Forgot your password?
typodupeerror
Communications AT&T Government Privacy Your Rights Online

WA Post Publishes 4 More Slides On Data Collection From Google, Et Al 180

Posted by timothy
from the so-much-wool-so-many-eyes dept.
anagama writes "Lots of new program names, flowcharts, and detail in four previously unreleased PRISM slides published by the Washington Post today. These slides provide some additional detail about PRISM and outline how the NSA gets information from those nine well known internet companies. Apparently, the collection is done by the FBI using its own equipment on the various companies' premises and then passed to the NSA where it is filtered and sorted."
This discussion has been archived. No new comments can be posted.

WA Post Publishes 4 More Slides On Data Collection From Google, Et Al

Comments Filter:
  • But you have to be a true artist to design a powerpoint deck that horrible. Only Government types invest that kind of effort.

  • by Anonymous Coward on Sunday June 30, 2013 @01:19PM (#44148061)

    OK and how can I block Ghostery's snooping?

    I think Ghostery Busters is the place to start.

  • by Anonymous Coward on Sunday June 30, 2013 @02:53PM (#44148513)

    You might sleep a little bit more at night if you understand that no company or government agency gives a shit what you do or say. In the end you are just disillusioned fool who believes someone would waste the time tracking you so they can disappear you one stormy night. For a supposedly tech related sight the people are showing a real penchant for ignoring the feasibility of the government actually using all the data for some nefarious purpose. The sheer volume of electronic data floating around makes computer analysis a serious bottleneck. If the automated systems flags something of interest there are no way near having the manpower and time to actively follow-up any suspicious data. If the government wants to investigate you they have had the means to do so even before the internet was even invented it just took longer. The call metadata collected might be useful for creating a really cool analysis of electronic communication patterns but sifting every packet in search of someone doing something anti-government is ludicrous. If you must waste time shouting about your rights being violated I would suggest you target the online companies collecting and selling your data to anyone who can pay for it.

After an instrument has been assembled, extra components will be found on the bench.

Working...