How Governments Monitor

Government monitoring is done on massive scale.  As virtually all data communications goes through a limited number of communications centers around the nation and around the world.  Most communications centers have a separate room leased by the government.  Virtually all data coming into the center uses fiber-optic cable.  These fibers go through an optical splitter such that the one input gives two identical outputs.  One output continues to the communications center to be used as intended.  The second output goes to the government’s room.  This is passive monitoring as there is only a copy of the data sent.  No data is modified, and no indication is given on what is being monitored.

In the 1990s systems like the FBI’s Carnivore monitored email only and in a fairly rudimentary way.  New systems, Boeing’s NarusInsight have much greater capability.

Step 1 Audio (phone), video (phone and surveillance cameras), and data (email, web browsing, DNS) enter the communications center.
Step 2 The aggregate data is routed to the appropriate equipment to continue its journey.
Step 2A An identical copy of the aggregate data is sent to the government’s room.
Step 3 Data is sent out to its destination.  There is nothing in the data that indicates that a copy was available to another party.

Unencrypted data can be viewed in its entirety.  All standard email is available.  Just as modest cell phones can listen to our voice and interpret it as commands or text, advanced versions of the same software can transcribe all voice communications.  All phone traffic, the social call to a friend, the business call to a coworker, or the sensitive political or religious topic is easily transcribed and then process similarly to emails.  Conversations via chat services or websites provide the same text and user identification as email.

Encrypted data still contains useful information.  The source and destination IP addresses are unencrypted.  The time and size of the data are used for traffic analysis.  This information alone or even more when combined with unencrypted data can provide valuable information.

ShofarPortfolio™ ● We don’t know Your Stuff™ ●
ShofarPortfolio™ ● Diagrams from 2012
How Advertising Works
How Email Works

How Free Email is Monitored

Web Page Monitoring

ISP Monitoring

How Governments Monitor

How Search Services Monitor

Analytics Services Monitoring

Email Beacon Monitoring

How Corporations Monitor Users

DNS Monitoring and Redirection

ISP Monitoring

Services Monitoring


ShofarPortfolio™ ● Red Level Security

ShofarPortfolio™ ● Yellow Level Security

ShofarPortfolio™ ● Green Level Security

Secure DNS

Secure Storage

Secure Client

Secure and Anonymously Distributed Data

Secure Distributed Email

ShofarPortfolio™ ● Distributed Storage

ShfoarNexus™ SyncPackets