NSA Security Claims DisprovedAdded: Saturday, December 28th, 2013
Category: Recent Headlines Involving File Sharing > Ridiculous Criminal Trials
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
Claims by the American spooks that they are not able to find out much about people from the data they collect have been blown apart. The NSA and some lawmakers used to assert that information it was collecting, like phone numbers and length of calls, couldn’t be tied to the callers’ names. But an investigation by people who have been collecting data voluntarily from Android users proved that it was easy to correlate numbers to names.
The recent program named Metaphone collected information from volunteers with Android phones. They gathered such data as recent calls, texts and social network information. The goal was to find out how metadata can be connected with surveillance. So, the researchers selected 5,000 numbers from their pool to find out whether they could manage to connect any of them to people names through freely available online tools.
The researchers discovered real names for 27% of the numbers using only Google, Yelp, Facebook and Google Places. They wondered what would happen if the spies expended a bit of brainpower on such a project. The researchers randomly sampled 100 numbers from their dataset, Googled each and in under an hour managed to associate a person or a business with 60% of numbers. When they added in their 3 initial sources, they were up to 73%. Moreover, if the spies wanted to invest some money into the project, they could get the figures up to 90% without much effort.
The researchers issued an update to the Metaphone application which enabled instant feedback for users, providing them with a quick view of how closely they were connected to other app users and how many businesses they have been in contact with. Anyway, it makes the NSA protests about spying look sick.
December 28th,2013Posted by:
Saturday, December 28th, 2013
|posted by (2013-12-28 19:28:42)|
|What do you expect from a pig but a grunt?|
|And... what ever we have, they have better. I, again, find it amazing that people would even consider believing a group like the NSA or any of the covert puppets and their masters. That there even needs to be an investigation, its the NSA's job to deceive, misinform and misdirect.|
|posted by (2013-12-29 13:00:36)|
|And while on the subject of the NSA, there is this story from the Associated Press that was obtained by German newspaper "DER SPIEGEL".....|
LONDON — A German magazine has lifted the lid on the operations of the National Security Agency's hacker unit, revealing how American spies intercepted computer deliveries, exploited hardware vulnerabilities, and even hijacked Microsoft's bug report system to spy on their targets.
Der Spiegel's revelations relate to a division of the NSA known as Tailored Access Operations, or TAO, which is painted as an elite team of hackers specializing in stealing data from the toughest of targets.
Citing internal NSA documents, the magazine said Sunday that TAO's mission was "Getting the ungettable," and quoted an official as saying that TAO had won "some of the most significant intelligence our country has ever seen."
Der Spiegel has published a series of NSA stories based on documents leaked by former intelligence worker Edward Snowden.
.....the original LONG story can be viewed at - miniurl[.]com/nsa_report - Remove the brackets [ ]
|posted by (2013-12-29 23:50:49)|
|I hope all of these NSA revelations clue people in to what their own governments are striving for and it doesn't just become a way to distract people to focus on the "evil NSA" while their own intelligence agencies expand and exploit unhindered.|
Point of fact, I was approached for recruitment into a group similar to TAO in 2008, and it wasn't the US that was doing the asking. I'm pretty sure these agencies are widespread. And no, I didn't accept and haven't worked in the field at all since then.
|posted by (2013-12-30 05:50:27)|
|nsa only monitored data and who resolves claims must be the agency that manages all internal government claims.|
Most Popular Stories