SUBSCRIBE TO OUR FREE NEWSLETTER
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
5
#000000
#FFFFFF
To donate by check, phone, or other method, see our More Ways to Give page.
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
In an exclusive interview with The Guardian, this pioneer in internet privacy warned that the dangers of metadata surveillance go beyond mass-scale aggregation. Metadata can also be collected on an individual level to monitor and go after journalists' sources. He explains:
You're a journalist for the Guardian. You know that the Guardian sometimes writes stories that are of great interest to intelligence agencies. Well, what if the intelligence agencies want to see if a journalist at the Guardian is talking to a particular sensitive source?
You don't have to do a lot of data mining for that. All you have to do is find that so-and-so, some government employee, is talking to some journalist at the Guardian. Then somebody's in a heap of trouble.
PGP was created by Zimmermann in 1991 as an encrypted, more private alternative to commercial email communications. He has developed a host of other privacy technologies as well, including an app for encryption smart phone calls.
In early September it was revealed that the NSA had virtually defeated encryption safeguards to protect online privacy, by breaking code and controlling and manipulating technology companies.
_____________________
Common Dreams is powered by optimists who believe in the power of informed and engaged citizens to ignite and enact change to make the world a better place. We're hundreds of thousands strong, but every single supporter makes the difference. Your contribution supports this bold media model—free, independent, and dedicated to reporting the facts every day. Stand with us in the fight for economic equality, social justice, human rights, and a more sustainable future. As a people-powered nonprofit news outlet, we cover the issues the corporate media never will. |
In an exclusive interview with The Guardian, this pioneer in internet privacy warned that the dangers of metadata surveillance go beyond mass-scale aggregation. Metadata can also be collected on an individual level to monitor and go after journalists' sources. He explains:
You're a journalist for the Guardian. You know that the Guardian sometimes writes stories that are of great interest to intelligence agencies. Well, what if the intelligence agencies want to see if a journalist at the Guardian is talking to a particular sensitive source?
You don't have to do a lot of data mining for that. All you have to do is find that so-and-so, some government employee, is talking to some journalist at the Guardian. Then somebody's in a heap of trouble.
PGP was created by Zimmermann in 1991 as an encrypted, more private alternative to commercial email communications. He has developed a host of other privacy technologies as well, including an app for encryption smart phone calls.
In early September it was revealed that the NSA had virtually defeated encryption safeguards to protect online privacy, by breaking code and controlling and manipulating technology companies.
_____________________
In an exclusive interview with The Guardian, this pioneer in internet privacy warned that the dangers of metadata surveillance go beyond mass-scale aggregation. Metadata can also be collected on an individual level to monitor and go after journalists' sources. He explains:
You're a journalist for the Guardian. You know that the Guardian sometimes writes stories that are of great interest to intelligence agencies. Well, what if the intelligence agencies want to see if a journalist at the Guardian is talking to a particular sensitive source?
You don't have to do a lot of data mining for that. All you have to do is find that so-and-so, some government employee, is talking to some journalist at the Guardian. Then somebody's in a heap of trouble.
PGP was created by Zimmermann in 1991 as an encrypted, more private alternative to commercial email communications. He has developed a host of other privacy technologies as well, including an app for encryption smart phone calls.
In early September it was revealed that the NSA had virtually defeated encryption safeguards to protect online privacy, by breaking code and controlling and manipulating technology companies.
_____________________