¤¢¤Ê¤¿¤Ï¡¢¥¢¥á¥ê¥«¤ÎCIA¤È¥¤¥¹¥é¥¨¥ë¤Î¥â¥µ¥É¡¢¤½¤ì¤Ë±Ñ¹ñ¤ÎM16¤ÎĵÊ󵡴ؤ¬·±Îý¤·¤¿¥¢¥ë¥«¥¤¥À¤ä¥¤¥¹¥é¥à¹ñ¡ÊSISI)¤¬¥Æ¥í¤òÉÑÈˤ˵¯¤³¤·¤Æ¤¤¤ëÍýͳ¤ò¤´Â¸ÃΤǤ¹¤«¡£¤½¤Î¥Æ¥í¤¬¡¢¤ä¤¬¤Æ¤ÏÆüËܹñÆâ¤Ç¤âµ¯¤³¤ë¤Ç¤·¤ç¤¦¡£Æ±¤¸Íýͳ¤Ç¡£
¡Ê»²¹Íµ»ö¡Ë
¡üBlowback! U.S. trained Islamists who joined ISIS
ȿư¡ª¥¢¥á¥ê¥«¤Ï¡¢ISIS¤Ë²Ã¤ï¤Ã¤¿¥¤¥¹¥é¥à¶µÅ̤ò·±Îý¤·¤¿
¡üISIS Colonel Was Trained by Blackwater and U.S. State Department for 11 Years¡¡¡¡June 11, 2015
ISIS¡Ê¥¤¥¹¥é¥à¹ñ¡ËÂ纴¤Ï11ǯ´Ö¡¢¥Ö¥é¥Ã¥¯¥¦¥©¡¼¥¿¡¼¡Ê¥â¥ó¥µ¥ó¥È¤Î»Ò²ñ¼Ò¡Ë¤ÈÊÆ¹ñ¹ñ̳¾Ê¤Ë¤è¤Ã¤Æ·±Îý¤µ¤ì¤¿¡¡¡¡2015ǯ6·î11Æü
¡üArms Airlift to Syria Rebels Expands, With Aid From CIA¡¡
¥Ë¥å¡¼¥è¡¼¥¯¡¦¥¿¥¤¥à¥º»æ¤Ë¤è¤ë¤È¡¢ÊƹñCIA¤Ë¤è¤ëÈ¿¥·¥ê¥¢¥¢¥µ¥ÉÂçÅýÎÎÀªÎϡʥ·¥ê¥¢ÌîÅޤ䥤¥¹¥é¥à¹ñISIS¤ä¥Æ¥í¥ê¥¹¥ÈÅù¡Ë¤Ø¤ÎÉð´ï±ç½õ¤Ï£²£°£±£²Ç¯¤Ë³«»Ï¤·¡¢£²£°£±£³Ç¯¤«¤é¤½¤Îµ¬ÌϤϳÈÂ礷¤¿¤ÈÅÁ¤¨¤Æ¤¤¤ë¡£
¡üConfirmed: Obama¡Çs Brother In Bed With Terrorists
¥Ð¥ë¥¯¡¦¥ª¥Ð¥ÞÂçÅýÎΤη»Äï¥Þ¥ê¥¯¡¦¥ª¥Ð¥Þ¤Ï¡¢¥Æ¥í¥ê¥¹¥È¤È¿ÆÌ©¤Ê´Ø·¸¡¡
¥ª¥Ð¥ÞÂçÅýÎΤη»µ®¤Ï¥¤¥¹¥é¥à¥Æ¥íÁÈ¿¥IDO¤Î»ö̳¶ÉĹ
¥ª¥Ð¥ÞÂçÅýÎΤ¬·»¥Þ¥ê¥¯¡¦¥ª¥Ð¥Þ¤ò²ð¤·¤ÆÊÌÅӥƥíÁÈ¿¥¤Ë»ñ¶â¤òή¤·¤Æ¤¤¤ë
º£²ó¤ÏÀèÆü¤Îµ»ö¡Ø°ÂÇÜÀ¯¸¢»Ô̱µÔ»¦¤Î¥·¥Ê¥ê¥ª¡¡2016/5/17(²Ð) ¡Ù¤ÎÊäµ»ö¤Ç¤¹¡£¡ÊÃ𣱡Ë
¡ÊÃ𣱡ËÀèÆü¤Îµ»ö¤ÎURL¡¡
¡Ø°ÂÇÜÀ¯¸¢»Ô̱µÔ»¦¤Î¥·¥Ê¥ê¥ª¡¡2016/5/17(²Ð) ¡Ù
»ä¤Î¥Ö¥í¥°µ»ö¤ÇºÆ¡¹´í¸±¤Ë¤Ä¤¤¤Æ½Ò¤Ù¤Æ¤¤¤ë¤Î¤Ï¡¢ÆüËܤǤϰì»þŪ¤Ë¤ÏÁû¤°¤±¤É¿Í¤Î±½¤â£·£µÆü¤Ç¡¢²¿»ö¤â̵¤«¤Ã¤¿¤³¤È¤Ë¤Ê¤ë¤«¤é¤Ç¤¹¡£
¡Ø¹¢¸µ¤¹¤®¤ì¤ÐÇ®¤µËº¤ì¡Ù¤È¸À¤¦¤è¤ê¤â¡¢¡Ø¹¢¸µ¤ÎÇ®¤µ¤Ëľ¤°¤ËÆë¤ì¡Ù¤Ç¤¢¤ê¡¢°¿¤Ï¡¢¡Ø¹¢¸µ¤ÎÇ®¤µ¤Ëµ¤ÉÕ¤«¤º¡Ù¤Ç¡¢¿å²¹¤ÎÊѲ½¤Ëµ¤¤Å¤«¤Ê¤¤Î¾À¸Îà¤Î¥«¥¨¥ë¤Ê¤ó¤Ç¤¹¡£
¤Þ¤¢¡¢¼«Ê¬¤À¤±¤Ï°ÂÁ´¤À¤È»×¤Ã¤Æ¤¤¤ë¤Î¤«¡¢°¿¤Ï¡¢½ç±þÀ¤¬¹â¤¹¤®¤ë¤È¸À¤ª¤¦¤«¡¢°¿¤Ï¥Î¡¼¥Æ¥ó¥¤Î̵´Ø¿´¤È¸À¤ª¤¦¤«¡¢·¯»Ò´í¤¦¤¤Î¶á´ó¤é¤º¤È¤¤¤ª¤¦¤«¡¦¡¦¡¦¡£
»ä¤¿¤ÁÆüËܹṉ̃¤Ïº£¤ä³¸¤ò¤µ¤ì¤¿¸Þ±¦±ÒÌçÉ÷Ϥ¤ÎÃæ¤Ç¡¢¤¸¤ê¤¸¤ê¤ÈÅò²¹¤¬¾å¤¬¤ê¡¢¤ä¤¬¤ÆÊ¨Æ¤¹¤ë¤È¤¤¤¦¤Î¤ËÇϼªÅìÉ÷¤Ê¤ó¤Ç¤¹¡£
»ÒÍӤ粤ì¤Î¤´¤È¤¯¡¢¼«¤é¤Î´ã¤Ç¼þ°Ï¤ò¸«¤Æ¾õ¶·È½ÃǤò¤¹¤ë¤³¤È¤Ê¤¯¡¢¤¿¤À¤Ò¤¿¤¹¤éÁ°¤òÊâ¤à»ÒÍÓ¤¿¤Á¤Î¸å¤òÄɤäƤ¤¤ë¤À¤±¤Ê¤Î¤Ç¤¹¡£»ÒÍÓ¤ÎÀèÆ¬¤¬ÍÓ»ô¤¤¤Î¸¤¤¿¤Á¤ËƳ¤«¤ì¡¢Ãdz³ÀäÊɤÎÀèü¤Þ¤ÇÄɤ¤¹þ¤Þ¤ì¤Æ¤¤¤ë¤È¤¤¤¦¤Î¤Ë¡£
Mesmerising Mass Sheep Herding¡¡£±Ê¬£³£¶ÉÃ
ÌîÅÄÀ¯¸¢¤Ç¤Ï¸Ä¿Í¾ðÊó¤ò±ÜÍ÷¡¦¼ý½¸¤Ç¤¤ë¤è¤¦¤Ë¤·¤Þ¤·¤¿¤Í¡£¡ÊÃ𣳡ˡ¡
¡ÊÃ𣳡ˡ¡¡ØÌÀÆü£³·î£±Æü¤«¤éÁ´¤Æ¤Î¸Ä¿Í¾ðÊ󤬽¸Ì󤵤ì¤ë¡ª¡Ù¡¡2012/2/29(¿å)
°ÂÇܼóÁ꤬²¿Å٤ⶫ¤ÖÊÆ¹ñÈÇÊÆ¹ṉ̃£¸£°£°Ëü¿ÍÂçµÔ»¦¥×¥í¥°¥é¥àFEMA¡Ê¥Õ¥£¡¼¥Þ¡Ë¤òÌÏÊ路¤¿ÆüËÜÈÇFEMA¡Ê¥Õ¥£¡¼¥Þ¡Ë¤ÎÁÏÀߤ˰ÂÇܼóÁê¤Ï´û¤ËÃå¼ê¤·¡¢½ç¼¡Ë¡À°È÷¤Ë¼è¤êÁȤó¤Ç¤¤¤Þ¤¹¤Í¡£º£²ó¤Î¡Ø·º»ö»ÊË¡À©ÅÙ²þ³×´ØÏ¢Ë¡°Æ¡Ù¤â¡¢¤½¤Î°ì´Ä¤Ê¤Î¤Ç¤¹¡£
°ÂÇÜÀ¯¸¢¤Ç¤Îº£²ó¤Î¡Ø·º»ö»ÊË¡À©ÅÙ²þ³×´ØÏ¢Ë¡°Æ¡Ù¤ÎÃæ¤Î°ì¤Ä¤È¤·¤Æ¡¢·Ù»¡¤¬Âè»°¼Ô¤Î´Æ»ë¤Ê¤·¤Ë¡¢¸Ä¿Í¤ÎID¤ä¥Ñ¥¹¥ï¡¼¥É¤òÆþ¼ê½ÐÍè¡¢¤¢¤Ê¤¿¤Î¥á¡¼¥ë¤äÅÅÏäÎÁ÷¼õ¿®ÆâÍÆ¤äº£¤É¤³¤Ë¤¤¤ë¤«¤Ï̵ÏÀ¤Î¤³¤È¡¢¤¢¤Ê¤¿¤¬¥«¡¼¥É¤Ç²¿¤òÇã¤Ã¤¿¤Î¤«¡¢¤¢¤Ê¤¿¤Î¶ä¹ÔͶâ¤Ï´ö¤é¤«Åù¤ò½Ö»þ¤ËÇİ®¤Ç¤¤ë¤è¤¦¤Ë¤Ê¤ë¤ó¤Ç¤¹¤Í¡£
¤³¤Î¶²¤í¤·¤µ¤ò¸ì¤ë¤Î¤Ï¼¡¤Ë¤·¤Æ¡¢°Ê²¼¤Ï¡¢ÊƹñÈÇFEMA¤ÎË¡À°È÷¤ÎÆâÍÆ¤Ç¤¹¡£
ÊÆ¹ñ¥ª¥Ð¥ÞÂçÅýÎΤϺòǯ¤Î£²£°£±£µÇ¯¡¢'USA Freedom Act' ¡ØÊƹñ¼«Í³Ë¡¡Ù¤Ë¥µ¥¤¥ó¡£Êƹṉ̃¹ñÂçµÔ»¦¤ÎFEMA¡Ê¥Õ¥£¡¼¥Þ¡Ë¤Î°ì´Ä¤È¤·¤Æ¡¢¹ñ¤Îµ¡´Ø¤Ç¤¢¤ëCIA¤ÈFBI¤ÏÎá¾õ¤Ê¤·¤Ë¼«Í³¤Ë¸Ä¿Í¤Î¥¦¥¨¥Ö¤Î¾ðÊó¤òÆþ¼ê¤Ç¤¤ë¤è¤¦¤Ë¤·¤Þ¤·¤¿¡£
¤³¤Î¡ØÊƹñ¼«Í³Ë¡¡Ù¤ò¿¿»÷¤¿¤Î¤¬º£²ó¤Î°ÂÇܼóÁê¤Î¡Ø·º»ö»ÊË¡À©ÅÙ²þ³×´ØÏ¢Ë¡°Æ¡Ù¤Ç¡¢CIA¤ÈFBI¤ËÂå¤ï¤ë¤Î¤¬ÆüËܤηٻ¡¤Ç¤¢¤ë¤³¤È¤¬¤è¤¯¤ªÊ¬¤«¤ê¤Ë¤Ê¤ë¤È»×¤¤¤Þ¤¹¡£
February 9, 2015
How the NSA Spying Programs Have Changed Since Snowden
NSA¤Î¥¹¥Ñ¥¤¥×¥í¥°¥é¥à¤Ï¡¢¥¹¥Î¡¼¥Ç¥ó°Ê¹ß¤É¤Î¤è¤¦¤Ë¤ËÊѹ¹¤µ¤ì¤¿¤«
n the wake of Edward Snowden's June 2013 leaks, President Barack Obama promised to review the government's surveillance programs and consider reforms.
¥¨¥É¥ï¡¼¥É¡¦¥¹¥Î¡¼¥Ç¥ó¤Î2013ǯ6·îϳ¤ì¤ò¤¤Ã¤«¤±¤Ë¡¢N¡¢¥Ð¥é¥¯¡¦¥ª¥Ð¥ÞÂçÅýÎΤϡ¢À¯Éܤδƻë¥×¥í¥°¥é¥à¤ò¸«Ä¾¤·¡¢²þ³×¤ò¸¡Æ¤¤¹¤ë¤³¤È¤òÌ󫤷¤Þ¤·¤¿¡£
¡ÊÃæÎ¬¡Ë
There Are Now ¡ÈAppropriate Safeguards¡É for Personal Data – Unless It Conflicts with National Security
¸Ä¿Í¥Ç¡¼¥¿¤Î¤¿¤á¤Ë¡¢º£¤Î¡ÖŬÀÚ¤ÊÊݾãÁ¼ÃÖŽ£¤¬¤¢¤ë¡¼ ¤½¤ì¤Ï¡¢¹ñ²È°ÂÁ´Êݾã¤È¾×ÆÍ¤·¤Æ¤¤¤Ê¤¤¸Â¤ê¡£
the first time, the personal information of non-US citizens now can only be kept for five years — the same length as Americans' data, according to the ODNI report.
ODNI¤ÎÊó¹ð½ñ¤Ë¤è¤ë¤È¡¢ºÇ½é¤Ë¡¢ÈóÊÆ¹ñ»Ô̱¡Ê³°¹ñ¿Í¡Ë¤Î¸Ä¿Í¾ðÊó¤Ï¡¢5ǯ´ÖÊݸ¤¹¤ë¤³¤È¤¬¤Ç¤¤Þ¤¹ - ¡¡¤³¤ì¤Ï¥¢¥á¥ê¥«¿Í¤Î¥Ç¡¼¥¿Êݸ´ü´Ö¤ÈƱ¤¸¤Ç¤¹¡£
If, within five years, agents haven't determined whether the information is important, it must be deleted — unless the DNI determines that there's a national security reason to keep it.
DNI¤Ï¡¢¤½¤ì¤ò°Ý»ý¤¹¤ë¤¿¤á¤Ë¹ñ²È°ÂÁ´Êݾã¾å¤ÎÍýͳ¤¬¤¢¤ë¤³¤È¤òȽÃǤ·¤Ê¤¤¸Â¤ê - ¡¢5ǯ°ÊÆâ¤Ë¡¢¥¨¡¼¥¸¥§¥ó¥È¤Ï¾ðÊ󤬽ÅÍפǤ¢¤ë¤«¤É¤¦¤«¤ò·èÄꤷ¤Æ¤¤¤Ê¤¤¾ì¹ç¡¢¤½¤ì¤òºï½ü¤¹¤ëɬÍפ¬¤¢¤ê¤Þ¤¹¡£
The policy means that the NSA is still allowed to hold on to any information it collects on anyone, whether it's relevant or not, for at least five years.
¤½¤Î»Üºö¤Ï¡¢NSA¤Ï¡¢¤½¤ì¤¬´ØÏ¢¤¹¤ë¤«¤É¤¦¤«¤Ï¤µ¤Æ¤ª¤¤¤Æ¡¢Ã¯¤«¤¬¼ý½¸¤µ¤ì¤¿¾ðÊó¤ò¾¯¤Ê¤¯¤Æ¤â£µÇ¯´Ö¤ÏÊÝ»ý¤¹¤ë¤³¤È¤¬µö²Ä¤µ¤ì¤Æ¤¤¤ë¤³¤È¤ò°ÕÌ£¤·¤Þ¤¹¡£
¡ÊÃæÎ¬¡Ë
The Government Can Still Gather Data on Americans Without a Warrant
À¯ÉܤϤޤÀÎá¾õ¤Ê¤·¤Ë¥¢¥á¥ê¥«¿Í¤Î¥Ç¡¼¥¿¤ò¼ý½¸¤¹¤ë¤³¤È¤¬¤Ç¤¤Þ¤¹
Under current policy as detailed in the ODNI report, data gathered this way on Americans can only be used against them in a criminal case ¡Èwhen appropriate.¡É To the government, that means only when the information yields evidence related to national security offenses or other serious crimes including death, kidnapping, ¡Èsubstantial bodily harm,¡É crimes against minors, destruction of critical infrastructure, transnational crimes, cyber security and human trafficking.
ODNIÊó¹ð½ñ¤Ë¾Ü½Ò¤µ¤ì¤Æ¤¤¤ë¤è¤¦¤Ë¡¢¸½ºß¤Î»Üºö¤Î²¼¤Ç¤Ï¡¢Í£°ì·º»ö»ö·ï¤ÇÅðݤ·¤¿¥Ç¡¼¥¿¤ò»ÈÍѤ¹¤ë¤³¤È¤¬¤Ç¤¤Þ¤¹¡£
¤½¤ì¤Ï¾ðÊ󤬹ñ²È°ÂÁ´Êݾã¾å¤ÎÈȺá¤Þ¤¿¤Ï¾¤Ë´ØÏ¢¤¹¤ë¾Úµò¤¬ÆÀ¤é¤ì¤¿¾ì¹ç¤Ë¤Î¤ß¤ò°ÕÌ£¤·¤Þ¤¹¡£»¦¿Í¡¢Í¶²ý¡¢¿ÈÂÎŪ´í³²¡¢Ì¤À®Ç¯¼Ô¤ËÂФ¹¤ëÈȺᡢ½ÅÍ×¥¤¥ó¥Õ¥é¤ÎÇ˲õ¡¢¹ñ¶¤ò±Û¤¨¤ëÈȺᡢ¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¤ä¿Í¿ÈÇäÇã¤Ê¤É¤Î½ÅÂç¤ÊÈȺá¤Ê¤É¤Ç¤¹¡£
When the government collects foreigners' information, it inevitably scoops up Americans' communications, too.
À¯Éܤϳ°¹ñ¿Í¼ý½¸¤¹¤ë¤È¤¡¢Æ±Íͤˡ¢¥¢¥á¥ê¥«¿Í¤ÎÄÌ¿®¤Î¾ðÊó¤òɬÁ³Åª¤Ë¤¹¤¯¤¤¾å¤²¤Þ¤¹¡£
National Security Letters Now Expire — Unless the FBI Decides to Keep Them Open
¹ñ²È°ÂÁ´Êݾã½ñ´Ê¤Ï¸½ºß´ü¸ÂÀÚ¤ì¤Ë¤Ê¤ë¡Ý¡ÝFBI¡ÊÊÆÏ¢Ë®Áܺº¶É¡Ë¤¬¡¢¤½¤ì¤é½ñ´Ê¤ò·Ñ³¤·¤ÆÍ¸ú¤Ë¤·¤Æ¤ª¤¯¤È·è¤á¤Ê¤¤¸Â¤ê¤Ï¡£
National Security Letters allow the FBI to secretly compel companies, such as phone or internet service providers, financial institutions or even libraries, to turn over communications or other data on a specific person.
¹ñ²È°ÂÁ´Êݾã½ñ´Ê¤ÇFBI¤Ï°Ê²¼¤Î²ñ¼Ò¤ËÂФ·¤Æ¤Ò¤½¤«¤Ë¶¯Íפ¹¤ë¤³¤È¤ò²Äǽ¤Ë¤·¤Þ¤¹¡£¤½¤Î²ñ¼Ò¤È¤Ï¡¢ÅÅÏᢥ¤¥ó¥¿¡¼¥Í¥Ã¥È¥µ¡¼¥Ó¥¹¥×¥í¥Ð¥¤¥À¡¼¡¢¶âÍ»µ¡´Ø¡¢°¿¤Ï¿Þ½ñ´Û¤Þ¤Ç¤â¤Ç¤¢¤ë¡£¡¢¤½¤Î¶¯Íפ¹¤ë¤³¤È¤È¤Ï¡¢¶ñÂÎŪ¤Ê¿Í¤ÎÄÌ¿®ÆâÍÆ¤Þ¤¿¤Ï¾¤Î¥Ç¡¼¥¿¤ò¤¢¤Ù¤³¤Ù¤Ë¤¹¤ë¡ÊÙÔ¤¤¹¤ë¡Ë¤³¤È¤Ç¤¹¡£
The Government Won't Say How it Handles NSA Employees Who Abuse Their Power
n 2013, The Wall Street Journal reported that some NSA employees misused their authority to search bulk data for personal information on significant others.
£²£°£±£³Ç¯¤Ë¡¢¥¦¥©¡¼¥ë¥¹¥È¥ê¡¼¥È¡¦¥¸¥ã¡¼¥Ê¥ëµÀ¤Ï¡¢²¿¿Í¤«¤ÎNSA½¾¶È°÷¤¬¸¢°Ò¤ò°ÍѤ·¡¢½ÅÍפʾ¿Í¤ÎÂçÎ̤θĿ;ðÊó¤ò¸¡º÷¤·°ÍѤ·¤Æ¤¤¤ë¤³¤È¤òÊ󤸤Ƥ¤¤Þ¤·¤¿¡£
The abuse happened so often it was nicknamed LOVEINT, after the intelligence community's practice of assigning nicknames to their intelligence gathering protocols.
¤½¤Î°ÍѤϡ¢LOVEINT¤È¤Î°¦¾Î¤Ç¸Æ¤Ð¤ì¡¢ÉÑÈˤ˵¯¤³¤ê¤Þ¤·¤¿¡£
¤Ê¤ª¡¢¤³¤³°Ê¹ß¤Ïµ¡³£ËÝÌõ¤Ç¤¹¤¬¡¢½ç¼¡¡¢½¤Àµ¤·¤¿Ìõʸ¤Ë½ñ¤´¹¤¨¤Æ¤¤¤¤Þ¤¹¡£
ËÝÌõ¤¬½ª¤ï¤Ã¤¿±Ñʸ¤Ï¡¢Î理Çɽ¼¨¤·¤Æ¤¤¤Þ¤¹¡£
2013/05/02¡¡Åö»þ¤ÎÊÆ¹ñ¤Î¾õ¶·
Source: FBI looking at wife's phone call¡¡
¡ÊCNN¥æ¡¼¥Á¥å¡¼¥Ö¡¡£±Ê¬£²£³ÉáË
FBI¤ÏºÊ¤ÎÅÅÏäòÅðݤ·¤¿
CNN has learned that the widow of Tamerlan Tsarnaev spoke to her husband the night the FBI released pictures of him.
¡ÊÃí¡Ë£²£°£±£³Ç¯¤ÎÊÆ¹ñ¼Ò²ñ¤ÇFBI¤ÎÅÅÏÃÅðݤÏÂç»ö·ï¤À¤Ã¤¿¤¬¡¢ÆüËܤǤϺ£¹ñ²ñ¤Ç¡Ø·º»ö»ÊË¡À©ÅÙ²þ³×´ØÏ¢Ë¡°Æ¡Ù¤¬À®Î©¤¹¤ë¤Î¤Ç¡¢·Ù»¡¤Ë¤è¤ë¹ṉ̃¤ÎÅŻҾðÊó¤ÏÁ´¤ÆÅðİ¡¦Å𻣤µ¤ì¤ë¡£
The Surveillance Programs
¥µ¡¼¥Ù¥¤¥é¥ó¥¹¥×¥í¥°¥é¥à
The Wall Street Journal¡¡¥¦¥©¡¼¥ë¥¹¥È¥ê¡¼¥È¥¸¥ã¡¼¥Ê¥ë
The WSJ first reported on the NSA's growing domestic-spying operation in 2008, and in 2009 explained how the agency exceeded the legal limits of its eavesdropping program.
WSJ¤Ï¡¢¤Þ¤º2008ǯ¤ËNSA¤ÎÀ®Ä¹¹ñÆâ¥¹¥Ñ¥¤Áàºî¤ËÊó¹ð¡¢¤ª¤è¤ÓÀ¯Éܵ¡´Ø¤Ï¡¢¤½¤ÎÅðİ¥×¥í¥°¥é¥à¤ÎˡŪÀ©¸Â¤òͤ¨ÊýË¡2009¤ÇÀâÌÀ¤·¤Þ¤·¤¿¡£
An article in 2012 covered a rare test to the FBI's ability to covertly obtain phone data
2012ǯ¤Îµ»ö¤Ç¤Ï¡¢ÊÆÏ¢Ë®Áܺº¶É¡ÊFBI¡Ë¤ÎǽÎϤˤޤì¤Ê¥Æ¥¹¥È¤¬Ì©¤«¤Ë·ÈÂÓÅÅÏäΥǡ¼¥¿¤ò¼èÆÀ¤·¤¿¤¿¤á¤Ëʤ¤ï¤ì¤Þ¤·¤¿¡£
Another article that year reported on counterterrorism officials' efforts to create a government dragnet, sweeping up millions of records about US citizens.
º£Ç¯¤ÏÊÆ¹ñ»Ô̱Ìó¿ôÉ´Ëü¥ì¥³¡¼¥É¤òÀÊ´¬¤·¡¢À¯ÉܤÎÁܺºÌÖ¤òºîÀ®¤¹¤ë¤¿¤á¤Î¥Æ¥íÂкöÅö¶É¼Ô¤ÎÅØÎϤËÊó¹ð¤·¤¿¤³¤È¤òÊ̤ε»ö¡£
Ʊ¤¸¤¯Êƹñ¤Î£²£°£±£³Ç¯¾õ¶·
Aug. 5, 2013,
FAQ: What You Need to Know About the NSA's Surveillance Programs¡¡FAQ¡§¤¢¤Ê¤¿¤Ï¡¢NSA¤Î´Æ»ë¥×¥í¥°¥é¥à¤Ë¤Ä¤¤¤ÆÃΤäƤª¤¯¤Ù¤¤³¤È
ProPublica by Jonathan Stray, Special to ProPublica, Aug. 5, 2013, 3:20 pm
There have been a lot of news stories about NSA surveillance programs following the leaks of secret documents by Edward Snowden.
But it seems the more we read, the less clear things are We've put together a detailed snapshot of what's known and what's been reported where.
¥¨¥É¥ï¡¼¥É¡¦¥¹¥Î¡¼¥Ç¥ó¤Ë¤è¤Ã¤Æµ¡Ì©Ê¸½ñ¤Îϳ±Ì°Ê²¼NSA´Æ»ë¥×¥í¥°¥é¥à¤Ë´Ø¤¹¤ë¥Ë¥å¡¼¥¹µ»ö¤¬¤¿¤¯¤µ¤ó¤¢¤ê¤Þ¤·¤¿¡£
¤·¤«¤·¡¢¤½¤ì¤Ï¤è¤ê¿¤¯¤Î»ä¤¿¤Á¤¬ÆÉ¤ó¤Ç¤¤¤ë¤è¤¦¤À¡¢¤½¤ì¤Û¤ÉÌÀ³Î¤Ê¤â¤Î¤Ç¤¹¡£»ä¤¿¤Á¤Ï°ì½ï¤ËÃΤé¤ì¤Æ¤¤¤Þ¤¹¤·¡¢²¿¤ò¤É¤³¤ÇÊó¹ð¤µ¤ì¤Æ¤¤¤ë¤â¤Î¤Î¾ÜºÙ¤Ê¥¹¥Ê¥Ã¥×¥·¥ç¥Ã¥È¤òÆþ¤ì¤Æ¤¤¤Þ¤¹¡£
(
Construction trailers sit in front of the new National Security Agency (NSA) data center June 10, 2013 in Bluffdale, Utah.)
The collected information covers ¡Ènearly everything a user does on the Internet,¡É according to apresentation [6] on the XKEYSCORE system.
¼ý½¸¤µ¤ì¤¿¾ðÊó¤Ï¡¢¤Ë¤è¤ë¤È¡¢ "¥æ¡¼¥¶¤¬¥¤¥ó¥¿¡¼¥Í¥Ã¥È¾å¤Ë¤¢¤ë¤Î¤Ç¡¢¤Û¤Ü¤¹¤Ù¤Æ¤Î¤â¤Î¤ò¡Ö¥«¥Ð¡¼¤¹¤ë¥×¥ì¥¼¥ó¥Æ¡¼¥·¥ç¥ó [6] XKEYSCORE¥·¥¹¥Æ¥à¾å¡£
The slides specifically mention emails, Facebook chats, websites visited, Google Maps searches, transmitted files, photographs, and documents of different kinds.
¥¹¥é¥¤¥É¤Ï¡¢¶ñÂÎŪ¤Ë¤ÏÅŻҥ᡼¥ë¡¢Facebook¤Î¥Á¥ã¥Ã¥È¡¢¥¦¥§¥Ö¥µ¥¤¥È¤òˬÌä¡¢Google¥Þ¥Ã¥×¤Î¸¡º÷¡¢Á÷¿®¥Õ¥¡¥¤¥ë¡¢¼Ì¿¿¡¢¤µ¤Þ¤¶¤Þ¤Ê¼ïÎà¤Îʸ½ñ¤Ë¸ÀµÚ¤·¤Þ¤¹¡£
It's also possible to search for people based on where they are connecting from, the language they use, or their use of privacy technologies such as VPNs [22] and encryption, according to the slides.
¤½¤ì¤Ï¡¢Èà¤é¤¬»ÈÍѤ·¤Æ¤¤¤ë¸À¸ì¡¢¤Þ¤¿¤Ï¤Î¤è¤¦¤Ê¥×¥é¥¤¥Ð¥·¡¼¤Îµ»½Ñ¤ÎÍøÍÑ¡¢¤«¤éÀܳ¤µ¤ì¤Æ¤¤¤ë¾ì½ê¤Ë´ð¤Å¤¤¤Æ¿Í¤ò¸¡º÷¤¹¤ë¤³¤È¤â²Äǽ¤Ç¤¹VPN¤Î [22]¥¹¥é¥¤¥É¤Ë¤è¤ì¤Ð¡¢°Å¹æ²½¡£
¡¡¡¡¡¡¡ú
How the NSA actually gets the data depends on the type of information requested.
NSA¤Ï¡¢¼ÂºÝ¤Ë¼èÆÀ¤¹¤ë¥Ç¡¼¥¿¤Ï¤É¤Î¤è¤¦¤ËÍ׵ᤵ¤ì¤¿¾ðÊó¤Î¼ïÎà¤Ë¤è¤Ã¤Æ°Û¤Ê¤ê¤Þ¤¹¡£
If the analyst wants someone's private emails or social media posts, the NSA must request that specific data [24] from companies such as Google and Facebook.
¥¢¥Ê¥ê¥¹¥È¤¬Ã¯¤«¤Î¥×¥é¥¤¥Ù¡¼¥È¥á¡¼¥ë¤ä¥½¡¼¥·¥ã¥ë¥á¥Ç¥£¥¢¤ÎÅê¹Æ¤ò´õ˾¤¹¤ë¾ì¹ç¡¢NSA¤Ï¤·¤Ê¤±¤ì¤Ð¤Ê¤é¤Ê¤¤ÆÃÄê¤Î¥Ç¡¼¥¿¤è¤¦¤ËÍ׵ᤷ [24] ¡¢¤½¤Î¤è¤¦¤ÊGoogle¤äFacebook¤Ê¤É¤Î´ë¶È¤«¤é¡£
Some technology companies (we don't know which ones) have FBI monitoring equipment installed " on the premises [27] " and the NSA gets the information via the FBI's Data Intercept Technology Unit.
FBI¤Î´Æ»ëÁõÃ֤ϡ¢¡Ö¥¤¥ó¥¹¥È¡¼¥ë¤µ¤ì¤Æ¤¤¤ë¡Ê»ä¤¿¤Á¤¬¤É¤ì¤«¤ï¤«¤é¤Ê¤¤¡Ë¤¤¤¯¤Ä¤«¤Î¥Æ¥¯¥Î¥í¥¸¡¼´ë¶È¤ÎÁ°Äó¤Ë [27] ¡Ö¤ÈNSA¤ÏFBI¤Î¥Ç¡¼¥¿Ëµ¼õµ»½Ñ¡¦¥æ¥Ë¥Ã¥È¤ò²ð¤·¤Æ¾ðÊó¤ò¼èÆÀ¤·¤Þ¤¹¡£
The NSA also has the capability [27] to monitor calls made over the Internet (such as Skype calls) and instant messaging chats as they happen.
NSA¤Ï¤Þ¤¿¡¢»ý¤Ã¤Æ¤¤¤ëǽÎÏ [27] ¡¢Èà¤é¤¬µ¯¤³¤ë¤è¤¦¤Ë¡Ê¤½¤Î¤è¤¦¤ÊSkype¤Î¥³¡¼¥ë¤Ê¤É¡Ë¤Ï¡¢¥¤¥ó¥¿¡¼¥Í¥Ã¥È·Ðͳ¤Ç¤ÎÄÌÏä䥤¥ó¥¹¥¿¥ó¥È¥á¥Ã¥»¡¼¥¸¥ó¥°¤Î¥Á¥ã¥Ã¥È¤ò´Æ»ë¤¹¤ë¤¿¤á¤Ë¡£
For information that is already flowing through Internet cables that the NSA is monitoring, or the audio of phone calls, a targeting request instructs automatic systems [11] to watch for the communications of a specific person and save them.
¤¹¤Ç¤Ë¥¤¥ó¥¿¡¼¥Í¥Ã¥ÈNSA¤¬´Æ»ë¤·¤Æ¤¤¤ë¥±¡¼¥Ö¥ë¡¢¤Þ¤¿¤ÏÅÅÏäΥª¡¼¥Ç¥£¥ª¤òή¤ì¤Æ¤¤¤ë¾ðÊó¤Ï¡¢¥¿¡¼¥²¥Æ¥£¥ó¥°Í׵᤬¼«Æ°Åª¤Ë¥·¥¹¥Æ¥à¤Ë»Ø¼¨¤¹¤ë [11]ÆÃÄê¤Î¿Í¤ÎÄÌ¿®¤ò´Æ»ë¤·¡¢¤½¤ì¤é¤òÊݸ¤·¤Þ¤¹¡£
It's important to note that the NSA probably has information about you even if you aren't on this target list.
¤½¤ì¤Ï¤¢¤Ê¤¿¤¬¤³¤Î¥¿¡¼¥²¥Ã¥È¥ê¥¹¥È¤Ë¤Ê¤¤¾ì¹ç¤Ç¤â¡¢NSA¤Ï¤ª¤½¤é¤¯¤¢¤Ê¤¿¤Ë¤Ä¤¤¤Æ¤Î¾ðÊó¤ò»ý¤Ã¤Æ¤¤¤ë¤³¤È¤ËÃí°Õ¤¹¤ë¤³¤È¤¬½ÅÍפǤ¹¡£
If you have previously communicated with someone who has been targeted, then the NSA already has the content of any emails, instant messages, phone calls, etc. you exchanged with the targeted person.
°ÊÁ°¤Ë¥¿¡¼¥²¥Ã¥È¤Ë¤µ¤ì¤¿¿Í¤ÈÄÌ¿®¤·¤¿¾ì¹ç¤Ë¤Ï¡¢NSA¤Ï¡¢¤¹¤Ç¤Ë¤¢¤Ê¤¿¤¬ÂоݼԤȤδ֤Ǥä¤ê¼è¤êǤ°Õ¤ÎÅŻҥ᡼¥ë¡¢¥¤¥ó¥¹¥¿¥ó¥È¥á¥Ã¥»¡¼¥¸¡¢ÅÅÏäʤɤΥ³¥ó¥Æ¥ó¥Ä¤¬¤¢¤ê¤Þ¤¹¡£
Also, your data is likely in bulk records such as phone metadata and Internet traffic recordings
¤Þ¤¿¡¢¤¢¤Ê¤¿¤Î¥Ç¡¼¥¿¤Ï¡¢ÅÅÏᢥ᥿¥Ç¡¼¥¿¤ª¤è¤Ó¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥È¥é¥Õ¥£¥Ã¥¯¤ÎÏ¿²»¤Ê¤É¤Î¥Ð¥ë¥¯¥ì¥³¡¼¥É¤Ç¤Î²ÄǽÀ¤¬¤¢¤ê¤Þ¤¹¡£
This is what makes these programs ¡Èmass surveillance,¡É as opposed to traditional wiretaps, which are authorized by individual, specific court orders.
¸Ä¡¹¤Î¡¢ÆÃÄê¤ÎºÛȽ½êÌ¿Îá¤Ë¤è¤êµö²Ä¤µ¤ì¤Æ¤¤¤ëÅÁÅýŪ¤ÊÅðİ¡¢¤È¤ÏÂоÈŪ¤Ë¡¢¤³¤ì¤Ï¡Ö´Æ»ë¼Ò²ñ¡×¡¢¤³¤ì¤é¤Î¥×¥í¥°¥é¥à¤òºî¤ë¤â¤Î¤Ç¤¹¡£
¡¡¡¡¡¡¡ú
Èà¤é¤Ï¤³¤Î¤è¤¦¤Ê¥½¡¼¥·¥ã¥ë¥á¥Ç¥£¥¢¤ÎÅê¹Æ¡¢Ãϸµ·Ù»¡¤ÎµÏ¿¤È¤Î¤è¤¦¤Ê¾¤Î¥¿¥¤¥×¤Î¥Ç¡¼¥¿¤ÈÁê´Ø¤µ¤ì¤¿¤È¤¤ËÅÅÏõ¡¥ì¥³¡¼¥É¤Ï¤µ¤é¤Ë¶¯ÎϤˤʤ륯¥ì¥¸¥Ã¥È¥«¡¼¥É¤Î¹ØÆþ¾ðÊó [2] ¡¢¤È¤·¤ÆÃΤé¤ì¤Æ¤¤¤ë¥×¥í¥»¥¹¥¤¥ó¥Æ¥ê¥¸¥§¥ó¥¹Í»¹ç [39]
¡¡¡¡¡¡¡ú
ACTA¡Ý¡ÖÀ¤³¦Åª¤Ê¥¤¥ó¥¿¡¼¥Í¥Ã¥È¸¡±Ü¡×
³°¹ñ¤ÎÀ¯ÉܤǤµ¤¨¡¢¤¢¤Ê¤¿¤Î¥¦¥§¥Ö¥µ¥¤¥È¤ò¥·¥ã¥Ã¥È¥À¥¦¥ó¤¹¤ë¤³¤È¤¬¤Ç¤¤ë
ACTA = Global Internet Censorship – Now Even Foreign Governments Will Be Able To Have Your Website Shut Down
¡ü£²£°£±£µÇ¯¡¡Êƹñ¡¡¥ª¥Ð¥Þ¡¢¡ØÊƹñ¼«Í³Ë¡¡Ù¤Ë¥µ¥¤¥ó
Jun 2 2015
Twitter¤¬¹ñ¤Î¾õ¶·¤Ë¤è¤ê¡¢¸¡±Ü¤ò¹Ô¤¦°Õ¸þ¤òɽÌÀ
¡Á¸¡±Ü¤Ç¸«¤¨¤Ê¤¤¤³¤È¤òÌÀ¼¨¤¹¤ëÊý¿Ë
Barack Obama Signs 'USA Freedom Act' to Reform NSA Surveillance¡¡¡¡Jun 2 2015, 9:48 pm ET
¥Ð¥é¥¯¡¦¥ª¥Ð¥Þ´ÇÈÄ'USA¼«Í³Ë¡¤Ï¡¢NSA¤Î´Æ»ë¤ò²þ³×¤·¤Þ¤¹¡¡2015ǯ6·î2Æü¡¢21:48 ET
NSA and FBI Have Been Montoring Your Internet Usage:
5 Fast Facts You Need to Know
NSA¤ÈFBI¤Ï¤¢¤Ê¤¿¤Î¥¤¥ó¥¿¡¼¥Í¥Ã¥ÈÍøÍѤò´Æ»ë¤·¤Æ¤¤¤Þ¤¹¡§
ÁáµÞ¤Ë¤¢¤Ê¤¿¤¬ÃΤäƤª¤¯¤Ù¤£µ¤Ä¤Î¤³¤È
In a devastating report, the Washington Post says that a secret government program, code-named PRISM, has been spying on millions of American's by tapping into 9 US Internet companies.
²õÌÇŪ¤ÊÊó¹ð½ñ¤Ç¤Ï¡¢ ¥ï¥·¥ó¥È¥ó¥Ý¥¹¥È¤ÏÈëÌ©¤ÎÀ¯ÉÜ¥×¥í¥°¥é¥à¡¢¥³¡¼¥É¥Í¡¼¥àPRISM¡Ê¥×¥ê¥º¥à¡Ë¤Ï¡¢Êƹñ¤Î¥¤¥ó¥¿¡¼¥Í¥Ã¥È´ë¶È£¹¼Ò¤Î˵¼õ¤ò¤·¡¢¥¢¥á¥ê¥«¤Î¿ôÉ´Ëü¿Í¤ò¥¹¥Ñ¥¤¤·¤Æ¤¤¤ë¤³¤È¤ò½Ò¤Ù¤Æ¤¤¤Þ¤¹¡£¡Ê°Ê²¼Í×ÅÀ²Õ½ê¤Î¤ßÈ´¿è¡Ë
According to the Washington Post, who managed to obtain private documents, the NSA and FBI have been tapping into the internal servers of 9 major US Internet companies.
¥ï¥·¥ó¥È¥ó¥Ý¥¹¥È»æ¤Ë¤è¤ë¤È¡¢¥×¥é¥¤¥Ù¡¼¥Èʸ½ñ¤ò¼èÆÀ¤¹¤ë¤¿¤á¤ËNSA¤ÈFBI¤Ï¡¢Êƹñ¤ÎÂç¼ê¥¤¥ó¥¿¡¼¥Í¥Ã¥È´ë¶È£¹¼Ò¤ÎÆâÉô¥µ¡¼¥Ð¡¼¤ò³èÍѤ·¤Æ¤¤Þ¤·¤¿¡£
he aforementioned government agencies have been receiving audio, video, photos, emails, documents, and connection logs that essentially lets the NSA and FBI track an individual's location and contacts over a period of time.
¾åµÀ¯Éܵ¡´Ø¤È¤Ï¡¢¼Â¼ÁŪ¤Ë¤ÏNSA¤ÈFIB¤À¤¬¡¢¥ª¡¼¥Ç¥£¥ª¡¢¥Ó¥Ç¥ª¡¢¼Ì¿¿¡¢ÅŻҥ᡼¥ë¡¢¥É¥¥å¥á¥ó¥È¡¢¤ª¤è¤ÓÀܳ¥í¥°¤ò¼õ¿®¤·¤Æ¤¤Þ¤·¤¿¡£¤½¤Î¤³¤È¤Ç¡¢NSA¤ÈFBI¤Ï¡¢°ìÄê´ü´Ö¤Ë¤ï¤¿¤Ã¤Æ¸Ä¿Í¤Î°ÌÃÖ¤äÏ¢ÍíÀè¤òÄÉÀפ¹¤ë¤Î¤Ç¤¹¡£
4. Obama Supports PRISM, But Not Bush's Warrantless Surveillance
5. Here are a List of the Companies That Worked With PRISM
5. PRISM¡Ê¥×¥ê¥º¥à¡§À¯ÉܤΥ¤¥ó¥¿¡¼¥Í¥Ã¥È˵¼õ¤Ë¤è¤ë¹ṉ̃´Æ»ë¥×¥í¥°¥é¥à¡Ë¤Ë¶¨ÎϤ·¤Æ¤¤¤ë´ë¶È¤Î¥ê¥¹¥È¤Ç¤¹
Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple have been involved in the program for years. Dropbox isn't an official member yet, but they're rumored to be joining soon
¥Þ¥¤¥¯¥í¥½¥Õ¥È¡¢¥ä¥Õ¡¼¡¢¥°¡¼¥°¥ë¡¢¥Õ¥§¥¤¥¹¥Ö¥Ã¥¯¡¢Æ°²è¥Á¥ã¥Ã¥È¡¢AOL¡¢Skype¡¢YouTube¡¢Apple¤Ï²¿Ç¯´Ö¤âÀ¯Éܤιṉ̃´Æ»ë¥×¥í¥°¥é¥à¤Ë·È¤ï¤Ã¤Æ¤¤Þ¤·¤¿¡£Dropbox¤¬¡¢¤Þ¤ÀÀµ¼°¥á¥ó¥Ð¡¼¤Ç¤Ï¤¢¤ê¤Þ¤»¤ó¤¬¡¢¤¹¤°¤Ë»²²Ã¤¹¤ë¤È±½¤µ¤ì¤Æ¤¤¤Þ¤¹¡£
According to CNBC, Apple has denied ever hearing of the program
.CNBC¤Ë¤è¤ë¤È¡¢Apple¤Ï¥×¥í¥°¥é¥à¤Îʹ¤¼è¤ê¤µ¤¨ÈÝÄꤷ¤Æ¤¤¤Þ¤¹