Watching the watchers: spook database

Bethany groundhog593 at
Thu May 7 00:12:29 PDT 2015

This is good clean fun.


Secret surveillance programs have metadata too. The same people and
companies that operate secret surveillance programs also publish details
about their work on the open internet. We can use this data to watch the

“Proficient in Microsoft Word and Xkeyscore” and similar phrases are
surprisingly common on LinkedIn profiles. NSA contractors, military, and
others involved in the surveillance state post seemingly coded and
harmless details about their work in job listings, social media, and
other open websites. But this information provides useful metadata that
can be used to understand the function of secret programs and map the
surveillance state.

Transparency Toolkit has been building open source tools to collect and
analyze this open source intelligence. This talk discusses how we can
use these data sources and tools to build a sousveillance state that
holds the surveillance state accountable.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1483 bytes
Desc: not available
URL: <>

More information about the cypherpunks mailing list