What are security services looking for in the social networks?
 How the data was collected
 The specialists focused on a large-scale analysis of huge volumes of metadata, eliminating the need to verify the origin of the information. Thanks to the wiretapping they had the opportunity to collect information about phone calls into a single schema with data from public, commercial and other sources.  We are talking also about insurance identifiers information, codes of banks and accounts in social networks Facebook and Twitter. Besides, the list included the information about transport passengers and the  lists of polling stations and etc.
 The New York Times said that from the beginning it was intended that the system will work in relation to foreign countries citizens. However, as the White House former employees told, as a result of the program this data collection was extended to ordinary citizens of the United States of America. As a professor at Georgetown University Orin Kerr say you can learn a lot of different information by this metadata. For example, by knowing the phone number that has just been typed or by knowing the location of the person calling on his cell you can reveal his plans. The professor said that it is the digital equivalent of spying on the person who is suspected of anything.
 Previously the U.S. government announced that it is impossible to determine what exact National Security Agency information went into the hands of Edward Snowden, the former CIA employee. The young man managed to conceal the evidences. NSA employees and their colleagues from the UK managed to beat the system encryption which is designed to protect personal data, email, and operations carried out in banks.
  The USA President Opinion
 Earlier the Head of the White House said in the U.S. television broadcast on NBC in the The Tonight Show that he believes the program for the control of calls and correspondence on the Internet are legitimate and have the right to exist. The leader of the United States distinguished that the program aimed at espionage within the state does not exist, but the government has the tools that can help to track down a phone number or e-mail which can be related to the terrorist attacks.
 Obama believes that none of the secret services revelations can not be considered a sign of abuse of power. As an example the President told aobut the attack which occurred at the International Boston Marathon this year. The President drew attention to the fact that the program for the collection of electronic information has allowed to establish the investigation whether the suspects accomplices, whether their associate with terrorist organizations. The leader of the United States also said that before he also doubted the use of tracking software at the time when for the first time four years ago he took over as the president. However, he admitted later that the program is really needed to confront the threat of terrorism.
 The consequences of Snowden revelations
 Due to the disclosures of Edward Snowden Internet users began to remove their accounts from the Facebook and Twitter social networks. About eleven millions of British and Americans got rid of their pages on social networks, according to the The Daily Mail material. Studies have shown that a key cause of the mass escape from social networks was the desire to protect their privacy, as well as the fear of getting addicted to the network.
 Masterforex-V Academy analysts remind that these revelations led to the use of shadow Internet. If previously in the "underground network" there were no more than 600 people, now the number is thousands and the number is continuously growing.