of Google to intelligence agencies similar NSA:


Introduction

Since 1998, Google has grown to go out an essential portion of the spider web infrastructure as well as took an of import house inwards the daily lives of millions. Google offers slap-up products, from search engine to video hosting, blogs as well as productivity services. Each day, users supply Google, willingly as well as candidly, alongside many different sort of personal information, exclusive information as well as files. Google justifies this information collection for commercial purposes, the selling of targeted ads as well as the enhancement of its mostly gratis services.

These terabytes of user information as well as user generated content would go of tremendous value to whatever intelligence service. As one-time manager of CIA as well as NSA Michael Hayden half-jokingly stated at Munk debates: "It covers your text messages, your spider web history, your searches, every search you’ve e'er made! Guess what? That’s Google. That’s non NSA."

But really, how would a companionship similar Google compare to an intelligence agency similar the NSA? How would it go able to gain access to confidential information as well as go out beyond OSINT (Open Source Intelligence)? Does Google fifty-fifty take away hold the resources, information as well as technical capabilities to harvest all-sources intelligence similar a major intelligence service would?

Google's unofficial motto is "Don't go evil", but what if Google started existence evil as well as used all of its collected information every bit an intelligence agency would? What if intelligence professionals had access to Google's resources as well as information ? What would it hateful for the users? And tin this go prevented somehow? (it’s also rather ironic that many people at i time reckon NSA every bit a large evil organization, but Google collects fifty-fifty more)

This is the worst instance scenario we'd similar to explore:
What if Google was an intelligence agency?


Communications to intercept, private information to collect

As a major webmail (425 1000000 active Gmail users inwards 2012 - source: Google I/O 2012) as well as 2nd messaging provider alongside Hangouts, Google has access to the daily communications of millions of individuals, corporations as well as organizations. This privileged access to telecommunication worldwide gives Google the chance to human activeness every bit a major COMINT agency, non dissimilar NSA or GCHQ. Storing its users e-mails as well as broadcasting their 2nd messages alongside sound as well as video, Google is able to obtain a deep-reaching knowledge of their habits, intents as well as projects, either personal, professional person or commercial. Enhanced alongside deportment analysis as well as targeted alongside collection selectors, theses communications, already stored on the company's servers could go used every bit a rattling powerful intelligence database.

NSA entirely stores information that take away hold whatever unusual intelligence value, other information that mightiness go useful are automatically deleted after five years, but how is that alongside Google? In the European Union, administrative authorities inwards accuse of information protection, assembled inwards the Article 29 Working Party of the European Commission (or "G29"), take away hold issued multiple warnings as well as penalties against Google regarding this issue. In Jan 2014, the french CNIL, an Art. 29 Working Party member, issued a 150 000€ monetary penalization to Google for failing to define retentiveness periods applicable to the information which it processes. Data collected yesteryear Google isn't every bit strictly regulated as well as controlled every bit information collected yesteryear intelligence agencies, as well as it tin remain on Google's servers until the companionship decides to delete it, at its ain discretion.

And how nigh the run a peril if internal policy as well as privacy violations yesteryear Google personnel? Does Google has access command machinery simply every bit strict as well as tight every bit the compartimentalization as well as ‘need-to-know’ at NSA? They should have, every bit Google has far to a greater extent than information nigh ordinary people inwards its databases, which could go much to a greater extent than tempting to await at for employees than for instance all the armed services as well as terrorism materials that NSA collects. But Google also has to protect this information against unusual intelligence agencies.

Google also provides its users alongside telephone services through its Android telephone as well as tablet operating system, alongside 1 billion users worldwide inwards 2014 (source: Google I/O 2014). This could go used every bit an chance to monitor the calls - made or received - yesteryear its users, collect their metadata as well as fifty-fifty tape their calls for intelligence purposes. This also goes for SMS as well as MMS transportation or received yesteryear its users, every bit android users transportation twenty billion text messages each 24-hour interval (source: Google I/O 2014). NSA’s database for SMS-messages DISHFIRE receives simply around 200 1000000 messages a day. Google is expanding the arrive at of its telephone services, every bit calls to landline as well as mobile phones tin go placed from Hangouts yesteryear whatever user of Gmail, Google+ as well as Chrome, fifty-fifty without using an Android device. With Fiber, Google is providing Internet service provider services to 3 cities inwards the United States, alongside plans to expand. Google fifty-fifty wants to innovate network access to remote areas inwards Africa via solar-powered balloons – which would also go out far much easier for NSA, every bit many of these regions are also terrorist-related conflict zones where there’s oft entirely mobile telephone as well as radio traffic, which is to a greater extent than hard to intercept than network traffic, specially when the latter goes through a US company.

The expanding realm of its webmail as well as cloud services provides Google alongside a rare trove of otherwise private private information as well as fifty-fifty confidential information from governments as well as companies. With Gmail, Google has access to sensitive information nigh individuals, such every bit their names, telephone numbers, addresses or fifty-fifty social safety numbers which may transit via e-mail. Logins as well as passwords from spider web services are oft sent yesteryear e-mail, as well as so are activation as well as authentication codes. Many users want to take away hold wages of the gratis services offered yesteryear Gmail as well as automatically frontward e-mails from other webmails or their companionship e-mail address to their Gmail address, creating a POP/SMTP link. Doing so, they growth the amount of e-mails as well as information accessible to Google. Private information nigh individuals, from wellness as well as fiscal issues to clues nigh their emotional province or human relationship status tin go found inwards e-mails. Everything from their buying habits, reading habits or subscriptions, to confidential information, tin go extracted from e-mails using already available software, as well as and so easily exploited yesteryear intelligence professionals.

Contact lists from services similar Gmail, Hangouts, Google+ as well as from operating systems similar Android as well as Chrome OS would go a valuable root for intelligence analysts, every bit they allow to position links betwixt individuals as well as perform social network analysis. Contacts lists were used inwards many occasions yesteryear intelligence agencies leading investigations against terrorist cells or organized criminal offence groups, but tin also go used inwards social engineering schemes or commercial intelligence.

Corporate information is hosted yesteryear Google through most of its services, every bit Gmail is used yesteryear many entrepreneurs as well as employees, whether it is duly authorized yesteryear their companionship or not. Important information tin go retrieved inwards e-mails, such every bit details of industrial projects, line of piece of job organisation offers as well as everyday companionship communications. Many companies utilisation Gmail attachments to transportation as well as have corporate documents or utilisation Google Drive to shop their information. Google Calendar tin also supply a slap-up window into the daily activities of a company, every bit a way to position links betwixt individuals, go alerted of forthcoming meetings,  receive status reports from ongoing projects, or deduce a precise timeline of employees piece of job habits. Recently, Google announced that 58% of Fortune 500 companies take away hold "gone Google" as well as so did 66% of "50 elevation Start-Ups" as well as 72 of the 100 best universities (Source: Google Enterprise).

Given all these information containing oft highly sensitive as well as private information, it is remarkable that people, businesses as well as organisations are so willing to trust it into the hands of Google. One wonders why some people actually don’t similar it when authorities officials could take away hold access to such sort of information, but patently completely trust the Google personnel. Who guarantees that Google isn’t looking into confidential information of other businesses that tin go of interest?

Google Search, the commencement service provided yesteryear Google since 1998, receives nigh 100 billion searches per calendar month as well as is a slap-up tool used every 24-hour interval yesteryear intelligence professionals. Google search crawlers scan the spider web for private URLs, spider web pages as well as files, using the Google powerful servers. They are able to record, collect as well as cache whatever sort of text content, images, video as well as sound files, as well as most document formats such every bit Word as well as PDF. Google Search tin go used to uncovering unrestricted or insufficiently secured subdomains, files, folders as well as archives, from websites as well as networks. Using advanced operators, Google tin go used to uncovering misplaced confidential information as well as other vulnerabilities. If there’s i application that is able to read your deepest thoughts, fears as well as desires, similar Edward Snowden said NSA is capable of, as well as so it is Google Search.


Individuals to identify, targets to monitor

Google Search tin also go exploited for advanced statistics, deportment analysis of users, identification of unmarried users, as well as to locate them. Using cookies as well as connectedness information recorded yesteryear Google for every search, such every bit IP address, user agent as well as search terms, the user tin go identified as well as located to a for certain extent. Taking wages of persistent cookies, IP adresses as well as forensic techniques, such every bit discourse analysis or syntax analysis, as well as sifting through recorded searches, online activity through Google services tin as well as so go narrowed downward to a unmarried organization, a laid of users or fifty-fifty a unmarried user.

Recording exactly the search damage from an identified user, companionship or arrangement tin aid an intelligence professional person create new, to a greater extent than efficient selectors for intelligence collection as well as communication interception, based on the involvement of users as well as unique searches. For example, many companies volition utilisation Google to uncovering novel line of piece of job organisation prospects, partners or suppliers. Journalists volition do background checks on their sources using Google. Scholars as well as scientists volition do their question using Google search, revealing precise information nigh what they are looking for as well as what they are working on.

Similar information is collected on many other websites which are non owned or related to Google, but which brand utilisation of Google Analytics, a Google-run service allowing webmasters to collect detailed information nigh their users, such every bit their IP addresses (collected yesteryear Google but non shown to webmasters), what search damage they used to arrive at their websites as well as which pages they browsed. While challenging sanctions from the European Art. 29 Working Party, Google refuted that an IP address constitutes personal data, fifty-fifty when associated alongside information from cookies, as well as should non go treated every bit such regarding privacy issues. Which i time once again shows the different views on privacy  in Europe as well as the US

But Google has access to much to a greater extent than precise information to position users as well as monitor their online activities. Some services, such every bit Gmail, require users to go registered as well as to give accurate personal information, such every bit their existent name, their birthdates, their dry reason of residence or some other e-mail address they own. Google is also pushing two-factor authentication, requiring that their users expose an active telephone number. While launching its Google+ service, which is at i time linked to other services such every bit Gmail as well as Youtube, Google discouraged the utilisation of pseudonyms as well as required that all users registered using their existent name, or run a peril line of piece of job organisation human relationship suspension. In Oct 2012, G29 issued a recommendation to Google that it must inform novel users to a greater extent than clearly that they tin sign-up to a Google line of piece of job organisation human relationship without providing their existent name.

 When users utilisation whatever Google service piece logged in, or alongside Google cookies activated, or fifty-fifty from an IP address which was previously used piece logged in, all of their online activity transiting on Google networks tin go traced dorsum to them. On many occasions, personal files as well as documents stored on Google Drive, or images stored on Google+ Images as well as Picasa could go traced yesteryear Google dorsum to the existent call of a registered user. E-mails, 2nd messages, personal documents, videos as well as pictures, all stored yesteryear Google, tin go used to create a rattling consummate as well as precise profile of a unmarried individual. According to numbers published yesteryear Google during I/O 2014, Android users transportation "93 millions selfies" each day.

The Google prototype search algorithm is able to position faces as well as places inwards pictures. The prototype search facial recognition characteristic is entirely activated to uncovering pictures of celebrities, but Google+ Photos includes an opt-in service called "Find My Face" capable of automatically recognizing as well as tagging the user's human face upward inwards photos uploaded yesteryear him or yesteryear his friends. Google implemented a "Face Unlock" characteristic inwards Android, allowing users to unlock their devices using their camera, showing that Google's recognition algorithms are precise plenty to position an individual, fifty-fifty alongside slight changes due to lighting atmospheric condition or human face upward expression. In addition, Google recurring pop-ups incite Android users to activate a portion which automatically uploads all novel photographs taken alongside their device to Google+ Photos as well as Google Drive. EXIF information as well as geotags from each photograph are collected too. As some other option, Google prototype search has a "reverse prototype search" functionality which allows whatever user to upload an prototype from his reckoner as well as allow Google's designing recognition algorithm uncovering similar images. In the aid department of Google's prototype search, it is stated that "any images or URLs that yous upload volition go stored yesteryear Google".

Google's photos database would go an extraordinary tool to whatever intelligence professional person trying to uncovering someone, acquire nigh its habits or position people he is related to. Recently, intelligence agencies such every bit the American DIA (Defense Intelligence Agency) or the French DGSE take away hold been acquiring commercial software to collect videos as well as photos posted online for intelligence purposes, which shows the involvement of intelligence analysts for user generated content. In 2010, Google invested 100 1000000 dollars inwards Recorded Future a companionship specializing inwards information mining, advanced statistics, network traffic monitoring as well as defence intelligence. Recorded Future was also funded yesteryear In-Q-Tel, the engineering investment line of piece of job solid of the CIA.

Using information collected through Google Voice Search as well as Google Now, intelligence technicians could go able to build a large phonemes database to heighten discussion recognition algorithms, but also to implement vocalism recognition inwards guild to position unmarried users based on their voice. For advanced target monitoring, the microphone from a computer, tablet or smartphone running Android or Chrome OS could go activated inwards guild to eavesdrop on a target, using OS-level or App-level backdoors. Coupled alongside vocalism recognition, these techniques could go used to position as well as locate targets.

In such a scenario, OS-level access could go used to implement backdoors for keylogging, password collection, communication intercepts, microphone or photographic tv set camera hijacking, or fifty-fifty GPS soundless activation as well as monitoring. Access to Google's database would brand network penetration easier, every bit Android devices tape the WiFi passwords from secured access points they connect to as well as shop them to the cloud.


Map whatever place, locate anyone

In 2004, Google acquired Keyhole, a companionship partly funded yesteryear the CIA as well as the NGA, which developed the engineering behind Google Earth, a Google production which provides users alongside maps as well as commercial satellite imagery from around the world. Other Google mapping initiatives are Google Maps as well as Street View. Google footing is used yesteryear many intelligence professionals, whether they piece of job for authorities agencies or for private contractors, as well as is oft listed every bit a mutual tool inwards intelligence sector task descriptions as well as resumes.

Influenza A virus subtype H5N1 useful characteristic of Google Maps as well as Google footing is the powerfulness for users to add together tags, photos as well as points of interests (POI) over the maps as well as imagery provided yesteryear Google. This characteristic results inwards crow-sourced sets of maps, which are improved yesteryear the output of users who take away hold goodness knowledge of the places they describe, whether they are travelers, dwellers or experts. This footing knowledge is obtained at no toll yesteryear Google as well as tin resultant inwards rattling detailed descriptions, fifty-fifty from remote places. Google also benefits from the geotagged photographs from Panoramio, acquired yesteryear Google inwards 2007, as well as from POIs added yesteryear users participating inwards Google side-projects, such every bit Niantic Labs' Field Trip as well as Ingress applications. Google lately acquired the imaging companionship Skybox, taking wages of its growing constellation of satellites.

Another way for Google to acquire intel from the footing as well as improve its worldwide mapping capabilities is Street View, yesteryear which Google collects 360° snapshots along roads as well as trails. With Street View, Google is able to acquire detailed as well as fresh information nigh buildings, installations as well as constructions. This collection attempt fifty-fifty captures photos from remote places or restricted areas, such every bit armed services bases or intelligence facilities (examples: MI5 installation inwards the United Kingdom, DGSE station inwards France) Google has lately announced Project Tango, which is aimed at developing novel sensors for mobile devices, inwards guild to map their surround inwards 3D, such every bit the interior of buildings. Access to the photographs as well as geospatial information collected yesteryear Google through Google Maps, Street View, Google footing as well as Panoramio, but also from search crawlers as well as user content uploaded to the cloud, would go of considerable involvement to intelligence technicians. For instance, Letitia A. Long, manager of the National Geospatial Intelligence Agency (NGA) lately stated that her agency was increasingly taking wages of information collected through opened upward sources as well as social networks. In these cases the possibilities of Google’s commercial tools seem to take away hold already outpaced those used yesteryear authorities agencies.

Google is also making considerable attempt inwards exactly locating its users. Users are oft prompted to authorize their localization yesteryear Google services, from Google Search to Google Maps as well as Android. To accomplish precise location of a user, Google is using all information available, from search queries which lift a place, to IP addresses as well as connectedness data, to GPS signal provided yesteryear the user's device.* Google also uses a patiently crafted database of Wi-Fi access points, hotspots as well as jail cellphone towers, which contains MAC addresses, BSSIDs as well as Cell IDs. This information is collected yesteryear Google Street View cars, contractors, but also when a user device allows localization privileges to a Google service or application. This worldwide crowd-sourced database is rattling detailed, precise as well as regularly updated. This information collection is oft running inwards the background on users' devices as well as supply Google alongside the precise location of many of its users.

For intelligence purposes, geolocation information could go used to silently rails a target or acquire information nigh their routines. Localization information is stored as well as logged yesteryear Google, as well as tin go accessed yesteryear registered users inwards their Location History. Access to such information yesteryear intelligence technicians could go used for deportment analysis, remote surveillance, forensics as well as social network analysis. Combined alongside Google access to many Wi-Fi passwords, a precise map of MAC addresses worldwide would supply intelligence technicians as well as operators alongside an chance to comport network penetration as well as communication intercepts. All this could go rattling valuable for agencies similar NSA, every bit some of the Snowden-documents showed that they at i time take away hold to position much attempt inwards mapping such communication networks “from the outside”.


A proxy inwards intelligence collection?

Google collects user information for commercial purposes, mainly to sustain its line of piece of job organisation model based on online targeted ads, which accounted for 96% of Google's revenue inwards 2011. However, Google is sharing its worthy information alongside governments as well as their intelligence services, when complying alongside courtroom orders or local laws. According to its Transparency Report, inwards 2013 Google complied to thousands of user information requests from governments of countries such every bit the United States, India, France, Germany, United Kingdom, Brazil or Italy. Google reports that it provides user information to "law enforcement agencies", but does non province exactly what sort of information is given. As example, Google cites IP addresses as well as personal information given yesteryear the users when they register, but it is non clear whether or non information provided to authorities is restricted to these elements. Given the large amount of information collected as well as stored yesteryear Google on every user, authorities agencies could have a rattling detailed history of a user's communications as well as online activity, or fifty-fifty a re-create of its hosted files.

In recent NSA as well as FBI intelligence collection programs, user information tin go requested nether a legal framework, such every bit FISA requests, which does non authorize Google to inform its users of the request. Moreover, undercover intelligence efforts gave the NSA access to Google's data, without the demand for legal requests.

In most democratic countries, intelligence services aren't allowed to intercept communications from their citizens nor to collect user information without  the authorization of a approximate or commission. Many intelligence activities are meant to go constrained yesteryear the dominion of law as well as monitored yesteryear congressional oversight to ensure that private liberties are respected. However, commercial companies are non discipline to the same restrictions as well as tin collect a lot of their users data, every bit long every bit they duly inform them.

Such loophole tin go purposely exploited yesteryear an intelligence agency, taking wages of the ever-growing database from large companies such every bit Google, either yesteryear legally requesting the information collected from their users or yesteryear trying to access it covertly. In such occurrences, Google would human activeness every bit a proxy inwards intelligence collection, unwillingly (?) putting its resources at the disposal of intelligence services. Citizens as well as businesses may non want to part every bit much private information as well as contents alongside an network services companionship given the possibility that it may afterward go accessed yesteryear intelligence services, domestic or foreign.

One major declaration against the collection of information conducted yesteryear NSA (or other intelligence angencies) is that they tin go used against the people when authorities is taken over yesteryear evil people. Western governments at to the lowest degree take away hold checks as well as balances, but Google is simply a commercial company, as well as what would occur when, say, some huge  Chinese companionship would take away hold it over? Then our consummate digital lives would go nether command of people who aid less nigh private liberty as well as privacy. As in all probability no i (especially the US government) wants that to happen, Google volition take away hold to remain an American companionship i way or some other – which makes it fifty-fifty to a greater extent than similar a proxy for US intelligence.

In a recent case, Google tipped off the National Center for Missing as well as Exploited Children after scanning the emails of its users, looking for contents related to kid pornography. It seems that Google was non asked yesteryear a law enforcement agency to monitor the communications of a unmarried user nether investigation, or fifty-fifty to scan emails for suspicious contents. Google acted on its own, scanning emails, perchance on a massive scale, to uncovering suspicious activities. Even though going against kid exploitation tin go seen every bit a noble endeavor, it seems that Google may go running its ain law enforcement operations, scanning its users' information for what it deems illicit. As Google gives fiddling information nigh the company's operations, it is hard to know what sort of users' activities could go monitored yesteryear Google as well as proactively reported to authorities or others organizations. It is non clear if this proactive reporting entirely occurs inwards the United States, or if it may extend to other, less democratic countries.


Closing thoughts

From an intelligence standpoint, the sheer amount of information that Google collects nigh individuals as well as businesses is unrivaled. Influenza A virus subtype H5N1 unmarried slice of information recorded yesteryear Google nigh a user could go considered innocuous, but the total of all collected information which tin go narrowed downward to an private or an arrangement gives an intimate moving-picture demo of its thoughts, intent as well as activity.

The way Google systematically tries to gain access to novel sort of information nigh its users, whether it's their e-mails, their piece of job files, their personal pictures, their location, or confirmation of their existent identity, is propelled yesteryear a commercial strategy as well as a so-called want to "change the world", making their users' lives easier. However, this "know-it-all" approach facilitates information mining efforts from intelligence services which pursued programs such every bit "Total Information Awareness" as well as are conducting large-scale intercepts.*

Of course, this number is non confined to Google but affects other companies such every bit Amazon, Apple or Facebook, every bit good every bit many other smaller companies. Still, Google owns a special house inwards the digital public of user data, every bit it concentrates a broad arrive at of user information, operates telephone as well as electronic mail services, develops operating systems as well as stores users files inwards the cloud. Google holds a large responsibleness to ensure the safety as well as privacy of its users information worldwide, but its ongoing efforts to do so tin hardly go considered sufficient.

Google safety practices are by as well as large considered province of the fine art as well as the companionship lately announced back upward for end-to-end encryption inwards GMail, but the torso of messages volition remain unencrypted on Google's servers as well as accessible to the company's bots. In october 2013, Google became aware of a covert network penetration Pb yesteryear the NSA, targeting communications links connecting the company's information centers, which were non encrypted.* The exact amount of user information which may take away hold been collected yesteryear the NSA during the functioning is nevertheless unclear.

- Google privacy policy is sometimes cloudy, as well as users trying to acquire informed nigh what information they release to Google, how this information volition go used as well as how long it volition go retained, take away hold to sift through disclaimer pages scattered on Google's websites.

- As a major stakeholder inwards the worldwide web, Google has to choose to a greater extent than accountability as well as transparency nigh what is shared from its users. The user information that could potentially go provided to law enforcement agencies should go clearly as well as exactly marked every bit such. It should go out clear to all users that some of their data, whether it's personal information, files, e-mails, messages, metadata from network traffic or telephone calls, or fifty-fifty recorded communications may go out available to intelligence services.

- Also, Google should clarify if this information tin go provided entirely to the law enforcement agencies of the user's dry reason of residence or also to U.S. of A. of America authorities agencies, every bit Google is an American companionship alongside most of its servers as well as activities inwards the US.

- American spider web companies as well as cloud operators are facing growing critics nigh their vulnerability to US intelligence operations. Some inwards Europe advocates for sovereign "national clouds" restricting information retentiveness as well as traffic betwixt secured servers as well as users, forbidding access to the American government. During an hearing earlier the U.S. of A. of America Senate inwards Nov 2013, Richard Salgado, Google's manager for law enforcement as well as information security, stated that "in the wake of press reports nigh the so-called "PRISM" program", he was concerned yesteryear the tendency of "data localization" that could resultant inwards the creation of a "splinternet" as well as the "effective Balkanization of the Internet". Data localization would also in all probability toll to a greater extent than to Google, as well as would house the companionship nether the law of each dry reason where the companionship processes user data. In many cases Google argued that it was established inwards the U.S. of A. of America as well as hence was non subjected to the law of European countries, every bit all information processing occurs inwards the USA. However inwards France, Google was imposed a (small) fiscal penalization every bit the administrative say-so made clear that the companionship had to comply alongside the French Data Protection Act.

- Google cannot condone a systematic breach of confidentiality as well as privacy of its users. Influenza A virus subtype H5N1 call to reform US authorities surveillance laws cannot go considered enough. Google must implement proactive measures, reinforcing its network security, offering end-to-end encryption for all of its services, securely distribute users' files hosting inwards their countries of residence as well as amend inform its users of privacy risks. These measures could go seen every bit costly, but are necessary to hold the trust of Google's user base of operations as well as master copy root of revenue.


Google has massive technical capabilities for user information retention, metadata collection, telecommunication monitoring, localization, mapping as well as imaging, all which could allow it to human activeness every bit an intelligence agency. The master copy departure is that Google has a different goal (commercial) than an intelligence agency, but this also makes that Google gathers far to a greater extent than information than an intelligence agency is legally allowed to do.

How long is user information kept on Google's servers? What sort of user information is shared alongside law enforcement agencies or intelligence services around the world? How does Google forestall its employees to access their users personal information or location? How is the information yous gave Google secured against hackers or from intelligence services malicious attacks?

Google don't actually say, but yous take away hold to take away hold their discussion for it.



Update:
On September 15, 2014, Wikileaks-founder Julian Assange told the Italian paper L'Espresso that he at i time wants to warn against Google: "They believe they are doing good, but they are at i time aligned alongside US unusual policy. This agency that Google tin intervene on behalf of US interests, for example, it tin destination upward compromising the privacy of billions of people, it tin utilisation its advertising powerfulness for propaganda".


Links
- Protest site: Reform Corporate Surveillance

Tidak ada komentar:

Posting Komentar