Connect with us

Communication

Metadata Doesn’t Always Mean Metadata: New Snowden Revelations Reveal Government Spying Went Much Deeper

Published

on

nsa surveillanceMany were not surprised when NSA-contracted analyst Edward Snowden blew the whistle on the government organization, revealing massive, likely illegal domestic spying programs.

// -- Discuss and ask questions in our community on Workplace.

As the details came out, the government went into full damage control, and one keyword that surfaced was “metadata.” It was just metadata they were collecting without a warrant, they said, not the kind of data that would reveal anything personal about its owner. The word left the mouth of every government official who spoke on the subject, and the common belief became that it was not wiretapping going on, just mass surveillance.

Until now, when further revelations have come out of the Snowden leak, which amounted to gigabytes of unsorted evidence turned over to journalist Glenn Greenwald and filmmaker Laura Poitras. Although it’s been a subject of close inspection by journalists and investigators since the original leak, the depth of one secret program, in particular, XKeyscore, was not known until more recently. XKeyscore is essentially a database for spies to sort through data that has been brought in from the massive nets the government has on all domestic and international communications it can tap. Before now, it was not believed to be overly advanced in the types of information that analysts could derive from it.

Also read: 42 Years Before Edward Snowden Leak Finishes

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

But according to the Intercept, the program can monitor a lot more than just the traffic of all the world’s major networks. The program can store data from any stream for up to five days after it is initially transmitted. For forty-five days after that, metadata is stored and retrievable by the NSA for later use in investigations. To retain any of the data as evidence, a warrant will have to be obtained.

At least according to the program’s creators, XKeyscore can monitor such things as Skype calls and webcam feeds, in real time, as they’re happening, and the program does this by intercepting literally everything transmitted by fiber optics networks. It has been revealed that in Britain, the main connections going into the country have been forked to GCHQ for years, and a similar fork existing in the United States would probably come as no surprise.

Technology has a long history of enabling both the tyrant and the subject, the good guys and the bad. Along with unprecedented access to information and resources, Americans have met with an unprecedented environment where almost nothing they say or do will ultimately be private. Edward Snowden has taken a precarious role in history as the first to prove this was the case.

Images from Shutterstock.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

1 Comment

1 Comment

  1. Meghan Nova

    July 4, 2015 at 7:43 am

    Snowden has brought to light important information that deserved to be in the public domain. He recognised the NSAs surveillance programs for what they are: dangerous, undemocratic and unconstitutional activity. This wholesale invasion of privacy does not contribute to our security, it puts in danger the very liberties we are trying to protect. Edward Snowden deserves a statue! https://www.etsy.com/listing/237623587/edward-snowden-statue

You must be logged in to post a comment Login

Leave a Reply

Communication

San Bernadino iPhone Case: Major Press Agencies Are Suing the FBI

Published

on

The Associated Press, Gannett, and VICE Media are suing the FBI to know more details about the agency’s hack of the San Bernadino killer’s iPhone.

// -- Discuss and ask questions in our community on Workplace.

(more…)

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

Continue Reading

Communication

Toward Unbreakable Quantum Encryption for Everyone

Published

on

Hacked recently covered the efforts of the Chinese government to build unbreakable quantum communication networks. According to analysts, quantum communications networks are so expensive that they could have a “recentralizing effect,” enabling states to recover the ground that they have lost to decentralizing digital technologies. But what if ultra-secure quantum cryptography could be made available to everyone at low cost?

// -- Discuss and ask questions in our community on Workplace.

(more…)

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

Continue Reading

Communication

The Chinese Quantum Satellite QUESS: Toward Unbreakable Quantum Networks

Published

on

One year ago Hacked covered the race between the US and China to develop “military super-powers” by harnessing quantum science, and noted that Chinese scientists were developing quantum communication satellites that support unbreakable encryption. A few weeks ago, China launched its first quantum satellite.

// -- Discuss and ask questions in our community on Workplace.

(more…)

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

Continue Reading

Trending