NSA’s XKeyscore program has nearly limitless access to all Internet activity
2013 08 01

By Suzanne Choney | NBCNews



Americans’ email and online chats can be monitored without authorization by any National Security Agency analyst using a computer program known as "XKeyscore," according to NSA leaker Edward Snowden, who shared the information with the Guardian in a story published Wednesday.

XKeyscore is described by the NSA in training materials as its "widest reaching" means of gathering information from the Internet, according to the Guardian. Using the program, "analysts can also search by name, telephone number, IP address, keywords, the language in which the Internet activity was conducted or the type of browser used."

NSA analysts "can also use XKeyscore and other NSA systems to obtain ongoing ’real-time’ interception of an individual’s Internet activity," the Guardian said.

The NSA documents contend that by the year 2008, 300 terrorists had been captured using information gathered with XKeyscore, the newspaper said.

At a press briefing Wednesday, White House spokesman Jay Carney said that "some of the claims made in that article are false."

House Intelligence Committee Chairman Mike Rogers, R-Mich., and ranking member Dutch Ruppersberger, D-Md., released a joint statement saying "The latest in the parade of classified leaks published today is without context and provides a completely inaccurate picture of the program."

XKeyscore, they said, "does not target American citizens. Further, the program referenced in the story is not used for indiscriminate monitoring of the Internet, as many falsely believe. Rather, the program is simply a tool used by our intelligence analysts to better understand foreign intelligence, including terrorist targets overseas."

Snowden referenced XKeyscore, although not by name, in June, when his first interviews with the British newspaper were published. In a Guardian video interview, Snowden said, "I, sitting at my desk, certainly had the authorities to wiretap anyone, from you or your accountant, to a federal judge, to even the president if I had a personal email."

Nor is this the first public mention of XKeyscore. Earlier this month, German intelligence agencies said the NSA gave them XKeyscore to use, according to documents seen by Der Spiegel reporters, with the program meant to "expand their ability to support NSA as we jointly prosecute CT [counter-terrorism] targets."

XKeyscore was also described earlier this year in "Deep State: Inside the Government Secrecy Industry," a book by Marc Ambinder and D.B. Grady published earlier this year.

"At Fort Meade, a program called XKeyscore processes all signals before they are shunted off to various ’production lines’ that deal with specific issues," the authors wrote.

David Brown, who wrote "Deep State" using D.B. Grady as a pen name, told NBC News that what is "surprising everybody" with the XKeyscore information is "just how easily low-level analysts can access the data. The impediments that are supposed to be there really aren’t."

"I like to think of it as plumbing," he said. "The pipes come in through XKeyscore, which then diverts the data through different channels, because there’s just an awful lot of data."

Another NSA tool, called DNI Presenter, the Guardian said, lets an analyst who uses XKeyscore "read the content of Facebook chats or private messages," as well as the content of stored emails. Facebook declined to comment to NBC News about the report.

The amount of information gathered using XKeyscore is "staggeringly large," the newspaper said. "One NSA report from 2007 estimated that there were 850 billion ’call events’ collected and stored in the NSA databases, and close to 150 billion Internet records. Each day, the document says, 1-2b billion records were added."

The Guardian said the XKeyscore training materials shared by Snowden show how easy it is for analysts to use it "and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed."

If that claim is true, it may conflict with U.S. legal requirements for performing digital surveillance of Americans, that the NSA obtain a warrant first from the secret Foreign Intelligence Surveillance Act (FISA) court.

[...]

Read the full article at: nbcnews.com



READ: The Guardian - XKeyscore: NSA tool collects ’nearly everything a user does on the internet’








Related Articles


Latest News from our Front Page

Sweden’s military drills for an invasion of Stockholm
2014 11 24
During two weekends in November, units from the Life Guards, Command and Control and Luftvärnsregementet practiced defense of Stockholm. Stockholm, and its vital public infrastructure, will be defended in the event of armed aggression, and it must be practiced. Therefore joined several units to defend the strategically important locations in and around the capital. Comment: Pro NATO influences in Sweden once again ...
Recent Israeli Synagogue Attack, a Possible False Flag?
2014 11 21
Dear Friends - I woke up yesterday morning to see a newspaper lying on the kitchen table with the front page proclaiming that five people were slain in an Israeli synagogue after a so-called "Palestinian attack." Some members of the media said that four people were killed, others said five, so it seems like that there was some confusion (or ...
The Michael Brown Shooting, Race Baiting for Political Power and Militarization of the Police
2014 11 21
From Youtube: The evidence clearly shows that Officer Darren Wilson was justified in shooting Michael Brown, so why is this case being hyped by the mainstream media and the leftist political establishment?
Ancient Aryan Mummies and Pyramids of China
2014 11 21
After years of controversy and political intrigue, archaeologists using genetic testing have proven that Caucasians roamed China’s Tarim Basin thousands of years before East Asian people arrived. The research, which the Chinese government has appeared to have delayed making public out of concerns of fueling Uighur Muslim separatism in its western-most Xinjiang region, is based on a cache of ancient dried-out ...
Detekt: A New Malware Detection Tool That Can Expose Illegitimate State Surveillance
2014 11 21
Recent years have seen a boom in the adoption of surveillance technology by governments around the world, including spyware that provides its purchasers the unchecked ability to target remote Internet users’ computers, to read their personal emails, listen in on private audio calls, record keystrokes and passwords, and remotely activate their computer’s camera or microphone. EFF, together with Amnesty International, ...
More News »