General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsWhat Your Email Metadata Told the NSA About You (The AtlanticWire)
President Obama said "nobody is listening to your telephone calls," even though the National Security Agency could actually track you from cellphone metadata. Well, the latest from the Edward Snowden leaks shows that Obama eventually told the NSA to stop collecting your email communications in 2011, apparently because the so-called StellarWind program "was not yielding much value," even when collected in bulk. But how much could the NSA learn from all that email metadata, really? And was it more invasive than phone data collection? The agency is well beyond its one trillionth metadata record, after all, so they must have gotten pretty good at this.
To offer a basic sense of how StellarWind collection worked and how much user names and IP addresses can tell a spy about a person, even if he's not reading the contents of your email we took a look at the raw source code of an everyday email header. It's not the exact kind of information the NSA was pulling, of course, but it shows the type of information attached to every single one of your emails.
Below is what the metadata looks like as it travels around with an email we've annotated the relevant parts, based on what The Guardian reported today as the legally allowed (and apparently expanded) powers of the NSA to read without your permission. After all, it's right there behind your words:
As you can see, at the bare minimum, your average email metadata offers location (through the IPs), plus names (or at least email addresses), and dates (down to the second). The Guardian's Glenn Greenwald and Spencer Ackerman report that Attorney General Michael Mukasey and Defense Secretary Bob Gates signed a document that OK'd the collection and mining of "the information appearing on the 'to,' 'from' or 'bcc' lines of a standard email or other electronic communication" from, well, you and your friends and maybe some terrorists.
MORE AT:
http://www.theatlanticwire.com/technology/2013/06/email-metadata-nsa/66657/
Warren Stupidity
(48,181 posts)uponit7771
(90,301 posts)Warren Stupidity
(48,181 posts)uponit7771
(90,301 posts)Warren Stupidity
(48,181 posts)embarrass the NSA or the government. OK.
Does this information advance the protection of 4th amendment rights, perhaps by revealing that they have pretty much been scrapped under secret provisions of the patriot act?
kelliekat44
(7,759 posts)intaglio
(8,170 posts)KoKo
(84,711 posts)Looks so innocent..but, you could build a profile out of that...if you had the other person's data that the post is going to...
intaglio
(8,170 posts)may be answered in the same way that Sergeant/Captain/Commander was answered when he asked ...
uponit7771
(90,301 posts)tia
Armstead
(47,803 posts)bunnies
(15,859 posts)Personally, Ive never been under the impression that the internet was private.
NRaleighLiberal
(60,006 posts)HappyMe
(20,277 posts)KoKo
(84,711 posts)Add a little Olive Oil enough to cover pan bottom of size you choose for the quantity of BokChoy...Heat Oil to Medium...then lightly saute garlic anf then add white stems of BokChoy, sliced cherry tomatoes, a few long slices of Red Pepper..sprinkle with a little sea salt or regular salt...cook for a minute...or until white stems, red pepper strips and tomatoes look a little wilted...then add water or chicken broth (just a little 'cause you want to try to saute, steam...and add the green leaves cook on medium another couple of minutes...cover and turn heat off or low (depending on how long 'til serving).
Adjust as necessary for your tastes....
But, worked very tasty out for quick accompanyment to store bought Rotisserie Chicken.
Thought you might like this with your tomatoes coming in...I've got cherries which is the only ones I can grow on my deck.
aquart
(69,014 posts)Perhaps they will have to hire someone to decode them.
NRaleighLiberal
(60,006 posts)backscatter712
(26,355 posts)Quit talking smack about my daddy, you libertine meanies!
Luminous Animal
(27,310 posts)xchrom
(108,903 posts)KoKo
(84,711 posts)and to see that the "Subject Line" of our posts are being monitored is interesting to me.
I have niece and nephew on FaceBook who have their locations tracked and they think it's VERY COOL that wherever they go or eat...if they send a friend a post...that their location is shown and it stays up on Facebook ...Forever. They post everything about themselves...and as they grow older I would worry.
Would many people here on DU want what we did in our Teens and On for all our LIVES being Monitored and Stored in a Data Base for some "Unlimited time? Would we trust that they would DITCH than info EVEN IF CONGRESS TOLD THEM TO DO IT?
Why would you stop something you've been doing that's LEGAL under American Law just because useless CONGRESS told you to do it? WHY....it's such a trove of Information to Track your Buying/Selling/Food/Personal Interaction/Personal Preferences that US Marketing Companies have been having to spend big bucks on "Focus Groups and Marketing Survey's" for YEARS. Now you can just get that Info from the Private Contractors who Collect this Info from us and are Paid by the NSA with WHAT RESTRICTIONS on 2nd PARTY SALES TO ANY COMPANY WHO WANTS TO HAVE ACCESS US TO MANIPULATE US AS CONSUMERS...
DO YOU GET IT? We are DATA MINED...FOREVER and don't know HOW MANY have ACCESS TO THIS INFO....
Skidmore
(37,364 posts)Not seeing any jumpers.
Realistically all our data sloshes around. I was treated for cancer a few years back. With in three months of my surgery and radiation therapy, I started receiving information from funeral directors. Had never received this type of advertisement before. Either they got the info from the hospital, the cancer center, the pharmacy, or from the cancer register in the state. Still don't know how they came by it. But they did.
KoKo
(84,711 posts)but us olders know different. I was on a "Cancer Survivor List" for years after a Colectomy for a Cancerous Colon Lesion. It was because I did my research and took my "good chance" statistics from Mayo Clinic and other Leading Colin Cancer Research Sites that I refused the "Experimental Chemo" that some drug company was pushing on me Post Surgery. It would have involved major debilitation with some neck IV that I would have to wear for 3 to 6 months. Yet the stats from major Sites with Research said I was "Low Risk," and this was only if I was a "patient who did not want one cell of cancer available to metasticize in my body...ever." I got that info from extra 4th opinion from Duke Medical School's Top Colon Cancer Oncology Head. It was a scare tactic to get me to use an Experimental Drug and it was only ON MY OWN that I did Indie Research (have Med Background...so had an advantage on knowing where to look for latest data and how to read research reports, though).
Anyway...it's been 15 years....and for the first 10 years I got constant Invitations to "Survivors Celebration Milestone Party" at the Hospital where I had the Surgery. It was a Love Fest with Food, Music and Survivors Stories. (They were Monitoring Me to see how long I'd live since I DID NOT take their Advice). I'm not saying that those who needed that support weren't happy to have their hospital spend money for that Big Event every year and that many didn't feel it worthwhile. But, what the insurance company paid for my operation probably got a Kick Back from my Hospital throwing those "Survivor Parties" all those years...
That was my first taste of how our MEDICAL INFO has been monitored and how it can be used against us for Insurance Denial and for Experimental Reasons and other Meta Modeling used by Third Parties. I was a MARKED PERSON...used because SOMEONE had my DATA!
Edited...for typo's ... & very emotional issue for me...
KoKo
(84,711 posts)Skidmore
(37,364 posts)I've said before that the communications genie as it relates to the web was let out of the bottle a couple of decades ago and no rules applied up front for its applications. It was unsettling but not surprising given my understanding of how businesses seeks to market.
Recursion
(56,582 posts)Just to be clear: subject is not part of metadata.
Very specifically, it comes after the
DATA
command of the SMTP transaction, at which point the server stops logging.
Recursion
(56,582 posts)10.52.27.45 is in non-routable space, so it doesn't tell anybody anything.
Also, much less spatial information is conveyed by IP addresses nowadays than was true 20 years ago.
limpyhobbler
(8,244 posts)In real life people at home have routable IPs assigned.
Also if the gov't has anybody's IP address they can easily figure out exactly where the person is connected, simply by asking the ISP for the physical address where the IP address is assigned. They might need a subpoena depending on the ISP but I doubt they would need a warrant. Not 100% sure whether they would need a subpoena for that, or a "national security letter".
Recursion
(56,582 posts)For example, if you send from webmail, your own connecting IP address doesn't get logged, because your computer is requesting Gmail's (or whatever's) SMTP client to send on its behalf.
Honestly, very few people actually initiate SMTP sessions from their own computers anymore; most ISPs don't even allow it.
(Also, from the looks of it, that's a legit header sequence; the outside routable address checks out, and the 10. address is probably just the mail exchanger's local address on their LAN.)
limpyhobbler
(8,244 posts)not only the address of the sending mail server. Sometimes it is called "X-Originating-IP". (If they are behind a NAT you will see the public NAT address but that's neither here nor there).
Alot A few people run a local mail server at home, or at their small business, etc.
Recursion
(56,582 posts)The logs I have just start with the initiating SMTP client.
Do people really still run their own SOHO mail servers locally? That's so 1999.
limpyhobbler
(8,244 posts)But I think maybe it is up to the sending server whether or not to include the field, so email recipient can see the originating IP address.
A few people do run email servers at home. Hobbyists, people who have a reason to do it for work, paranoid people.
OK so let's say this. There are 2 different things.
1) There are email headers
2) There are email server logs
Those are two different things. So you're thinking the gov't only has access to the server logs, and not the headers which would be stored in the mailboxes. I think that's what you meant.
So then I would say hey the email server logs must include the ip address of the connecting party. Just like a web server log. So I don't buy the idea that the government doesn't have access to IP addresses and the easy ability to match that to an email address, and a real name, even if it might take an extra step.
Recursion
(56,582 posts)The extended headers (everything starting with "X-" as well as the MIME commands ("content-type blah/blah" etc.) are part of the message content.
They get the data from the ISPs, if we're to believe the FISA warrant leak, and the actual SMTP headers are what the ISPs store.
Recursion
(56,582 posts)That's in the DATA segment of the SMTP transaction. It is not part of the message log.
How hard is it for journalists to just ask somebody who knows what they're talking about?
KoKo
(84,711 posts)send her an E-Mail...I think she has her address there at her "ByLine." Start a discussion with her.
limpyhobbler
(8,244 posts)I understand you're saying everything in the DATA segment is not collected. But how would you know the government is not considering that full email header information as part of the metadata? Did the NSA say that in a statement or something?
Recursion
(56,582 posts)The data that comes from the mail servers stops with the DATA command (OK, it writes a count of how many bytes of data follow, but that's it).
KoKo
(84,711 posts)I consider my E-Mails like mailing a letter. They can look at the Send and To if they have a Court Order....but, not the "Opening Statement" in my Letter to anyone...which is what Subject Line is in an E-Mail. It's like opening up your letter and looking at your first line sentence to whom you are sending the letter.
You are trying to say they then "seal the envelope back up" and never read the REST of the LETTER. I say...NO...they are reading without Warrent a huge Group of Selected E-Mails because someone you know or just got on a List Serve with or any other Group and some "suspected terrorist" is on that list....so they READ MY E-Mail for Subject line and then Further.
Until it's proven differently ....I believe they are going after as much data as they can catalog to store it in sophisticated buildings they are already looking for financing for AFTER UTAH Facility fills up!