Skip to main content

View Diary: Google, Facebook, The NSA & Data Collection (69 comments)

Comment Preferences

  •  capturing and storing is one aspect (3+ / 0-)
    Recommended by:
    CroneWit, worldlotus, kurt

    and I can wrap my feeble mind around how this is possible, but WTF do you do with it? That's where I get lost. What hueristics are being applied to yield anything that might remotely be deemed useful? Why do we hear of these umpteen "foiled plots" all of a sudden, and not when they were "foiled"? This is where the real 'splainin is needed, IMO.

    •  database keys.... One can write a query based (4+ / 0-)
      Recommended by:
      CroneWit, worldlotus, tegrat, kurt

      upon key fields and tie multiple databases together to get a picture of a person.  Your email address is one such key data point.  Verizon has email service with their accounts, as a courtesy(?!?!?!).  That email address will tie it to your phone records.  Your phone number is stored on your medical records.  They now have access to your medical records.  Your email may be tied to your bank account.  If you do on-line pay, they've got a line to your bank account and everyone you've paid on-line.

      All you need is a single data point and start doing queries, and joining multiple databases together, (which is done in the way the query is written) against that and expand from there.  The person writing the query would need to know what the column names and definitions are for the databases though.  But, then the feds can name a column whatever they want and it can be pretty easy to determine what type of data (hex, numeric, alpha, alpha/numeric, comp-3, comp-6) and its length is with reasonable analysis.

      •  so basically we are just admitting that all that (2+ / 0-)
        Recommended by:
        DRo, kurt

        info is waiting to be exploited once they want something on a particular individual. My question is, of what use is the info in pointing towards a particular individual? How does it do that? What are the filters/rules/etc? These are the questions that need to be answered, IMO, because it is almost without question that any answer has no lawfully supported purpose behind it.

        •  asdf (3+ / 0-)
          Recommended by:
          DRo, tegrat, kurt

          "that all that info is waiting to be exploited once they want something on a particular individual."

          I think that's basically what they have - everyone's business in one place waiting for a warrant to 'allow' them to search the databases.  I'm sure that there's a whole lot more to what they can do.  I'm just not insane enough, diabolical, nosey enough to go snooping other people's dirt.

          'My question is, of what use is the info in pointing towards a particular individual? How does it do that? What are the filters/rules/etc?'

          Say you hear on the street x is behaving in a suspicious manner, one can search on this individual to check to see what they've been up to, which possibly lead to probable cause (after the fact of snooping), so go get the warrant to validate the search already done, but now you can query data associated by degrees of separation related to the first person....  Yeah, it's rather thin theory.  Rules, what rules?!?!?!  We don't know, it's secret....

Subscribe or Donate to support Daily Kos.

Click here for the mobile view of the site