Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

(cont'd) ...

New York Magazine explains:

“When you take all those records of who’s communicating with who, you can build social networks and communities for everyone in the world,” mathematician and NSA whistle-blower William Binney — “one of the best analysts in history,” who left the agency in 2001 amid privacy concerns — told Daily Intelligencer. “And when you marry it up with the content,” which he is convinced the NSA is collecting as well, “you have leverage against everybody in the country.”

“You are unique in the world,” Binney explained, based on the identifying attributes of the machines you use. “If I want to know who’s in the tea party, I can put together the metadata and see who’s communicating with who. I can construct the network of the tea party. If I want to pass that data to the IRS, then I can do that. That’s the danger here.”

At The New Yorker, Jane Mayer quoted mathematician and engineer Susan Landau’s hypothetical: “For example, she said, in the world of business, a pattern of phone calls from key executives can reveal impending corporate takeovers. Personal phone calls can also reveal sensitive medical information: ‘You can see a call to a gynecologist, and then a call to an oncologist, and then a call to close family members.’”

“There’s a lot you can infer,” Binney continued. “If you’re calling a physician and he’s a heart specialist, you can infer someone is having heart problems. It’s all in the databases.” The data, he said, is “all compiled by code. The software does it all from the beginning — they have dossiers of everyone in the country. That’s done automatically. When you want to investigate or target somebody, a human becomes involved.”

...

1 posted on 06/12/2013 5:00:39 PM PDT by PieterCasparzen
[ Post Reply | Private Reply | View Replies ]


To: PieterCasparzen

Nevertheless, they want the content of your phone calls, and emails, and text messages, and facebook posts, and tweets, and ...


2 posted on 06/12/2013 5:07:29 PM PDT by coloradan (The US has become a banana republic, except without the bananas - or the republic.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PieterCasparzen
At this stage of development the meta data is used primarily to identify the main callers of folks we already know about. That's a small fraction of the country ~ and a smaller fraction of the world.

In the face of the absolutely staggering amount of data generated just by phone companies for the purpose of computing telephone service billings, our best computer technology is about as useful as a stone hatchet ~ sure, eventually it'll get there, but it'll really be messy.

At this point in time nobody is matching everybody up with everybody else to see who is doing what with which.

4 posted on 06/12/2013 5:11:01 PM PDT by muawiyah (Git yer Red STATE Arm Bands here - $29.95 - NOT SOLD IN STORES - TAX FREE)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PieterCasparzen

LOL Mark Levin is reading your article right now. Went right from the zerohedge article to your NY Mag comment


5 posted on 06/12/2013 5:12:49 PM PDT by No One Special
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PieterCasparzen

Virtually everything that communicates with or by computer creates metadata. My digital camera creates metadata, my meter reader says my digital meter communicates with his handheld recorder with metadata.


6 posted on 06/12/2013 5:13:09 PM PDT by cripplecreek (REMEMBER THE RIVER RAISIN!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PieterCasparzen
MUST READ: Using Metadata to Find Paul Revere
7 posted on 06/12/2013 5:14:24 PM PDT by lucyblue (Land of the Free, Home of the Brave - It Was Good While It Lasted.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PieterCasparzen
Bond needs a new villan. Obama and the Americans should be the new SPECTRE.


8 posted on 06/12/2013 5:15:22 PM PDT by Vince Ferrer
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PieterCasparzen

American government doesn’t exist to ‘keep us safe’, but to keep our liberty safe. That’s a big difference.


9 posted on 06/12/2013 5:17:45 PM PDT by 1010RD (First, Do No Harm)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PieterCasparzen
I'm wondering if they are also collecting and storing the history of ping locations for all individual cell phones from the phone companies. The phone companies have this ping “meta-data” but I'm not sure how long they store it and whether it is among the meta-data that the NSA is sweeping up. This ping history tells you with reasonable accuracy the location of any cell phone at any time at least as long as the phone is on and within range of at least one cell phone tower.

So you wouldn't even need to be making phone calls and they could tell approximately where you (or technically your cell phone) were at any given time.

13 posted on 06/12/2013 5:30:44 PM PDT by House Atreides
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PieterCasparzen

They know that I have problems with my credit cards because of all the calls I get from “Rachel” of “Card Services” who promises to lower my interest rate.


17 posted on 06/12/2013 5:39:08 PM PDT by Fresh Wind (The last remnants of the Old Republic have been swept away.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PieterCasparzen

Bttt.


19 posted on 06/12/2013 5:49:36 PM PDT by Inyo-Mono (NRA)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PieterCasparzen

bkmk


20 posted on 06/12/2013 5:59:21 PM PDT by AllAmericanGirl44 ('Hey citizen, what's in YOUR closet?')
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PieterCasparzen

Deb Roy - of MIT, this video starts out showing how he wired his house with video cameras. Data and images were tracked and saved.

This is eye opening as to what a DATA tracking landscape looks like, and is just a glimpse of how “we” are being tracked through social media.

http://www.ted.com/talks/deb_roy_the_birth_of_a_word.html


22 posted on 06/12/2013 6:11:59 PM PDT by Bluebird Singing
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PieterCasparzen
all data is connected. think of the phone number as the handle on the briefcase containing however as much of you communications tracks as have been saved on some server.

the phone number's connected to the email,
the email's connected to the websites,
the websites are connected to the data,
the data is your personal life.

24 posted on 06/12/2013 6:24:51 PM PDT by schm0e ("we are in the midst of a coup.")
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PieterCasparzen

I wonder how long it will take for lawyers to begin to supoena e-mails, skype, text-messages, and messages or any other thing which could be used in a court of law to fight any legal proceeding. For example if 2 drug dealers are talking on skype and one gets caught, then turns states evidence to reduce a sentence, it might exhonerate someone who says they were not part of the deal. So they suppoena the documents and it seems each party has a right to a vigorous defense.


25 posted on 06/12/2013 6:25:22 PM PDT by Texas Songwriter (')
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PieterCasparzen

Obama and his ‘metadata’ have just killed their beloved social media. Anyone who stays on it now is a fool.


26 posted on 06/12/2013 7:22:08 PM PDT by AdaGray
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PieterCasparzen
In intelligence this is called "Traffic Analysis.". Think about WWII, where radio traffic was sent in Morse Code, with all words reduced to 5 digit numbers, which were then encrypted. A radio operator would transmit the coded message "38751 19054 09528" which would be decoded, to remove the encryption, as "83206 64509 54073."

Without the key to the code, the other side could not translate the first three sets of numbers into the second set of numbers, and without the code book it could not look up the meaning of the second of numbers as "next transmission noon."

But the other side could, with hard, meticulous work, deduce that an Infantry Division HQ, a field hospital, and an Armored Regiment HQ, all have different, and unique, patterns of radio traffic, based on the amount of radio traffic, the number of sub-units (if any) that acknowledged receiving the radio traffic, and the like.

When an Infantry Division and an Armored Regiment held in reserve suddenly started chatting with a Corp. HQ, and stopped talking to the Army HQ that reserve units spoke to, it was very clear that those two units were now assigned to the Corp. HQ, and were moving up to the front. That could be deduced even if absolutely none of the contents of the messages could be read. And it could be deduced by tired human brains, with limited understanding of the other side's radio traffic.

Just think about the relationships a super computer with perfect knowledge of time and place and other parties with whom you have made and received every call, text and email, for a period of years, will be able to deduce.

31 posted on 06/12/2013 9:13:36 PM PDT by Pilsner
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson