Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Can someone explain this to me like a 5 year old and how it interfaces with PRISM?


This is considerably more invasive than PRISM.

This system logs HTTP metadata and data (think the address on the envelope and the contents of the envelope), the metadata for 30 days the contents for 3 days.

This http data is essentially everything that goes over the wire all of which is then shovelled into a database with a fairly sophisticated (if not pretty) front-end that allows really invasive searches.

You can search for stuff like "all emails that contain the words sex doll" or "nudes" and contain jpegs...of course the users would only use this system for legitimate operations covered by warrants.../s.

This is the first of these releases that have really made me stop and go "whoa" mostly because this is "better" (bigger, more complex and capable) than anything I expected them to have now (and this was in 2008).


I guess I am mostly confused about whether they have any email content capabilities...and if so, how?


They are tapped into the hubs of internet communication as well as most (if not all) of the major webmail based systems (think Google, Hotmail, Yahoo).

As to the how they are taking feeds directly off major internet routers (the vast majority of traffic will go through a major router at some point particularly if it is international though it's quite possible for a packet sent from one side of your country to another to go international as well).

So yes they do have email content capabilities (if you look at the actual slides they also have a sophisticated filtering system, they can do stuff like "show me emails from iran with word documents attached containing IAEO").

This system is absolutely terrifying, it genuinely is the work of a dystopian sci-fi author from 30 years ago.

----

If you want to get right down in the trenches email is SMTP and POP over TCP/IP (normally), email is fundamentally a human readable text protocol which makes it trivially easy to parse (this was kind of the intention after all) so once they have the captured stream reconstructing the mail is not much harder (if any) than writing a mail client.

You can see an example of SMTP if you open a console/shell and type "telnet smtp.gmail.com 25" and then when it has logged in type HELO the response is just plain text.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: