Feeds

Google outspooks the spooks with Total Information Awareness plan

Lend us your drives

High performance access to file storage

Google wants to mirror and index every byte of your hard drive, relegating your PC to a "cache", notes on a company PowerPoint presentation reveal.

The file accompanied part of Google's analyst day last week. Google has since withdrawn the file, telling the BBC that the information was not intended for publication.

The justification for this enormous data grab is that Google would be able to restore your data after a catastrophic system failure.

The notes reveal a plan to -

Store 100% of User Data

... With infinite storage, we can house all user files, including: emails, web history, pictures, bookmarks, etc and make it accessible from anywhere (any device, any platform, etc).

We already have efforts in this direction in terms of GDrive, GDS, Lighthouse, but all of them face bandwidth and storage constraints today. (...) This theme will help us make the client less important (thin client, thick server model) which suits our strength vis-a-vis Microsoft and is also of great value to the user.

As we move toward the 'Store 100%' reality, the online copy of your data will become your Golden Copy and your local-machine copy serves more like a cache."

Perhaps it's Google's gift to the US government. In August 2003, Admiral John M Poindexter was forced to resign after his 'Total Information Awareness' data mining program was revealed to be indexing "everyday transactions as credit card purchases, travel reservations and e-mail."

Exactly what Google will have if its 'GDrive' ever materializes.

And here's a coincidence.

What tipped Poindexter's resignation was his specific plan to operate "terror casino". The scheme porported to tap "collective wisdom" of the public in predicting world events such as assassinations.

This hokum New Age idea, beloved by autistic technophiliacs, was rapidly shot down. But it has its fans in Silicon Valley, as this slide from Google's analyst presentation shows.

Google's New Age motto

Google has outspooked the spooks. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.