![]() “We have developed the capability to decrypt and decode both Kazaa and eDonkey traffic to determine which files are being shared, and what queries are being performed,” the researcher wrote. This last hurdle was cleared in at least two cases. ![]() In order to monitor peer-to-peer networks, the NSA needed to both decode the protocols that various services used and, in some cases, break the encryption to see which files were being swapped. “But if they are merely sharing the latest release of their favorite pop star, this traffic is of dubious value (no offense to Britney Spears intended).” “By searching our collection databases, it is clear that many targets are using popular file sharing applications,” a researcher from NSA’s File-Sharing Analysis and Vulnerability Assessment Pod wrote in a SIDtoday article. It was trying to determine if it could find valuable intelligence by monitoring such activity. NSA didn’t care about violations of copyright law, according to a 2005 article on one of the agency’s internal news sites, SIDtoday. ![]() According to documents provided by NSA whistleblower Edward Snowden, the spy agency formed a research group dedicated to studying peer-to-peer, or P2P, internet traffic. With this much file sharing occurring online, it’s no surprise that the National Security Agency took notice. (It was closer to 11 percent by 2016, according to another estimate.) While it’s difficult to measure exactly how much of the world’s internet traffic consists of people swapping files, at the time some estimates said it was approaching 40 percent. alone were estimated to have downloaded music through so-called peer-to-peer apps like LimeWire, eDonkey, Kazaa, and BitTorrent. In early 2004, close to 8 million people in the U.S. Instead, they would download copies of pirated media using file-sharing technology. Before services like Spotify and Netflix proliferated, people who wanted to listen to music or watch movies online, on demand, had few legal options.
0 Comments
Leave a Reply. |