{"guid":"28840060-781a-4143-a9b3-fe19a0eaf06d","title":"Mass Surveillance abusing Computational Linguistics and Human Language Technology","subtitle":"Mind-sets, state-of-the-art methods and practices according to official documents including leaks","slug":"SHA2017-227-mass_surveillance_abusing_computational_linguistics_and_human_language_technology","link":"https://c3voc.de","description":"Even though the Snowden revelations for the first time clearly show that mass surveillance of communications is carried out on a global level, little knowledge seems to be available to the general public as well as the hacker community how these so-called COMINT operations actually work. The talk focuses on mass surveillance based on methods known from research of the interdiscplinary field of Computationanal Linguistics (or Natural Language Processing) and demonstrates how generation of selectors for mass surveilling text messages can occur.","original_language":"eng","persons":["vecirex"],"tags":["SHA2017","227"],"view_count":130,"promoted":false,"date":"2017-08-05T00:00:00.000+02:00","release_date":"2017-08-05T02:00:00.000+02:00","updated_at":"2024-05-27T03:00:02.950+02:00","length":3541,"duration":3541,"thumb_url":"https://static.media.ccc.de/media/events/SHA2017/227-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/SHA2017/227-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/SHA2017/28840060-781a-4143-a9b3-fe19a0eaf06d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/SHA2017/28840060-781a-4143-a9b3-fe19a0eaf06d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SHA2017-227-mass_surveillance_abusing_computational_linguistics_and_human_language_technology","url":"https://api.media.ccc.de/public/events/28840060-781a-4143-a9b3-fe19a0eaf06d","conference_title":"SHA2017: Still Hacking Anyway","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017","related":[{"event_id":4234,"event_guid":"f471ff12-1889-41c8-b65e-787b87c460db","weight":4},{"event_id":4240,"event_guid":"dec63dd2-d66b-419d-863d-c20fd5ce91dd","weight":10},{"event_id":4245,"event_guid":"87f8200b-822a-4536-ba15-443e27860d2e","weight":6},{"event_id":4246,"event_guid":"4313b40d-d798-49ca-b88e-cfb793199c0b","weight":3},{"event_id":4247,"event_guid":"2dd16bb3-657b-41b6-bdec-987ada3f285c","weight":3},{"event_id":4253,"event_guid":"3662dfba-c409-40d6-9647-e8d8c1e2d773","weight":4},{"event_id":4259,"event_guid":"b5a645a9-bbdc-433e-a77c-b416074a92ea","weight":4},{"event_id":4261,"event_guid":"3852e448-f6cf-4bfe-8b14-12d590075bd6","weight":10},{"event_id":4265,"event_guid":"9ba5a35b-0608-40f1-84ec-e02c387cb60b","weight":3},{"event_id":4267,"event_guid":"e02b1946-a7ce-4779-a4c2-d120a43edd19","weight":3},{"event_id":4275,"event_guid":"227de42b-dba0-4ef4-9207-96f370155244","weight":4},{"event_id":4277,"event_guid":"c118a980-7f90-4ff3-bf87-f86082f95982","weight":3},{"event_id":4280,"event_guid":"d9bec470-99e4-491a-945c-13311c1f07ec","weight":4},{"event_id":4286,"event_guid":"30b059d7-2809-4fd2-83b8-5e445acdf4ca","weight":3},{"event_id":4288,"event_guid":"6e5a6877-3a72-464f-bf47-4bbd103b41fe","weight":4},{"event_id":4306,"event_guid":"8db39cdd-7700-4123-a22d-22393e282154","weight":3},{"event_id":4309,"event_guid":"0fd35c3e-6608-4d5b-a060-000e658730d9","weight":5},{"event_id":4312,"event_guid":"d16501c8-374f-416c-896c-c50daadcc6bc","weight":3},{"event_id":4335,"event_guid":"65dfbd35-6f4b-45f7-8169-fa43253b1e77","weight":3},{"event_id":4337,"event_guid":"444f2c42-36c5-4cc2-9a1f-2d9894eedd6d","weight":4},{"event_id":4347,"event_guid":"24112c59-8a55-40ca-a30f-d42a4850a9c6","weight":3},{"event_id":4351,"event_guid":"06f3958c-0e2c-4dfc-804c-9493fae7fe9b","weight":3}],"recordings":[{"size":483,"length":3541,"mime_type":"video/mp4","language":"eng","filename":"SHA2017-227-eng-Mass_Surveillance_abusing_Computational_Linguistics_and_Human_Language_Technology_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-08-05T18:41:13.205+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/h264-hd/SHA2017-227-eng-Mass_Surveillance_abusing_Computational_Linguistics_and_Human_Language_Technology_hd.mp4","url":"https://api.media.ccc.de/public/recordings/17545","event_url":"https://api.media.ccc.de/public/events/28840060-781a-4143-a9b3-fe19a0eaf06d","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":39,"length":3526,"mime_type":"audio/opus","language":"eng","filename":"SHA2017-227-eng-Mass_Surveillance_abusing_Computational_Linguistics_and_Human_Language_Technology.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2017-08-05T19:09:34.552+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/opus/SHA2017-227-eng-Mass_Surveillance_abusing_Computational_Linguistics_and_Human_Language_Technology.opus","url":"https://api.media.ccc.de/public/recordings/17562","event_url":"https://api.media.ccc.de/public/events/28840060-781a-4143-a9b3-fe19a0eaf06d","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":53,"length":3526,"mime_type":"audio/mpeg","language":"eng","filename":"SHA2017-227-eng-Mass_Surveillance_abusing_Computational_Linguistics_and_Human_Language_Technology.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2017-08-05T19:10:07.578+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/mp3/SHA2017-227-eng-Mass_Surveillance_abusing_Computational_Linguistics_and_Human_Language_Technology.mp3","url":"https://api.media.ccc.de/public/recordings/17563","event_url":"https://api.media.ccc.de/public/events/28840060-781a-4143-a9b3-fe19a0eaf06d","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":135,"length":3541,"mime_type":"video/mp4","language":"eng","filename":"SHA2017-227-eng-Mass_Surveillance_abusing_Computational_Linguistics_and_Human_Language_Technology_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-08-05T19:06:32.457+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/h264-sd/SHA2017-227-eng-Mass_Surveillance_abusing_Computational_Linguistics_and_Human_Language_Technology_sd.mp4","url":"https://api.media.ccc.de/public/recordings/17557","event_url":"https://api.media.ccc.de/public/events/28840060-781a-4143-a9b3-fe19a0eaf06d","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":179,"length":3541,"mime_type":"video/webm","language":"eng","filename":"SHA2017-227-eng-Mass_Surveillance_abusing_Computational_Linguistics_and_Human_Language_Technology_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-08-05T21:57:37.166+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/webm-sd/SHA2017-227-eng-Mass_Surveillance_abusing_Computational_Linguistics_and_Human_Language_Technology_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/17578","event_url":"https://api.media.ccc.de/public/events/28840060-781a-4143-a9b3-fe19a0eaf06d","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":546,"length":3541,"mime_type":"video/webm","language":"eng","filename":"SHA2017-227-eng-Mass_Surveillance_abusing_Computational_Linguistics_and_Human_Language_Technology_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-08-05T22:03:42.653+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-227-eng-Mass_Surveillance_abusing_Computational_Linguistics_and_Human_Language_Technology_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/17587","event_url":"https://api.media.ccc.de/public/events/28840060-781a-4143-a9b3-fe19a0eaf06d","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"}]}