Linked by Thom Holwerda on Thu 25th Jul 2013 16:32 UTC
Legal "The U.S. government has attempted to obtain the master encryption keys that Internet companies use to shield millions of users' private Web communications from eavesdropping. These demands for master encryption keys, which have not been disclosed previously, represent a technological escalation in the clandestine methods that the FBI and the National Security Agency employ when conducting electronic surveillance against Internet users." Well. "And where once you had the freedom to object, think, and speak as you saw fit, you now have censors and systems of surveillence coercing your conformity and soliciting your submission." When quoting a work of fiction befits the state of reality better than reality itself, shit has officially hit the fan.
Thread beginning with comment 567960
To read all comments associated with this story, please click here.
Comment by lucas_maximus
by lucas_maximus on Thu 25th Jul 2013 20:33 UTC
lucas_maximus
Member since:
2009-08-18

Everyone that is spazzing out about data protection ... there is no way to collect this amount of data and properly analyse it.

Google has a better budget probably than the feds and they can't do it effectively 100% of the time.

Data Mining is really complicated ... Considering I worked for Government and large orgs, everyone is assuming everyone has a single purpose that aligns with the organisations is just unrealistic. Especially considering the number of people involved and the amount of data.

Edited 2013-07-25 20:36 UTC

Reply Score: 0

RE: Comment by lucas_maximus
by TechGeek on Thu 25th Jul 2013 23:11 in reply to "Comment by lucas_maximus"
TechGeek Member since:
2006-01-14

Yes data mining is hard, if you want to glean information not directly on hand, such as trends, circles of influence and such. However, data mining is easy if you are just looking for dirt to smear someone's reputation, or find them or someone they know. We have already seen data mining fail to stop an attack. The Boston bombers used cell phones to talk to Russia, had web presences and we still didn't have a clue.

Reply Parent Score: 5

lucas_maximus Member since:
2009-08-18

Well if it is used to smear then its (lack of) value would be obvious.

Reply Parent Score: 2