Estimado Mario Jorge,<div>eu publiquei justamente por tratar da Apple e da privacidade de nossos dados nos produtos oferecidos por ela o que está seriamente comprometido pelo menos desde outubro de 2012. </div><div>Com amor, e a alegria da gratidão, e.<br>
<br><div class="gmail_quote">2013/7/12 Mario Jorge Passos <span dir="ltr"><<a href="mailto:mj@passos.net" target="_blank">mj@passos.net</a>></span><br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="word-wrap:break-word">O assunto é Mac, Apple e assuntos relacionados.<div><br></div><div>Esta mensagem não deve ser respondida para a lista ou o assunto desenvolvido.</div>
<div><br></div><div>Comentários diretamente ao moderador. <a href="mailto:mj@passos.net" target="_blank">mj@passos.net</a>.</div><div><br></div><div>Abraços,</div><div><br></div><div>Mario Jorge Passos</div><div><br></div>
<div><div><div>On Jul 12, 2013, at 8:16 PM, Evandro Vieira Ouriques <<a href="mailto:evandro.vieira.ouriques@gmail.com" target="_blank">evandro.vieira.ouriques@gmail.com</a>> wrote:</div><br><blockquote type="cite">
<div style="clear:left;line-height:10px;border-collapse:collapse;color:rgb(51,51,51);font-size:12px;border-color:rgb(214,29,0);font-family:arial,sans-serif;margin:0px;min-height:68px;padding:0px;background-repeat:no-repeat no-repeat">
<div style="padding:0px;margin:0px;border-collapse:collapse;float:left;background-repeat:no-repeat no-repeat"><h1 style="padding:0px;margin:0px 0px 2px;border-collapse:collapse;border-right-color:rgb(214,29,0);border-bottom-color:rgb(214,29,0);border-left-color:rgb(214,29,0);font-family:georgia,serif;font-weight:normal;font-size:2.166em;line-height:1.154;width:460px;border-top-width:0px;background-repeat:no-repeat no-repeat">
NSA Prism program taps in to user data of Apple, Google and others</h1><div style="padding:0px 0px 34px;margin:0px;border-collapse:collapse;color:rgb(102,102,102);font-size:1.333em;line-height:1.25;width:460px;background-repeat:no-repeat no-repeat">
• Top-secret Prism program claims direct access to servers of firms including Google, Apple and Facebook<br style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat">• Companies deny any knowledge of program in operation since 2007<br style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat">
<br style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat">• <a href="http://www.guardian.co.uk/world/2013/jun/07/obama-china-targets-cyber-overseas" style="padding:0px;margin:0px;border-collapse:collapse;color:rgb(0,86,137);text-decoration:none;background-repeat:no-repeat no-repeat" target="_blank">Obama orders US to draw up overseas target list for cyber-attacks</a></div>
</div><ul style="padding:0px;margin:5px 0px 0px;border-collapse:collapse;list-style:none;float:right;width:140px;overflow:hidden;background-repeat:no-repeat no-repeat">
<li style="padding:0px;margin-top:0px;margin-right:0px;margin-bottom:5px!important;margin-left:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;overflow:hidden;font-size:0.88em;display:block;background-repeat:no-repeat no-repeat"><a href="http://www.facebook.com/dialog/feed?app_id=180444840287&link=http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data&display=popup&redirect_uri=http://static-serve.appspot.com/static/facebook-share/callback.html&show_error=false&ref=desktop" style="padding:2px 4px;margin:0px;border-collapse:collapse;color:rgb(59,77,123);text-decoration:none;float:left;background-color:rgb(237,238,244);border:1px solid rgb(205,213,229);border-top-left-radius:3px;border-top-right-radius:3px;border-bottom-right-radius:3px;border-bottom-left-radius:3px;min-height:14px;background-repeat:no-repeat no-repeat" target="_blank"><span style="padding:0px;margin:0px 2px 1px 1px;border-collapse:collapse;background-image:url(http://static.guim.co.uk/static/e41c7e1117ea7c292b795d82b2877139cdede53e/common/styles/images/btn_facebook_12x12.png);display:inline;width:13px;min-height:13px;float:left;background-repeat:no-repeat no-repeat"></span><span style="padding:0px;margin:0px;border-collapse:collapse;line-height:1.3;color:rgb(59,89,152);background-repeat:no-repeat no-repeat">Share</span></a><span style="padding:1px 2px;margin:1px 0px 0px 6px;border-collapse:collapse;float:left;border:1px solid rgb(205,213,229);min-height:14px;background-repeat:no-repeat no-repeat"><i style="padding:0px;margin:0px;border-collapse:collapse;border-style:solid;border-color:transparent white transparent transparent;display:block;min-height:1px;border-width:4px 5px 4px 0px;background-repeat:no-repeat no-repeat"></i><u style="padding:0px;margin:0px;border-collapse:collapse;border-style:solid;border-color:transparent rgb(215,215,215) transparent transparent;display:block;min-height:1px;border-width:4px 5px 4px 0px;background-repeat:no-repeat no-repeat"></u>69649</span></span></li>
<li style="padding:0px;margin-top:0px;margin-right:0px;margin-bottom:5px!important;margin-left:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></li><li style="padding:0px;margin-right:0px;margin-bottom:2px!important;margin-left:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat">
<div style="padding:0px;margin:0px;border-collapse:collapse;background-color:transparent;border-style:none;float:none;line-height:normal;font-size:1px;vertical-align:baseline;display:inline-block;width:90px;min-height:20px">
</div></li><li style="padding:0px;margin-top:0px;margin-right:0px;margin-bottom:5px!important;margin-left:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;line-height:1;vertical-align:baseline;display:inline-block;text-align:center;background-repeat:no-repeat no-repeat"><span style="border-collapse:collapse;padding:0px!important;margin:0px!important;display:inline-block!important;vertical-align:baseline!important;font-size:1px!important;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;overflow:visible!important;display:block!important;background-repeat:no-repeat no-repeat"><a style="border-collapse:collapse;color:rgb(0,86,137);padding:0px!important;margin:0px!important;border:0px!important;min-height:20px!important;display:inline-block!important;background-repeat:no-repeat no-repeat"><span style="padding:0px!important;margin:0px!important;border-collapse:collapse;background-image:url(http://static.licdn.com/scds/common/u/img/sprite/sprite_connect_v13.png)!important;border:0px!important;overflow:hidden!important;display:block!important;width:20px!important;min-height:20px!important;float:right!important;background-repeat:no-repeat no-repeat!important">in</span><span style="margin-top:0px;margin-right:0px;margin-bottom:0px;border-collapse:collapse;padding:0px 4px 0px 23px!important;margin-left:1px!important;color:rgb(51,51,51)!important;display:block!important;white-space:nowrap!important;float:left!important;vertical-align:top!important;overflow:hidden!important;min-height:18px!important;border-width:1px 1px 1px 0px!important;border-top-style:solid!important;border-right-style:solid!important;border-bottom-style:solid!important;border-top-color:rgb(226,226,226)!important;border-right-color:rgb(191,191,191)!important;border-bottom-color:rgb(185,185,185)!important;line-height:20px!important;border-top-left-radius:0px!important;border-bottom-left-radius:0px!important;border-top-right-radius:2px!important;border-bottom-right-radius:2px!important;background-color:rgb(236,236,236)!important;background-image:-webkit-linear-gradient(top,rgb(254,254,254) 0%,rgb(236,236,236) 100%)!important;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;display:inline-block!important;width:0px!important;overflow:hidden!important;background-repeat:no-repeat no-repeat"></span><span style="padding:0px;margin:0px;border-collapse:collapse;font-size:11px!important;font-family:Arial,sans-serif!important;font-weight:bold!important;display:inline-block!important;background-image:none!important;background-color:transparent!important;vertical-align:baseline!important;min-height:18px!important;float:none!important">Share</span></span></a></span></span><span style="border-collapse:collapse;padding:0px!important;margin:0px!important;display:inline-block!important;vertical-align:baseline!important;font-size:1px!important;background-repeat:no-repeat no-repeat"><span style="padding-top:0px;padding-right:0px;padding-bottom:0px;margin:0px;border-collapse:collapse;padding-left:2px!important;display:inline-block!important;float:left!important;overflow:visible!important;min-height:18px!important;line-height:1px!important;background-repeat:no-repeat no-repeat"><span style="padding-top:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-bottom:0px;margin-left:0px;border-collapse:collapse;padding-right:4px!important;margin-right:4px!important;display:block!important;float:left!important;min-height:18px!important;background-image:url(http://static.licdn.com/scds/common/u/img/sprite/sprite_connect_v13.png)!important;background-repeat:no-repeat no-repeat!important"><span style="padding-top:0px;padding-right:0px;padding-bottom:0px;margin:0px;border-collapse:collapse;padding-left:8px!important;display:block!important;float:left!important;background-image:url(http://static.licdn.com/scds/common/u/img/sprite/sprite_connect_v13.png)!important;background-repeat:no-repeat no-repeat!important"><span style="margin:0px;border-collapse:collapse;padding:0px 5px!important;display:inline!important;font-size:11px!important;font-family:Arial,sans-serif!important;line-height:18px!important;background-repeat:no-repeat no-repeat">692</span></span></span></span></span></span></li>
<li style="padding:0px;margin-top:0px;margin-right:0px;margin-bottom:5px!important;margin-left:0px;border-collapse:collapse;background-image:url(http://static.guim.co.uk/static/e41c7e1117ea7c292b795d82b2877139cdede53e/common/styles/images/bg-email.png);border:1px solid rgb(204,204,204);border-top-left-radius:3px;border-top-right-radius:3px;border-bottom-right-radius:3px;border-bottom-left-radius:3px;width:60px;min-height:18px;background-repeat:repeat no-repeat">
<a href="http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data#" title="Send to a friend" style="padding:0px;margin:0px;border-collapse:collapse;color:rgb(51,51,51);text-decoration:none;line-height:1.5;width:60px;float:left;background-repeat:no-repeat no-repeat" target="_blank"><img src="http://static.guim.co.uk/static/e41c7e1117ea7c292b795d82b2877139cdede53e/common/images/icon-email.png" alt="" style="padding:0px;border-collapse:collapse;border:none;background-repeat:no-repeat no-repeat">Email</a></li>
</ul></div><div style="border-collapse:collapse;width:460px;margin:0px 0px 10px;padding:0px;float:left;background-repeat:no-repeat no-repeat"><ul style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:12px;line-height:1.25;padding:2px 0px 12px;margin:0px 0px 10px;border-collapse:collapse;list-style-type:none;border-color:rgb(214,29,0);border-top-width:1px;border-top-style:solid;border-bottom-width:1px;border-bottom-style:solid;overflow:hidden;min-height:66px">
<li style="padding:0px;margin:0px;border-collapse:collapse;overflow:visible;display:block;background-repeat:no-repeat no-repeat"><div style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat">
<span style="padding:0px;margin:0px;border-collapse:collapse;font-weight:bold;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><a rel="author" href="http://www.guardian.co.uk/profile/glenn-greenwald" style="padding:0px;margin:0px;border-collapse:collapse;color:rgb(0,86,137);text-decoration:none;background-repeat:no-repeat no-repeat" target="_blank">Glenn Greenwald</a></span></span> and <span style="padding:0px;margin:0px;border-collapse:collapse;font-weight:bold;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><a rel="author" href="http://www.guardian.co.uk/profile/ewenmacaskill" style="padding:0px;margin:0px;border-collapse:collapse;color:rgb(0,86,137);text-decoration:none;background-repeat:no-repeat no-repeat" target="_blank">Ewen MacAskill</a></span></span></div>
</li><li style="padding:0px;margin:0px;border-collapse:collapse;overflow:hidden;background-repeat:no-repeat no-repeat"><a href="http://www.guardian.co.uk/theguardian" style="padding:0px;margin:0px;border-collapse:collapse;color:rgb(0,86,137);text-decoration:none;background-repeat:no-repeat no-repeat" target="_blank">The Guardian</a>, Friday 7 June 2013</li>
<li style="padding:0px;margin:3px 0px 0px;border-collapse:collapse;overflow:hidden;background-repeat:no-repeat no-repeat"><a href="http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data#start-of-comments" style="padding:0px 0px 2px 20px;margin:0px;border-collapse:collapse;color:rgb(0,86,137);text-decoration:none;background-image:url(http://resource.guim.co.uk/global/static/file/discussion/comment-icon16x16.gif);min-height:15px;display:inline;clear:both;line-height:1.5;background-repeat:no-repeat no-repeat" target="_blank"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat">Jump to comments</span> (<span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat">2935</span>)</a></li>
</ul><div style="padding:0px;margin:0px;border-collapse:collapse"><div style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 14px;border-collapse:collapse">
<img src="http://static.guim.co.uk/sys-images/Guardian/Pix/audio/video/2013/6/6/1370557489060/Prism-008.jpg" width="460" height="276" alt="Prism" style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><div style="padding:0px;margin:0px;border-collapse:collapse;color:rgb(102,102,102);font-size:12px;background-repeat:no-repeat no-repeat">
A slide depicting the top-secret PRISM program.</div></div><div style="padding:0px;margin:0px;border-collapse:collapse"><p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">
The National Security Agency has obtained direct access to the systems of Google, Facebook, <a href="http://www.guardian.co.uk/technology/apple" title="More from guardian.co.uk on Apple" style="padding:0px;margin:0px;border-collapse:collapse;color:rgb(0,86,137);text-decoration:none;background-repeat:no-repeat no-repeat" target="_blank">Apple</a> and other US <a href="http://www.guardian.co.uk/technology/internet" title="More from guardian.co.uk on Internet" style="padding:0px;margin:0px;border-collapse:collapse;color:rgb(0,86,137);text-decoration:none;background-repeat:no-repeat no-repeat" target="_blank">internet</a> giants, according to a top secret document obtained by the Guardian.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">The <span style="padding:0px;margin:0px;border-collapse:collapse;background-color:rgb(238,238,238);border-bottom-width:1px;border-bottom-style:dotted;border-bottom-color:rgb(128,17,0);color:rgb(128,17,0);background-repeat:initial initial"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>NSA</span> access is part of a previously undisclosed program called<a href="http://www.guardian.co.uk/world/prism" title="More from guardian.co.uk on Prism" style="padding:0px;margin:0px;border-collapse:collapse;color:rgb(0,86,137);text-decoration:none;background-repeat:no-repeat no-repeat" target="_blank">Prism</a>, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation – classified as top secret with no distribution to foreign allies – which was apparently used to train intelligence operatives on the capabilities of the program. The document claims "collection directly from the servers" of major US service providers.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">Although the presentation claims the program is run with the assistance of the companies, all those who responded to a Guardian request for comment on Thursday denied knowledge of any such program.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">In a statement, Google said: "Google cares deeply about the security of our users' data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government 'back door' into our systems, but Google does not have a back door for the government to access private user data."</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">Several senior tech executives insisted that they had no knowledge of<span style="padding:0px;margin:0px;border-collapse:collapse;background-color:rgb(238,238,238);border-bottom-width:1px;border-bottom-style:dotted;border-bottom-color:rgb(128,17,0);color:rgb(128,17,0);background-repeat:initial initial"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Prism</span> or of any similar scheme. They said they would never have been involved in such a program. "If they are doing this, they are doing it without our knowledge," one said.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">An Apple spokesman said it had "never heard" of <span style="padding:0px;margin:0px;border-collapse:collapse;background-color:rgb(238,238,238);border-bottom-width:1px;border-bottom-style:dotted;border-bottom-color:rgb(128,17,0);color:rgb(128,17,0);background-repeat:initial initial"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Prism</span>.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">The <span style="padding:0px;margin:0px;border-collapse:collapse;background-color:rgb(238,238,238);border-bottom-width:1px;border-bottom-style:dotted;border-bottom-color:rgb(128,17,0);color:rgb(128,17,0);background-repeat:initial initial"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>NSA</span> access was enabled by changes to US surveillance law introduced under President Bush and renewed under Obama in December 2012.</p>
<span style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 20px 10px 0px;border-collapse:collapse;display:block;float:left;width:auto"><img src="http://static.guim.co.uk/sys-images/Guardian/Pix/audio/video/2013/6/6/1370551886176/Prism-001.jpg" alt="Prism" width="220" height="165" style="padding:5px 0px 0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span><p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">
The program facilitates extensive, in-depth surveillance on live communications and stored information. The law allows for the targeting of any customers of participating firms who live outside the US, or those Americans whose communications include people outside the US.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">It also opens the possibility of communications made entirely within the US being collected without warrants.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">Disclosure of the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Prism</span> program follows a leak to the Guardian on Wednesday of a top-secret court order compelling <a href="http://www.guardian.co.uk/technology/telecoms" title="More from guardian.co.uk on Telecoms" style="padding:0px;margin:0px;border-collapse:collapse;color:rgb(0,86,137);text-decoration:none;background-repeat:no-repeat no-repeat" target="_blank">telecoms</a> provider Verizon to turn over the telephone records of millions of US customers.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">The participation of the internet companies in <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Prism</span> will add to the debate, ignited by the Verizon revelation, about the scale of surveillance by the intelligence services. Unlike the collection of those call records, this surveillance can include the content of communications and not just the <span style="padding:0px;margin:0px;border-collapse:collapse;background-color:rgb(238,238,238);border-bottom-width:1px;border-bottom-style:dotted;border-bottom-color:rgb(128,17,0);color:rgb(128,17,0);background-repeat:initial initial"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>metadata</span>.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">Some of the world's largest internet brands are claimed to be part of the information-sharing program since its introduction in 2007. <a href="http://www.guardian.co.uk/technology/microsoft" title="More from guardian.co.uk on Microsoft" style="padding:0px;margin:0px;border-collapse:collapse;color:rgb(0,86,137);text-decoration:none;background-repeat:no-repeat no-repeat" target="_blank">Microsoft</a> – which is currently running an advertising campaign with the slogan "Your <a href="http://www.guardian.co.uk/world/privacy" title="More from guardian.co.uk on Privacy" style="padding:0px;margin:0px;border-collapse:collapse;color:rgb(0,86,137);text-decoration:none;background-repeat:no-repeat no-repeat" target="_blank">privacy</a> is our priority" – was the first, with collection beginning in December 2007.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009; YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the program in 2012. The program is continuing to expand, with other providers due to come online.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">Collectively, the companies cover the vast majority of online email, search, video and communications networks.</p>
<span style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px;border-collapse:collapse;display:block;float:none;width:auto"><img src="http://static.guim.co.uk/sys-images/Guardian/Pix/audio/video/2013/6/6/1370553948414/Prism-001.jpg" alt="Prism" width="460" height="345" style="padding:5px 0px 0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span><p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">
<em style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></em></p><p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">
The extent and nature of the data collected from each company varies.</p><p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">
Companies are legally obliged to comply with requests for users' communications under US law, but the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Prism</span> program allows the intelligence services direct access to the companies' servers. The <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>NSA</span>document notes the operations have "assistance of communications providers in the US".</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">The revelation also supports concerns raised by several US senators during the renewal of the <span style="padding:0px;margin:0px;border-collapse:collapse;background-color:rgb(238,238,238);border-bottom-width:1px;border-bottom-style:dotted;border-bottom-color:rgb(128,17,0);color:rgb(128,17,0);background-repeat:initial initial"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Fisa</span> Amendments Act in December 2012, who warned about the scale of surveillance the law might enable, and shortcomings in the safeguards it introduces.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">When the <span style="padding:0px;margin:0px;border-collapse:collapse;background-color:rgb(238,238,238);border-bottom-width:1px;border-bottom-style:dotted;border-bottom-color:rgb(128,17,0);color:rgb(128,17,0);background-repeat:initial initial"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>FAA</span> was first enacted, defenders of the statute argued that a significant check on abuse would be the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>NSA</span>'s inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Prism</span> program renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies' servers.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">A chart prepared by the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>NSA</span>, contained within the top-secret document obtained by the Guardian, underscores the breadth of the data it is able to obtain: email, video and voice chat, videos, photos, voice-over-IP (Skype, for example) chats, file transfers, social networking details, and more.</p>
<span style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px;border-collapse:collapse;display:block;float:none;width:auto"><img src="http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/6/6/1370554726437/PRISM-slide-crop-001.jpg" alt="PRISM slide crop" width="460" height="329" style="padding:5px 0px 0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span><p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">
<em style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></em><br style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat">The document is recent, dating to April 2013. Such a leak is extremely rare in the history of the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>NSA</span>, which prides itself on maintaining a high level of secrecy.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">The <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Prism</span> program allows the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>NSA</span>, the world's largest surveillance organisation, to obtain targeted communications without having to request them from the service providers and without having to obtain individual court orders.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">With this program, the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>NSA</span> is able to reach directly into the servers of the participating companies and obtain both stored communications as well as perform real-time collection on targeted users.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">The presentation claims <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Prism</span> was introduced to overcome what the<span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>NSA</span> regarded as shortcomings of <span style="padding:0px;margin:0px;border-collapse:collapse;background-color:rgb(238,238,238);border-bottom-width:1px;border-bottom-style:dotted;border-bottom-color:rgb(128,17,0);color:rgb(128,17,0);background-repeat:initial initial"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Fisa</span> warrants in tracking suspected foreign terrorists. It noted that the US has a "home-field advantage" due to housing much of the internet's architecture. But the presentation claimed "Fisa constraints restricted our home-field advantage" because Fisa required individual warrants and confirmations that both the sender and receiver of a communication were outside the US.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">"<span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Fisa</span> was broken because it provided privacy protections to people who were not entitled to them," the presentation claimed. "It took a <span style="padding:0px;margin:0px;border-collapse:collapse;background-color:rgb(238,238,238);border-bottom-width:1px;border-bottom-style:dotted;border-bottom-color:rgb(128,17,0);color:rgb(128,17,0);background-repeat:initial initial"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Fisa court</span>order to collect on foreigners overseas who were communicating with other foreigners overseas simply because the government was collecting off a wire in the <a href="http://www.guardian.co.uk/world/usa" title="More from guardian.co.uk on United States" style="padding:0px;margin:0px;border-collapse:collapse;color:rgb(0,86,137);text-decoration:none;background-repeat:no-repeat no-repeat" target="_blank">United States</a>. There were too many email accounts to be practical to seek Fisas for all."</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">The new measures introduced in the <span style="padding:0px;margin:0px;border-collapse:collapse;background-color:rgb(238,238,238);border-bottom-width:1px;border-bottom-style:dotted;border-bottom-color:rgb(128,17,0);color:rgb(128,17,0);background-repeat:initial initial"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>FAA</span> redefines "electronic surveillance" to exclude anyone "reasonably believed" to be outside the USA – a technical change which reduces the bar to initiating surveillance.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">The act also gives the director of national intelligence and the attorney general power to permit obtaining intelligence information, and indemnifies internet companies against any actions arising as a result of co-operating with authorities' requests.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">In short, where previously the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>NSA</span> needed individual authorisations, and confirmation that all parties were outside the USA, they now need only reasonable suspicion that one of the parties was outside the country at the time of the records were collected by the NSA.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">The document also shows the FBI acts as an intermediary between other agencies and the tech companies, and stresses its reliance on the participation of US internet firms, claiming "access is 100% dependent on ISP provisioning".</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">In the document, the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>NSA</span> hails the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Prism</span> program as "one of the most valuable, unique and productive accesses for NSA".</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">It boasts of what it calls "strong growth" in its use of the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Prism</span> program to obtain communications. The document highlights the number of obtained communications increased in 2012 by 248% for Skype – leading the notes to remark there was "exponential growth in Skype reporting; looks like the word is getting out about our capability against Skype". There was also a 131% increase in requests for Facebook data, and 63% for Google.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">The <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>NSA</span> document indicates that it is planning to add Dropbox as a<span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>PRISM</span> provider. The agency also seeks, in its words, to "expand collection services from existing providers".</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">The revelations echo fears raised on the Senate floor last year during the expedited debate on the renewal of the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>FAA</span> powers which underpin the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>PRISM</span> program, which occurred just days before the act expired.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">Senator Christopher Coons of Delaware specifically warned that the secrecy surrounding the various surveillance programs meant there was no way to know if safeguards within the act were working.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">"The problem is: we here in the Senate and the citizens we represent don't know how well any of these safeguards actually work," he said.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">"The law doesn't forbid purely domestic information from being collected. We know that at least one <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Fisa</span> court has ruled that the surveillance program violated the law. Why? Those who know can't say and average Americans can't know."</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">Other senators also raised concerns. Senator Ron Wyden of Oregon attempted, without success, to find out any information on how many phone calls or emails had been intercepted under the program.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">When the law was enacted, defenders of the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>FAA</span> argued that a significant check on abuse would be the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>NSA</span>'s inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Prism</span> program renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies' servers.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">When the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>NSA</span> reviews a communication it believes merits further investigation, it issues what it calls a "report". According to the NSA, "over 2,000 <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>Prism</span>-based reports" are now issued every month. There were 24,005 in 2012, a 27% increase on the previous year.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">In total, more than 77,000 intelligence reports have cited the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>PRISM</span>program.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">Jameel Jaffer, director of the ACLU's Center for Democracy, that it was astonishing the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>NSA</span> would even ask technology companies to grant direct access to user data.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">"It's shocking enough just that the <span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"><span style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat"></span>NSA</span> is asking companies to do this," he said. "The NSA is part of the military. The military has been granted unprecedented access to civilian communications.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">"This is unprecedented militarisation of domestic communications infrastructure. That's profoundly troubling to anyone who is concerned about that separation."</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">A senior administration official said in a statement: "The Guardian and Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. This law does not allow the targeting of any US citizen or of any person located within the United States.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">"The program is subject to oversight by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress. It involves extensive procedures, specifically approved by the court, to ensure that only non-US persons outside the US are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about US persons.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">"This program was recently reauthorized by Congress after extensive hearings and debate.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">"Information collected under this program is among the most important and valuable intelligence information we collect, and is used to protect our nation from a wide variety of threats.</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse">"The Government may only use Section 702 to acquire foreign intelligence information, which is specifically, and narrowly, defined in the Foreign Intelligence Surveillance Act. This requirement applies across the board, regardless of the nationality of the target."</p>
<p style="color:rgb(51,51,51);font-family:arial,sans-serif;font-size:1.166em;line-height:1.357;padding:0px;margin:0px 0px 13px;border-collapse:collapse"><em style="padding:0px;margin:0px;border-collapse:collapse;background-repeat:no-repeat no-repeat">Additional reporting by James Ball and Dominic Rushe</em></p>
<p style="padding:0px;margin:0px 0px 13px;border-collapse:collapse"><span style="padding:0px;margin:0px;border-collapse:collapse;font-size:15.428571701049805px;line-height:11.428571701049805px"><font color="#333333" face="arial, sans-serif"><i><a href="http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data" target="_blank">http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data</a></i></font></span></p>
</div></div></div>
_______________________________________________<br>Lista Mac-BR<br><a href="mailto:Mac-BR@lists.powercity.net" target="_blank">Mac-BR@lists.powercity.net</a><br>Para ir aos arquivos, assinar, desassinar e modificar sua assinatura visite:<br>
<a href="http://lists.powercity.net/listinfo.cgi/mac-br-powercity.net" target="_blank">http://lists.powercity.net/listinfo.cgi/mac-br-powercity.net</a><br></blockquote></div><br></div></div><br>_______________________________________________<br>
Lista Mac-BR<br>
<a href="mailto:Mac-BR@lists.powercity.net" target="_blank">Mac-BR@lists.powercity.net</a><br>
Para ir aos arquivos, assinar, desassinar e modificar sua assinatura visite:<br>
<a href="http://lists.powercity.net/listinfo.cgi/mac-br-powercity.net" target="_blank">http://lists.powercity.net/listinfo.cgi/mac-br-powercity.net</a><br>
<br></blockquote></div><br><br clear="all"><div><br></div>-- <br><div><i style="font-size:x-small"><b>Prof. Dr. Evandro Vieira Ouriques</b></i></div><div><font size="1"><b>Coordenador, NETCCON.ECO.UFRJ</b><br>Núcleo de Estudos Transdisciplinares de Comunicação e Consciência<br>
<b>Supervisor de Pesquisas de Pós-Doutorado, PACC.FCC.UFRJ</b><br>Programa Avançado de Cultura Contemporânea<br><b>Vice-Coordenador do GT Comunicación y Estudios Socioculturales, ALAIC </b> </font><div>
<font size="1">Asociación Latinoamericana de Investigadores de la Comunicación </font></div><div><font size="1"><b>Acadêmico Correspondente da AGLP</b></font></div><div><font size="1">Academia Galega da Língua Portuguesa <br>
<a href="http://www.pacc.ufrj.br/pos-doutorado/equipe-2/" target="_blank"></a><a href="http://www.evandrovieiraouriques.com/" target="_blank">http://w</a><a href="http://ww.evandrovieiraouriques.com.br/" target="_blank">ww.evandrovieiraouriques.com.br</a><br>
<a href="http://www.pacc.ufrj.br/pos-doutorado/equipe-2/" target="_blank">http://www.pacc.ufrj.br/pos-doutorado/equipe-2/</a><br></font></div><div><font size="1"><a href="http://ufrj.academia.edu/EvandroVieiraOuriques" target="_blank">http://ufrj.academia.edu/EvandroVieiraOuriques</a><br>
@EvandroOuriques<br>skype: evandrovieiraouriques</font></div></div>
</div>