GCHQ The innocent collection of metadata and other details

The release of even more files leaked by Edward Snowden reveals the astonishing scale and scope of surveillance of GCHQ and governments in general one year after the first revelations.GCHQ

The recent revelations of the site Intercept report a program of British GCHQ known as "Karma Police." With this program, the intelligence agency collected more than 1.1 trillion information from UK citizens from August of 2007 to March of 2009.

Οι πληροφορίες αυτές προέρχονται από τα μεταδεδομένα των χρηστών του Διαδικτύου και περιλαμβάνουν λεπτομέρειες σχετικές με τηλεφωνικές κλήσεις, ηλεκτρονικού ταχυδρομείου, κωδικούς πρόσβασης, επαφές, αριθμούς τηλεφώνων, διευθύνσεις ηλεκτρονικού ταχυδρομείου, καθώς και τους φακέλους που χρησιμοποιούνται για την οργάνωση των e-mail, αλλά όχι το ίδιο το περιεχόμενο των μηνυμάτων ή των e-mail.

These metadata can help identify people of interest, build profiles, and help secret services make decisions to start or step up private surveillance.

All this information can be collected at a minimal cost through traditional methods. In other words, metadata are not insignificant as governments want to believe. This is why governments collect and process them.

However, the massive collection of metadata - where information is gathered by everyone and not by an "interested person" - is rightly a deep wound to security and human rights.

Does our metadata collection make us safer?

It is not clear that the massive collection of metadata makes society more "safe". Although these elements can be used to investigate crimes, their use in preventing terrorist incidents is controversial.

This does not mean that the services δεν μπορούν να αναφέρουν περιπτώσεις στις οποίες βοηθήθηκαν με πληροφορίες για πιθανές , αλλά δεν μπορεί να δικαιολογήσει την μαζική συλλογή δεδομένων έναντι της στοχευμένης.

The massive collection of metadata is based on computer algorithmic analysis followed by the human crisis.

Here is the main topic. It is not clear whether the information is properly evaluated or whether false positive results are generated by adopting an approach centered on computational power rather than human judgment and experience.

Is monitoring reasonable?

Suppose, however, that mass surveillance does a good job and data collection can be justified. Could this be an excuse?

The answer, in my opinion, should be determined by the supervision and the importance we attach to our political rights.GCHQ

A player who collects and processes this volume of information needs supervision.

However, we have seen that despite the fact that GCHQ is under the supervision of the Information Service Commissioner and the Secretary of the Ministry of Foreign Affairs, we still rely on leaks and informants to have a clear picture of what is happening.

We are in today, however, and the development of mass data collection, computerized expl by government agencies essentially fosters a new highly political, corporate society and potentially gives us a new popular understanding of what "private life" is and what it really entails.

What are we entitled to hold for ourselves? What is our private space and is this space common to the state?

According to the Court of Justice of the European Union, in April 2014, metadata "may allow very precise conclusions about privacy". For any conservation regime, appropriate safeguards and restrictions are needed, otherwise the results of surveillance could be corrosive, creating a creepy feeling that "each of us is constantly monitored".

With data from TNW.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).