go back and look at some of these cases, i would ileaks, thewikiel amount of damage that was said asbe done was not as much the damage actually done. take of the more you know about this, the more it creeps you out. -- >> the more you know about this, the more it creeps you out. the programs are collecting all of the data involving telephone calls and internet communications -- chat, email, voice over ip. >> when you talk about the data -- that means they are getting the message? >> the they're not getting the content. -- they are not getting the content. they're not reading the email. they are looking who you send it to and when. there is a lot more than this. digital networking information includes device identifiers, locations. if you gave me the choice right now based on current data management techniques, here is the choice, i will subject myself either to one month of having someone read all of my e- mails a lesson to all my phone calls or one month of all my meta data, i would take the content in the second. the infringement on our privacy would be much less. meta data, you know