A New Theory

If the NSA has hacked the backbone of the internet,

“We hack network backbones — like huge Internet routers, basically — that give us access to the communications of hundreds of thousands of computers without having to hack every single one,” – Snowden

And is collecting the metatags


Google, Facebook, The NSA & Data Collection

Collecting microdata would be included.

More on microdata:



Next brief yourself on

Mining Query Subtopics from Search Log Data – A Microsoft experiment

This is not a theory any longer. I do believe this is in practice:

Our team has developed a system for storing and processing huge amounts of log data using Hadoop. The challenge was to handle Gigabytes of log messages every day and enable querying the 30+ Terabyte archive with instantaneous results.

Typical query times are about 2-3 seconds with this approach, which is considerably less than stated in our customer’s requirements.

Self Portrait by Founder Julia ClarkThe point of the research was to see if an NSA agent could request a unique string of search terms or other data such as a link, & see or find the matching computer or user in real-time. I conclude this is possible. Moreover, a probable match would be found if the string is unique enough & a refinement of a micro time frame was applied. This theory should also work with links.

Next question would be how does site – specific search metadata & microdata terms pass through the TOR & is it traceable by this means?

While doing this research I noted another research had fleshed out this theory

Evidence that the NSA Is Storing Voice Content, Not Just Metadata

Ok, so it is possible, if not probable, that the NSA has real-time tagging of person or at least a computer. What does this mean for the non-technical readers?

As of October 1, 2010, 2,166,679 government employees held confidential/secret security clearances and 666,008 held top-secret clearances. 541,097 government contractors held confidential/secret security clearances and 524,990 held top-secret clearances.

With that amount of persons engaged in the above activities with access to the microdata, the odds of a criminal organization deriving from that is large. The chances of an erratic or deranged person using the information to stalk you for some imagined slight terrifyingly large. Now, apply that to the good buddy system; the danger is real to your daughter, to your son, to your wife, to your husband, to your mother, to your father, to your family.



One comment on “A New Theory

  1. […] post  A New Theory goes into detail explaining how log data is processed and pushed into manageable and searchable […]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s