VERSION|0.5.1|NAME|HarryR|DATE|1372444634|CONTENT|Re spooks reading emails and analysing metadata.

I&#039;ve always assumed that anything digital sent over the interweb will  be used by any org who has access to it as they wish. If it&#039;s technical possible it will be done if the will is there. 

This is an evolution of my assumption that anything digital saved to a hard disk will eventually end up with people I hadn&#039;t imagined would ever read it. Either because a trojan copied it or a broken, stolen or decommissioned hard disk was scavenged by one of the many people who enjoy messing about with such things. 

Anything broadcast to the ether such as WiFi or Bluetooth can be captured by anything or anyone with the necessary tech to make sense of it. 

My Android phone can get all busy at times and show high network activity. Necessary update? Zombie transmission at behest of hacker? Who knows.

The shock here is apparently that the government is doing it. 

OTOH it&#039;s been common knowledge that social media base their business on mapping the connections between people and blithely request access to our email systems, including our work email systems. Despite all email systems I&#039;ve ever used warn sternly against giving anyone passwords. 

Supermarkets have been matching purchasing patterns to credit card details for decades now. It was always shocking how indifferent people were to the amount of information they were giving to these companies, tho Facebook el al have made it easier to restrict who sees things. My use of facebook is limited, I&#039;ve never had a supermarket loyalty card and I never give a foreign password to anyone or any system.

Yet...I am oddly indifferent to the fact that GCHQ is monitoring data traffic. I suppose I have always considered it inevitable. And there have been enough hints that have come up. Terrorist warnings are usually based on increased &#039;internet chat&#039;. Where are they getting that from if not analysing internet data traffic? Crimes are often resolved using mobile phone data that is sucked up in real time, stored and is available for analysis to assist investigations.
|IP-ADDRESS|80.153.30.244|MODERATIONFLAG|