Snowden https://truthvoice.com Wed, 22 May 2019 11:31:45 +0000 en-US hourly 1 https://wordpress.org/?v=6.0.2 https://i0.wp.com/truthvoice.com/wp-content/uploads/2019/05/cropped-truthvoice-logo21-1.png?fit=32%2C32&ssl=1 Snowden https://truthvoice.com 32 32 194740597 NSA Was Collecting Much More Than They Claimed https://truthvoice.com/2015/07/nsa-was-collecting-much-more-than-they-claimed/?utm_source=rss&utm_medium=rss&utm_campaign=nsa-was-collecting-much-more-than-they-claimed Sat, 04 Jul 2015 11:31:44 +0000 http://truthvoice.com/2015/07/nsa-was-collecting-much-more-than-they-claimed/

snowden

Former U.S. National Security Agency contractor Edward Snowden appears live via video during a student organized world affairs conference at the Upper Canada College private high school in Toronto, February 2, 2015.

NSA documents leaked to the Guardian in 2013 described a covert program called XKeyscore, which involved a searchable database for intelligence analysts to scan intercepted data.

Now, new documents show the breadth of this program and just what sort of data XKeyscore catalogs.

According to a new report from The Intercept, the amount of data XKeyscore scoops up as well as the sort of data it collects is much larger than originally thought.

Here are a few highlights from the new report:

  • The XKeyescore database is “fed a constant flow of Internet traffic from fiber optic cables that make up the back of the world’s communication network, among other sources, for processing,” the new report writes. Its servers collect all of this data for up to five days, and store the metadata of this traffic for up to 45 days.
  • Web traffic wasn’t XKeyscore’s only target. In fact, according to the documents posted by The Intercept, it was able to gather data like voice recordings. A list of the intercepted data included “pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation (CNE) targeting, intercepted username and password pairs, file uploads to online services, Skype sessions and more.
  • How the search works is very advanced. The new documents detail ways that analysts can query the database for information on people based on location, nationality, and previous web traffic.
  • XKeyscore was also used to help hack into computer networks for both the US and its spying allies. One document dated in 2009 claims that the program could be used to gain access into unencrypted networks. 
  • Using XKeyscore was reportedly insanely easy. “The amount of work an analyst has to perform to actually break into remote computers over the Internet seems ridiculously reduced — we are talking minutes, if not seconds,” security researcher Jonathan Brossard told The Intercept. “Simple. As easy as typing a few words in Google.”

While XKeyscore has been known as an intelligence tool for years now, these new documents highlight just how advanced and far-reaching the program’s surveillance is.

The NSA, in a statement to The Intercept, claims that all of its intelligence operations are “authorized by law.” It added, “NSA goes to great lengths to narrowly tailor and focus its signals intelligence operations on the collection of communications that are most likely to contain foreign intelligence or counterintelligence information.”

Written by Solarina Ho for Reuters, with additional reporting and writing by Alastair Sharp and editing by Chris Reese and Peter Galloway

]]>
3579