It looks like you're using an Ad Blocker.

Please white-list or disable in your ad-blocking tool.

Thank you.


Some features of ATS will be disabled while you continue to use an ad-blocker.


For all those who think collecting Metadata is no biggie

page: 3
<< 1  2   >>

log in


posted on Jul, 2 2013 @ 09:59 AM

Originally posted by tridentblue
Originally posted by SkepticOverlord
reply to post by tridentblue
In terms of applying divergence, yes. But transinformation and entropy don't apply to the highly-structured metadata used in PRISM. Such data has no inherent entropy, and instead, becomes more normalized the more we have.

So the more options, the more interactive networks become, 1) the better user experience 2) the more information the user reveals about themselves in using it. That's just the law of things: The more choices a user is allowed, the more information we share about ourselves in making those choices. And the modern Internet gives us a lot of choices, as does any good site.
I have my own rule of thumb but I would like to assume that most avid/savvy users from IT background know about this and wouldn't click on recommendations regardless
But never know.

posted on Jul, 2 2013 @ 10:09 AM

Behind the Curtain politicians are targets NOT TERRORISTS and the agenda is to blackmail them to direct the political changes the UNELECTED bureaucracy demands. This is the real object of collecting absolutely everything. People on Capitol Hill have told me personally they suspected their emails were being sucked up and that has been for the last 2 years. European politicians are now starting to wake up that they too are targets and that blackmail is the game.

They realize that the New York Attorney General Eliot Spitzer was targeted when he tried to go after the Wall Street Investment Bankers everyone today calls the UNTOUCHABLES. After he got rid of Hank Greenberg at AIG for Wall Street not realizing he was doing them a service, when he turned on them that was his serious mistake. They suddenly discovered checks to a hooker and his hotel in Washington was bugged when he met with her. Since then, no one has dared to investigate Wall Street.

posted on Jul, 2 2013 @ 01:02 PM
reply to post by SkepticOverlord

Data is just that until a human is actually in the process all machines can do is look at patterns.

The trouble on here is that to many members are still under the impression that TPTB and their agencies have secret hi tech
do they manufacture the chips that go into computers etc NO.
I do believe that unless you are up to something you don't have any problems because you will not be brought to the attentions of the humans in the process that is the point you start to worry.

I am from the UK and just looking at the amount of phone calls,txt's,facebook,twitter,tumblr posts generated in the UK alone in a single day never mind all the posts to other websites you would have to be doing something really stupid or obvious to generate the attention to become a suspect.
edit on 2-7-2013 by wmd_2008 because: (no reason given)

posted on Jul, 2 2013 @ 01:43 PM
reply to post by wmd_2008

Do they make chips? Check out Aurora, Borealis and Medusa Projects. Those were DOD projects ran through universities.

And don't let them lie to you about who paid for this and who it was made for. Here is the Army contract to create these chips.And this review of the contract is from 2003 meaning it was started before then.

Army contract DAMD17-02-2-0048

And since you are from the UK. They also had there own projects at the same time to create a stream processing engine. And they still work to improve them today. And they work in partnership with the US.

2. STREAMING OF SOCIAL DATA This session covered challenges in building scalable infrastructure for managing social media streams and in extracting valuable information from social media streams such as emergent topics. Sebastian Michel considered the problem of emergent topics discovery by continuously monitoring correlations between pairs of tags (or social annotations) to identify major shifts in correlations of previously uncorrelated tags in Twitter streams [1, 2]. Such trends can be used as triggers for higherlevel information retrieval tasks, expressed through queries across various information sources. Mila Hardt gave two talks on aspects related to managing streams at Twitter, in particular on infrastructure to enable processing of 400 million tweets a day and real-time top queries. Mila explained how stream processing needs at Twitter eventually led to the development of the open-source projects Storm and Trident1 for large-scale high-performance distributed stream processing. She also pointed out current challenges at Twitter in providing support
for fault tolerance, online machine learning by trading off exploration and exploitation, and approximating aggregates (such as counts). An interesting exercise involving the audience was on thinking how
topic ranking is done at Twitter. Daniel Preotiuc-Pietro introduced the Trendminer2 system for real time analysis of social media streams [19]. Trendminer’s scalability relies on the MapReduce framework for distributed computing. Daniel also presented how to build regression models of trends in streaming data using TrendMiner [21].

edit on 2-7-2013 by JBA2848 because: (no reason given)

posted on Jul, 2 2013 @ 02:31 PM
And the processing engines the government spent so much for in order to be protected by having processing power the rest did not have is why a hacker was able to use sony playstations modified to hack there computers. Yes Wikileaks and the racks of playstations to create super computers. And the military even built there own in order to see what it was capable of. Now video cards are being used from invidia to create super computers all over.

posted on Jul, 2 2013 @ 04:14 PM
The UK seems to be the ones who created the software used for spying with Apachee Hadoop. Ranstor was created by the UK military.

RainStor is a software company that provides a database designed to manage and analyze big data for large enterprises. The company's origin traces back to a special project conducted by the United Kingdom's Ministry of Defence with the purpose of storing volumes of data from years of field operations for ongoing analysis and training purposes.

And who is running that? Dr. Hossein Eslambolchi

posted on Jul, 2 2013 @ 04:19 PM
And of this is based on what Israel has been doing for a long time. Israel has MAMRAM which is tied directly to the backbone of the Israeli internet hub and spies on everything that goes in or out of Israel. MAMRAM is ran by the IDF. Most people who work on this military computer system go into the field of spying and hacking in other countries.

posted on Jul, 2 2013 @ 05:01 PM

Originally posted by JBA2848
reply to post by wmd_2008

Do they make chips? Check out Aurora, Borealis and Medusa Projects. Those were DOD projects ran through universities.

Aurora etc is not a chip its an APPLICATION your own link tells you that!!

new topics

top topics

<< 1  2   >>

log in