NSA spying on social-networking spaces
In the midst of the political conflagration generated by revealed wiretapping of domestic phone calls, it recently came to light that the NSA has been funding research to raise data-mining efforts to include social-networking Web sites.
These websites, which include household names such as MySpace.com and Facebook.com, represent a large data source for agencies like the NSA to tap into. With more than 80 million accounts located on MySpace.com alone, the sites offer a wide variety of publicly available information such as contacts and shared activities.
This kind of information, if correctly collected and filtered, can be combined with other gathered data to reveal information as to a person's banking, retail and property records and eventually help fill in the picture of a potential terror suspect's activities. And such an aid could prove to be extremely helpful to the intelligence community in its pursuit for both terror suspects and criminals. In the past, intelligence administrators have complained that harvested phone logs, while appropriate to their searches, provided only a limited scope to a person's social network. Data that is collected from these sites may help to provide a more complete picture of the person in question.
Established in 1952, the NSA's primary duty has been the collection and analysis of foreign communications. Though not officially tasked for domestic surveillance and generally leaving this function to organizations such as the FBI, which is specifically chartered for this, the NSA has garnered domestic phone calls since the attacks on September 11, 2001.
"There are 80 million individuals who've put their life up for everyone to see," said an analyst for Creative Strategies, a technology analysis firm. The analyst further then pointed out that the question as to the NSA's actions arose in how the information was collected beyond what was publicly displayed for anyone to read.
"If you get access behind the firewall, you're trying to trigger identities and figure out where the content is originating from," he said. "Then it comes down to discretion."
It should be mentioned that the NSA searches are also tying into a time when the Internet is evolving towards what's known as the "semantic Web." With uncomplicated code revisions to major Web sites, the Internet's content becomes easier to search through and index, larger systems and search engines seeing the structure of the Internet in a more logical, easily searchable way. While the "semantic Web" may help surveillance, it also assists in making searches more accurate.
Others are wondering about the logic in NSA's tracking of terrorist connections through social-networking sites such as MySpace.com and Facebook.com.
The reason for this question is that terrorist organizations generally rely on telephone-based communications and despite the accessibility of MySpace, there may be more value in data harvested from a telephone call.
One expert in the industry said that, in his experience, there are different incentives for using sites like these. You try to link to as many people as possible. It's hard to make 100 calls a day and it's a tangible cost. He added that there is a more tangible/invested connection in the phone call than just through the link on MySpace.
Professor Singh of the Computer Science Department at Georgetown University said that "Right now it's unclear as to how much of this data is public and how much is private and this is where concerns arise. We shouldn't be concerned that the data is being used, we should be concerned about where the data is from."
Professor Singh further added that "There's a natural tradeoff that occurs between privacy and data mining and analysis. Data mining isn't a bad thing, as it helps us understand trends. Still, it can be misused if there's a lot of private information that gets exposed. They shouldn't go behind the firewall. If there's a firewall, then there's the notion that what's beyond the firewall is essentially not public. We can't stop the government from accessing it, but people should be concerned about how much they want potentially millions of eyes to see."
OFFSHORE ASSET PROTECTION
- Asset Protection Tax Summaries Italy
- Offshore Cayman Islands
- Asset Protection Tax Summaries Ecuador
- ASSET PROTECTION NSA SPYING
- Asset Protection Tax Summaries France
- Offshore Pensions And Taxes
- IRS Abusive Trusts
- Panama Region
- Tax Avoidance Vehicles
- Asset Protection Tax Summaries Honduras
- Asset Protection Guernsey Taxes
- Asset Protection Panama Foundations
- Asset Protection Identity Theft
- Offshore And Alternative Investments
- Offhshore Banking Privacy
- Asset Protection Privacy
- Irrevocable Life Insurance Trust
- Bahamas Information
- Asset Protection Expatriation
- Asset Protection Tax Summaries Panama1
- Asset Protection Taxing Expats
- Asset Protection Taxing Foreign Stock
- Asset Protection Flat Tax For Puerto Rico
- Asset Protection Location Of Your Company
- Asset Protection Caribbean Tax Havens
- Asset Protection Renunciation
- Asset Protection Offshore Definition
- Asset Protection Panama
- Family Limited Partnerships Tax
- Boats Asset Protection
- Asset Protection Tax Summaries Ireland
- Taxation Foreign Corporations
- Asset Protection Tax Summaries Mexico
- Asset Protection Offshore Liechtenstein
- Private Annuity Ruling Irs
- Asset Protection Hong Kong
- Assetprotection Trusts
- Asset Protection Faq
- Intentionally Defective Grantor Trust
- Panama Canal Zone
- Asset Protection Laundering
- Going Offshore
- Offshore Asset Protection
- Dynasty Trust The Basics
- Offshore Asset Protection Planning
- Secret Bank Accounts
- Asset Protection Police
- Asset Protection Guernsey
- Asset Protection Second Passport
- Asset Protection Tax Summaries Nicaragua
- Asset Protection Scam Trusts
- Nevis Offshore Financial Center
- Asset Protection Using Offshore Trusts
- Probate And Revocable Trusts
- Asset Protection Lawsuit Prevention
- Poetic Injustice In The Pearl River Delta
- Offshore Financial Centers Ireland
- Panama Comfort Zone
- Isle Of Man No Tax Zone
- TrustMakers Forms Center
- TrustMakers Site Map
Learn more about protecting your assets with these articles:
If you are looking for the most important concepts in Asset Protection, this is where to start! If you need to talk intelligently about protecting your net worth or you are a professional this online training program is for you!
Get our Free Online Asset Protection Video Course.
Learn how to protect yourself like the pros!
Clear, concise and straight forward, this e-Book will help you make sound decisions with your business and personal assets..
This e-course will give you straight forward asset protection advice you can implement now. One of the best asset protection courses available! Includes 70+ video lessons, 3 Ebooks, and 6 example legal documents!
The key to a solid Asset Protection Plan is the Estate Plan. This downloadable estate organizer will help you keep track of important information about your assets and important legal documents all in one place.