Also in this playlist...
This transcript is automatically generated
An incident that now it's now we know that they are -- are met today then we're all becoming met -- to experts.
But how does a metadata of the from a corner differ from my metadata going through those Cisco pipes I mean it doesn't differ and that.
Metadata is metadata and part of the metadata is telling you where is this information coming from.
And they are looking for matches you up they start with if for example to break into a terrorist compound and they get a phone and has a number.
At that point they know this is the number that this guy used out there and Yemen -- -- area and now they're looking at.
All the other information that they have that they bring collect for example they collected five years' worth -- Verizon phone call data they're looking for a match.
If they had that match.
What's surrounding that phone number.
A lot of it is sort of -- The white pages tells you a tremendous amount about people the phone number and the address right address is metadata.
-- it's kind of like I heard as a former NSA chief talking about this is kind of interest -- -- he talked about the outside of the envelope.
And how does all that information on that.
On their and that is metadata that tells you.
A lot of information about the person without telling you.
What since -- -- letter right and what's inside of course on phone calls is the deep tale of the conversation right but for the NSA.
These details of mitigating -- -- that much closer to figuring out if some foreign entity is talking to some American.
So there is a way -- they -- part -- -- away where they can separate.
They have information from foreign sources as opposed or do you wouldn't be sending emails or call phone calls yeah.
Absolutely and they just look at the made -- -- and you know what's also interesting is he matches on the about a 9/11 and all the data and I remember talking did to us security and Homeland Security head back and then.
And explaining how data was all stove -- meaning that.
Not every see every ounce that if we're enforcement agency had lots of data council on -- not cross connected.
Now all the data about what we're doing.
Is on these cloud based servers with these public entities like FaceBook like Google like Twitter.
And -- -- the phone companies are told kind of the same too so instead of the enforcement agencies looking back at the data they hold closely this sudden say that people have the most important data.
Or the service providers so.
They've really especially the security agency turn their attention there because they think they see that as being much more valuable source -- you seen the future of encryption or something where we citizens can protect ourselves I gotta tell you encryption is great.
But ultimately I've.
What I've been told is nothing is on crack -- nothing.
This always going to be a way to crack somebody -- -- here's the thing.
The government is an interest -- tracking or decrypt and every bit of data because there isn't a there's a lot of garbage -- there tremendous amount of garbage -- -- don't need.
They need specific steps so they kind of start with that key piece of information -- connecting the dots a phone number with another phone number.
And then at some point yet they want to be able to get -- dated now some of the data for example Apple's on message state is all encrypted.
They can't even read apple says they can't even read it.
But security experts say.
You can crack there's somebody somewhere -- work -- so ultimately.
-- protected you know what I tell people every single day about technology.
Digital information is just assume it's all public.
If you don't want it to be public talk face to face someone with someone you don't want someone to know about it don't putting an email.
You know phone calls.
There's -- -- people aren't listening to a lot of phone call information but by the way how many phone calls that we really making what are we doing we're texting.
But they say they're just collecting the outside to the -- -- -- let's go back to that letter inside OPEC conversations I have with you on the phone or the email I send you.
If third -- -- track in our metadata they say they're not.
Look mean but do they have that information so that if I do something that their interest it and they can go find out what it is that we're talking they don't.
Evidence at hand right so the way it works is you know the prism the so called prism tool that spigot isn't turned on until they have a reason.
To do sell meaning that.
They say there is right information that this phone number.
Would use slightly but the thing is so they say all -- -- this is up to no good and we're gonna track him.
Even though they say they're not reading it -- and they and they have to go to -- judge but they are in fact keeping.
-- that email that I sent you -- them.
I don't know whether or not to keep they're not saying this -- on the other side.
Apple FaceBook Twitter all those guys know it's their job.
To sort of manage our communications.
Our art our tweets and our FaceBook conversations the government doesn't have that.
But the government can make a request for some of that David that's the whole idea behind prism.
Which relates to the that the foreign information services act you know so basically that's how -- get the warrant yet but until that point.
They're not actually accessing its so you know -- I know that one of the things of people curious about is like how how much room -- they need to store the data that they have on us right.
The reality is.
It's not that the government doesn't have all the data it's the company's to have all the data they have to have the big server -- what I see you an email.
It's always always somewhere went through enough thank you good players always.
You'll come on big TV show this hour.
Filter by section