{"id":165,"date":"2008-02-24T21:46:16","date_gmt":"2008-02-25T05:46:16","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/02\/24\/us-intelligence-wants-to-monitor-wow-chat\/"},"modified":"2008-02-24T21:46:16","modified_gmt":"2008-02-25T05:46:16","slug":"us-intelligence-wants-to-monitor-wow-chat","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/02\/24\/us-intelligence-wants-to-monitor-wow-chat\/","title":{"rendered":"U.S. Intelligence wants to monitor WoW chat"},"content":{"rendered":"<p>Called The Reynard project, it is a series of plans for the U.S. Intelligence to monitor more internet traffic, most notably, data mining from several major MMORPGs, including WoW. The goal being to eventually create a system that can &#8220;automatically detecting suspicious behavior and actions in the virtual world.&#8221; Games often have things like bombs and assassinations in them, and it seems like the potential for a very high false positive rate is there. It kinda makes me wonder if custom UIs will have an option to use some sort of encryption with their in-game chat for those who are really bothered by big brother being over their shoulder.<\/p>\n<p>Source:<\/p>\n<p>http:\/\/blog.wired.com\/27bstroke6\/2008\/02\/nations-spies-w.html<\/p>\n<p>http:\/\/www.joystiq.com\/2008\/02\/23\/wired-national-intelligence-seeking-terrorists-in-wow\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Called The Reynard project, it is a series of plans for the U.S. Intelligence to monitor more internet traffic, most notably, data mining from several major MMORPGs, including WoW. The goal being to eventually create a system that can &#8220;automatically &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/02\/24\/us-intelligence-wants-to-monitor-wow-chat\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":37,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,8,9],"tags":[],"class_list":["post-165","post","type-post","status-publish","format-standard","hentry","category-current-events","category-policy","category-privacy"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=165"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/165\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}