Microsoft Windows Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 19 May 2012

UK: British surveillance program To expose private lives

Posted on 14:02 by Unknown
LONDON (AP) — British officials have given their word: "We won't read your emails."
But experts say the government's proposed new surveillance program will gather so much data that spooks won't have to read your messages to guess what you're up to.
The U.K. Home Office stresses it won't be reading the content of every Britons' communications, saying the data it seeks "is NOT the content of any communication." It is, however, looking for information about who's sending the message and to whom, where it's sent from and other details, including a message's length and its format.
The proposal, unveiled last week as part of the government's annual legislative program, is just a draft bill, so it could be modified or scrapped. But if passed in its current form, it would put a huge amount of personal data at the government's disposal, which it could use to deduce a startling amount about Britons' private lives — from sleep patterns to driving habits or even infidelity.
"We're really entering a whole new phase of analysis based on the data that we can collect," said Gerald Kane, an information systems expert at Boston College. "There is quite a lot you can learn."
The ocean of information is hard to fathom. Britons generate 4 billion hours of voice calls and 130 billion text messages annually, according to industry figures. In 2008, the BBC put the annual number of U.K.-linked emails at around 1 trillion.
Then there are instant messaging services run by companies such as BlackBerry, Internet telephone services such as Skype, chat rooms, and in-game services like those used by World of Warcraft.
Communications service providers, who would log all that back-and-forth, believe the government's program would force them to process petabytes (1 quadrillion bytes) of information every day. It's a mind-boggling amount of data, on the scale of every book, movie and piece of music ever released.
So even without opening emails, how much can British spooks learn about who's sending them?
THEY'LL SEE THE RED FLAGS
Did you know how fast you were going?
Your phone does.
If you sent a text from London before stepping behind the wheel, and a second one from a service station outside Manchester three hours later, authorities could infer that you broke the speed limit to cover the roughly 200 miles that separate the two.
Crunching location data and communications patterns gives a remarkably rich view of people's lives — and their misadventures.
Ken Altshuler, of the American Academy of Matrimonial Lawyers, raves about the benefits smartphones and social media have brought to savvy divorce attorneys. Lawyers don't need sophisticated data mining software to spot evidence of infidelity or hints of hidden wealth when they review phone records or text traffic, he said.
"One name, one phone number that's not on our client's radar, and our curiosity is piqued," he said. The more the communication — a late-night text sent to a work colleague, an unexplained international phone call — is out of character, "the more of a red flag we see."
THEY'LL KNOW WHEN YOU'RE SLEEPING
The ebb and flow of electronic communication —that call to your mother just before bed, that early-morning email to your boss saying you'll be late — frames our waking lives.
"You can figure somebody's sleep patterns, their weekly pattern of work," said Tony Jebara, a Columbia University expert on artificial intelligence. In 2006, he helped found New York-based Sense Networks, which crunches phone data to do just that.
Jebara said that calls made from the same location from 9 to 5 are a good indication of where a person works; the frequency of email traffic to or from a person's work account is a good hint of his or her work ethic; dramatic changes to a person's electronic routine might suggest a promotion — or a layoff.
"You can quickly figure out when somebody lost their job," Jebara said, adding: "Credit card companies have been interested in that for a while."
THEY'LL KNOW WHO'S THE BOSS
Drill down, and communication can reveal remarkably rich information. For example, does office worker A answer office worker B's missives within minutes of the message being sent? Does B often leave colleagues' emails unanswered for hours on end? If so, B probably stands for "boss."
That's an example of what Jebara's Columbia colleagues call "automated social hierarchy detection," a technique that can infer who gives the orders, who's respected and who's ignored based purely on whose emails get answered and how quickly. In 2007, they analyzed traffic from the Enron Corporation's email archive to correctly guess the seniority of several top-level managers.
Intelligence agencies may not need such tools to untangle corporate flowcharts, but identifying ringleaders becomes more important when tracking a suspected terrorist cell.
"If you piece together the chain of influence, then you can find the central authority," he said. "You can figure that out without looking at the content."
THEY'LL KNOW WHO YOU'RE TALKING TO
Seeing how networks of people communicate isn't just about finding your boss. It's about figuring out who your friends are.
Programs already exist to determine the density of communications — something that can identify close groups of friends or family without even knowing who's who. If one user is identified as suspicious, then users closest to him or her might get a second look as well.
"Let's say we find out somebody in the U.K. is a terrorist," said Kane. "You know exactly who he talks to on almost every channel, so BOOM you know his 10 closest contacts. Knowing that information not only allows you to go to his house, but allows you to go to their houses as well."
A SNOOPER'S CHARTER?
Detective work at the stroke of a key is clearly attractive to spy agencies. British officialdom has been pushing for a mass surveillance program for years. But civil libertarians are perturbed, branding the proposal a "snooper's charter."
Kane says the surveillance regime has to be seen in the context of social networks such as Facebook and LinkedIn, where hundreds of millions of people are constantly volunteering information about themselves, their friends, their family and their colleagues.
"There's no sense in getting all Big Brother-ish," he said. "The bottom line is that we're all leaving digital trails, everywhere, all the time. The whole concept of privacy is shifting daily."
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • how linux is built
  • Samsung Electronics has bought Boxee
    Samsung Electronics has confirmed its purchase of Boxee on Wednesday for its  smart TVs .  Samsung plans to use this acquisition as a way to...
  • Another Microsoft Guru Steps Down
    Microsoft announced on Monday that company veteran Craig Mundie has stepped down from his post as chief of research and will retire in th...
  • Dr. Dre Top As The New Hip-Hop’s Top Earner
    Six years ago Dr. Dre was walking   for more click here
  • Microsoft new Windows, tablet
    US computing giant Microsoft on Tuesday gave an early peek to the key Chinese market of its new tablet computer and Windows 8 software, pr...
  • Thought words
    “ Greatness lies not in being strong, but in the right using of strength. ” — Henry Ward Beecher
  • How to Move Your Email to Another Mac
    If you use Apple's Mail application, there will probably come a time when you'll want to move your email messages and email account...
  • How To SSH Hop With Key Forwarding from Windows
    In this guide we’ll explain how to SSH to a Linux machine from Windows with your public key, using Putty & Winscp. In addition, we wil...
  • Japan's largest solar and wind power project breaks ground
    Seven Japanese companies have been celebrating the ground breaking of their solar and wind power project at a ceremony held today at the ...
  • How to Recover a Deleted File
    It’s happened to most of us. You delete a file and realize you need it back. This guide will explain when you can get that file back and how...

Categories

  • 3 D printers
  • 360s
  • amazon
  • android
  • animation
  • apple
  • bing
  • book
  • boxee
  • browser
  • china
  • chrome
  • console
  • dicaprio
  • domain
  • ecommerce
  • facebook
  • ferrari
  • finland
  • gadget
  • galaxy
  • games
  • gmail
  • google
  • hosting
  • HTC
  • internet
  • ipad
  • iphone
  • iphoto
  • iwatch
  • japan
  • keyborad
  • lenovo
  • linux
  • lunar
  • microsoft
  • mobile
  • moon
  • movil
  • ms
  • names
  • new tech
  • Nokia
  • online
  • password
  • pc
  • phone
  • retails
  • samsung
  • search
  • smartphone
  • software
  • space
  • tablet
  • tech
  • text messages
  • track
  • trip
  • usres
  • web
  • whatsapp
  • whois
  • window
  • words
  • xbox

Blog Archive

  • ►  2013 (160)
    • ►  December (1)
    • ►  November (9)
    • ►  September (5)
    • ►  August (8)
    • ►  July (19)
    • ►  June (12)
    • ►  May (23)
    • ►  April (3)
    • ►  March (5)
    • ►  February (18)
    • ►  January (57)
  • ▼  2012 (340)
    • ►  December (25)
    • ►  November (34)
    • ►  October (24)
    • ►  September (27)
    • ►  August (26)
    • ►  July (46)
    • ►  June (83)
    • ▼  May (42)
      • Final test version of Windows 8 released
      • The Pros And Cons Of Using Cloud Hosting
      • China: The world's cleverest country?
      • 40 percent of Germany’s electricity demand this we...
      • Samsung to start selling Galaxy S3 in 28 nations
      • Britain : Do UK need an Aircraft Carrier?
      • Facebook is making a phone, are you aware?
      • Browser wars flare in mobile space
      • Yahoo! ditches digital newsstand for iPads
      • China fund may help Alibaba in Yahoo! bid: report
      • The Growing Vietnam's new technology entrepreneurs...
      • Installing an RPM Package on Ubuntu Linux
      • How Do Linux File Permissions Work?
      • Google in patent fight with Oracle
      • Are the police tracking your calls?
      • Is China becoming the biggest app market for smart...
      • Sheryl Sandberg, the Woman Behind Facebook's Busin...
      • Microsoft launches has lauched its own facebook
      • is Google chrome overtaking internet explorer as #...
      • Uk cities to get Super - connected
      • Japan Lunches SouthKorea Satellite
      • Alibaba buys half of Yahoo stake for $7.1bn
      • Facebook First Female Engineer
      • Facebook founder Mark Zuckerberg Wed His Long time...
      • Knowing How To Connect a Bluetooth Keyboard to an ...
      • Knowing How to Change Your Mac's DNS Servers
      • UK: British surveillance program To expose private...
      • Internet: China mobile online user top 1.1billion
      • see how people uses facebook by numbers
      • World cheapest computer priced at $25. Will it rev...
      • facebook has made Bono, the richest musician in th...
      • will facebook becomes the first trillion dollars c...
      • Face has added 84 Million More Shares For Sale
      • Will Facebook IPO bring cash and changes to the c...
      • Knowing How to Change Your IP Address Using PowerS...
      • Facebook plans to start charging you money for you...
      • Is Facebook ahead IPO excitement creating intensity?
      • Youtube: Do video sharing app demise youtube?
      • FACEBOOK:will you give up your citizenship just be...
      • 'Angry Birds' Game Maker to Lunch a New Game calle...
      • music-movie streaming firm mSpot, is being bought ...
      • Facebook buys Glancee a mobile discovery startup
    • ►  April (33)
Powered by Blogger.

About Me

Unknown
View my complete profile