If the NSA has hacked the backbone of the internet,
“We hack network backbones — like huge Internet routers, basically — that give us access to the communications of hundreds of thousands of computers without having to hack every single one,” – Snowden
And is collecting the metatags
Collecting microdata would be included.
More on microdata:
Next brief yourself on
This is not a theory any longer. I do believe this is in practice:
Our team has developed a system for storing and processing huge amounts of log data using Hadoop. The challenge was to handle Gigabytes of log messages every day and enable querying the 30+ Terabyte archive with instantaneous results.
The point of the research was to see if an NSA agent could request a unique string of search terms or other data such as a link, & see or find the matching computer or user in real-time. I conclude this is possible. Moreover, a probable match would be found if the string is unique enough & a refinement of a micro time frame was applied. This theory should also work with links.
Next question would be how does site – specific search metadata & microdata terms pass through the TOR & is it traceable by this means?
While doing this research I noted another research had fleshed out this theory
Ok, so it is possible, if not probable, that the NSA has real-time tagging of person or at least a computer. What does this mean for the non-technical readers?
As of October 1, 2010, 2,166,679 government employees held confidential/secret security clearances and 666,008 held top-secret clearances. 541,097 government contractors held confidential/secret security clearances and 524,990 held top-secret clearances.
With that amount of persons engaged in the above activities with access to the microdata, the odds of a criminal organization deriving from that is large. The chances of an erratic or deranged person using the information to stalk you for some imagined slight terrifyingly large. Now, apply that to the good buddy system; the danger is real to your daughter, to your son, to your wife, to your husband, to your mother, to your father, to your family.
- Gov’t says trust us, though they don’t know who has security clearance (watchdog.org)
- A Blizzard of Snowdens (nationalreview.com)
- NSA Conspiracy Theories Turn Out To Be Totally Correct (marketfailure.wordpress.com)
- Leak risk: So many security clearances (politico.com)
- GCHQ taps fibre-optic cables for secret access to world’s communications (guardian.co.uk)
- What if China, Russia or Iran Hacks the NSA’s Vast Surveillance Database? (joemiller.us)
- Evidence that the NSA Is Storing Voice Content, Not Just Metadata (schneier.com)