ShofarPortfolio™
How Governments Monitor
How Governments Monitor
How Governments Monitor

Government monitoring is done on massive scale.  As virtually all data communications goes through a limited number of communications centers around the nation and around the world.  Most communications centers have a separate room leased by the government.  Virtually all data coming into the center uses fiber-optic cable.  These fibers go through an optical splitter such that the one input gives two identical outputs.  One output continues to the communications center to be used as intended.  The second output goes to the government’s room.  This is passive monitoring as there is only a copy of the data sent.  No data is modified, and no indication is given on what is being monitored.

In the 1990s systems like the FBI’s Carnivore monitored email only and in a fairly rudimentary way.  New systems, Boeing’s NarusInsight have much greater capability.

Step 1 Audio (phone), video (phone and surveillance cameras), and data (email, web browsing, DNS) enter the communications center.
Step 2 The aggregate data is routed to the appropriate equipment to continue its journey.
Step 2A An identical copy of the aggregate data is sent to the government’s room.
Step 3 Data is sent out to its destination.  There is nothing in the data that indicates that a copy was available to another party.

Unencrypted data can be viewed in its entirety.  All standard email is available.  Just as modest cell phones can listen to our voice and interpret it as commands or text, advanced versions of the same software can transcribe all voice communications.  All phone traffic, the social call to a friend, the business call to a coworker, or the sensitive political or religious topic is easily transcribed and then process similarly to emails.  Conversations via chat services or websites provide the same text and user identification as email.

Encrypted data still contains useful information.  The source and destination IP addresses are unencrypted.  The time and size of the data are used for traffic analysis.  This information alone or even more when combined with unencrypted data can provide valuable information.

ShofarPortfolio™ ● ShofarPortfolio.Own
Latest Blogs
Tue, Jul 2, 2013 ● If God wanted man to be private, He wouldn’t have given him the NSA
Thu, Jun 27, 2013 ● Use the barn not the cloud
Fri, Jun 14, 2013 ● Capturing of Metadata
Sat, Jun 8, 2013 ● Computers are listening to your telephone calls
Latest Videos
Cryptograms in ShofarPortfolio’s Matryoshka Communications

0 Cryptograms

Protecting the who, what, where and when of your communications

0 Who, what, where...

What is Internet surveillance and how to avoid it?

0 Internet surveillance