Connect with us

Communication

Metadata Doesn’t Always Mean Metadata: New Snowden Revelations Reveal Government Spying Went Much Deeper

Published

on

nsa surveillanceMany were not surprised when NSA-contracted analyst Edward Snowden blew the whistle on the government organization, revealing massive, likely illegal domestic spying programs.

As the details came out, the government went into full damage control, and one keyword that surfaced was “metadata.” It was just metadata they were collecting without a warrant, they said, not the kind of data that would reveal anything personal about its owner. The word left the mouth of every government official who spoke on the subject, and the common belief became that it was not wiretapping going on, just mass surveillance.

Until now, when further revelations have come out of the Snowden leak, which amounted to gigabytes of unsorted evidence turned over to journalist Glenn Greenwald and filmmaker Laura Poitras. Although it’s been a subject of close inspection by journalists and investigators since the original leak, the depth of one secret program, in particular, XKeyscore, was not known until more recently. XKeyscore is essentially a database for spies to sort through data that has been brought in from the massive nets the government has on all domestic and international communications it can tap. Before now, it was not believed to be overly advanced in the types of information that analysts could derive from it.

Also read: 42 Years Before Edward Snowden Leak Finishes

But according to the Intercept, the program can monitor a lot more than just the traffic of all the world’s major networks. The program can store data from any stream for up to five days after it is initially transmitted. For forty-five days after that, metadata is stored and retrievable by the NSA for later use in investigations. To retain any of the data as evidence, a warrant will have to be obtained.

At least according to the program’s creators, XKeyscore can monitor such things as Skype calls and webcam feeds, in real time, as they’re happening, and the program does this by intercepting literally everything transmitted by fiber optics networks. It has been revealed that in Britain, the main connections going into the country have been forked to GCHQ for years, and a similar fork existing in the United States would probably come as no surprise.

Technology has a long history of enabling both the tyrant and the subject, the good guys and the bad. Along with unprecedented access to information and resources, Americans have met with an unprecedented environment where almost nothing they say or do will ultimately be private. Edward Snowden has taken a precarious role in history as the first to prove this was the case.

Images from Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

5 stars on average, based on 2 rated postsP. H. Madore has covered the cryptocurrency beat over the course of hundreds of articles for Hacked's sister site, CryptoCoinsNews, as well as some of her competitors. He is a major contributing developer to the Woodcoin project, and has made technical contributions on a number of other cryptocurrency projects. In spare time, he recently began a more personalized, weekly newsletter at http://ico.phm.link




Feedback or Requests?

1 Comment

1 Comment

  1. Meghan Nova

    July 4, 2015 at 7:43 am

    Snowden has brought to light important information that deserved to be in the public domain. He recognised the NSAs surveillance programs for what they are: dangerous, undemocratic and unconstitutional activity. This wholesale invasion of privacy does not contribute to our security, it puts in danger the very liberties we are trying to protect. Edward Snowden deserves a statue! https://www.etsy.com/listing/237623587/edward-snowden-statue

You must be logged in to post a comment Login

Leave a Reply

Communication

San Bernadino iPhone Case: Major Press Agencies Are Suing the FBI

Published

on

The Associated Press, Gannett, and VICE Media are suing the FBI to know more details about the agency’s hack of the San Bernadino killer’s iPhone.

(more…)

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

5 stars on average, based on 2 rated postsP. H. Madore has covered the cryptocurrency beat over the course of hundreds of articles for Hacked's sister site, CryptoCoinsNews, as well as some of her competitors. He is a major contributing developer to the Woodcoin project, and has made technical contributions on a number of other cryptocurrency projects. In spare time, he recently began a more personalized, weekly newsletter at http://ico.phm.link




Feedback or Requests?

Continue Reading

Communication

Toward Unbreakable Quantum Encryption for Everyone

Published

on

Hacked recently covered the efforts of the Chinese government to build unbreakable quantum communication networks. According to analysts, quantum communications networks are so expensive that they could have a “recentralizing effect,” enabling states to recover the ground that they have lost to decentralizing digital technologies. But what if ultra-secure quantum cryptography could be made available to everyone at low cost?

(more…)

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

Giulio Prisco is a freelance writer specialized in science, technology, business and future studies.




Feedback or Requests?

Continue Reading

Communication

The Chinese Quantum Satellite QUESS: Toward Unbreakable Quantum Networks

Published

on

One year ago Hacked covered the race between the US and China to develop “military super-powers” by harnessing quantum science, and noted that Chinese scientists were developing quantum communication satellites that support unbreakable encryption. A few weeks ago, China launched its first quantum satellite.

(more…)

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

Giulio Prisco is a freelance writer specialized in science, technology, business and future studies.




Feedback or Requests?

Continue Reading

Recent Comments

Recent Posts

A part of CCN

Hacked.com is Neutral and Unbiased

Hacked.com and its team members have pledged to reject any form of advertisement or sponsorships from 3rd parties. We will always be neutral and we strive towards a fully unbiased view on all topics. Whenever an author has a conflicting interest, that should be clearly stated in the post itself with a disclaimer. If you suspect that one of our team members are biased, please notify me immediately at jonas.borchgrevink(at)hacked.com.

Trending