NSA’s XKeyscore program has nearly limitless access to all Internet activity
2013 08 01

By Suzanne Choney | NBCNews



Americans’ email and online chats can be monitored without authorization by any National Security Agency analyst using a computer program known as "XKeyscore," according to NSA leaker Edward Snowden, who shared the information with the Guardian in a story published Wednesday.

XKeyscore is described by the NSA in training materials as its "widest reaching" means of gathering information from the Internet, according to the Guardian. Using the program, "analysts can also search by name, telephone number, IP address, keywords, the language in which the Internet activity was conducted or the type of browser used."

NSA analysts "can also use XKeyscore and other NSA systems to obtain ongoing ’real-time’ interception of an individual’s Internet activity," the Guardian said.

The NSA documents contend that by the year 2008, 300 terrorists had been captured using information gathered with XKeyscore, the newspaper said.

At a press briefing Wednesday, White House spokesman Jay Carney said that "some of the claims made in that article are false."

House Intelligence Committee Chairman Mike Rogers, R-Mich., and ranking member Dutch Ruppersberger, D-Md., released a joint statement saying "The latest in the parade of classified leaks published today is without context and provides a completely inaccurate picture of the program."

XKeyscore, they said, "does not target American citizens. Further, the program referenced in the story is not used for indiscriminate monitoring of the Internet, as many falsely believe. Rather, the program is simply a tool used by our intelligence analysts to better understand foreign intelligence, including terrorist targets overseas."

Snowden referenced XKeyscore, although not by name, in June, when his first interviews with the British newspaper were published. In a Guardian video interview, Snowden said, "I, sitting at my desk, certainly had the authorities to wiretap anyone, from you or your accountant, to a federal judge, to even the president if I had a personal email."

Nor is this the first public mention of XKeyscore. Earlier this month, German intelligence agencies said the NSA gave them XKeyscore to use, according to documents seen by Der Spiegel reporters, with the program meant to "expand their ability to support NSA as we jointly prosecute CT [counter-terrorism] targets."

XKeyscore was also described earlier this year in "Deep State: Inside the Government Secrecy Industry," a book by Marc Ambinder and D.B. Grady published earlier this year.

"At Fort Meade, a program called XKeyscore processes all signals before they are shunted off to various ’production lines’ that deal with specific issues," the authors wrote.

David Brown, who wrote "Deep State" using D.B. Grady as a pen name, told NBC News that what is "surprising everybody" with the XKeyscore information is "just how easily low-level analysts can access the data. The impediments that are supposed to be there really aren’t."

"I like to think of it as plumbing," he said. "The pipes come in through XKeyscore, which then diverts the data through different channels, because there’s just an awful lot of data."

Another NSA tool, called DNI Presenter, the Guardian said, lets an analyst who uses XKeyscore "read the content of Facebook chats or private messages," as well as the content of stored emails. Facebook declined to comment to NBC News about the report.

The amount of information gathered using XKeyscore is "staggeringly large," the newspaper said. "One NSA report from 2007 estimated that there were 850 billion ’call events’ collected and stored in the NSA databases, and close to 150 billion Internet records. Each day, the document says, 1-2b billion records were added."

The Guardian said the XKeyscore training materials shared by Snowden show how easy it is for analysts to use it "and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed."

If that claim is true, it may conflict with U.S. legal requirements for performing digital surveillance of Americans, that the NSA obtain a warrant first from the secret Foreign Intelligence Surveillance Act (FISA) court.

[...]

Read the full article at: nbcnews.com



READ: The Guardian - XKeyscore: NSA tool collects ’nearly everything a user does on the internet’








Related Articles


Latest News from our Front Page

The Aeon of Horus is Ending and the Elites are Nervous as their Icons are Dying
2014 04 18
I predict there is going to be a huge resurgence of interest in European indigenous spiritual traditions from Norse to Celtic/Gaelic to Slavic and so on. Millions of Europeans are going to realise that we are the victims of Christianity and New Age garbage. Their bastardised Kabbalah, the psychic force used by Crowley and the elites to cement his Aeon ...
Easter - Christian or Pagan?
2014 04 18
From: truthbeknown.com Contrary to popular belief, Easter does not represent the "historical" crucifixion and resurrection of Jesus Christ. In reality, the gospel tale reflects the annual "crossification" of the sun through the vernal equinox (Spring), at which time the sun is "resurrected," as the day begins to become longer than the night. Rather than being a "Christian" holiday, Easter celebrations date back ...
Man-Made Blood Might Be Used in Transfusions by 2016
2014 04 18
Researchers in the U.K. have created the first man-made red blood cells of high enough quality to be introduced into the human body The premise of the HBO show and book series True Blood revolves around a technological breakthrough: scientists figure out how to synthesize artificial human blood, which, as an ample new source of non-human food, allows vampires to "come ...
The Trials of the Cherokee Were Reflected In Their Skulls
2014 04 18
Researchers from North Carolina State University and the University of Tennessee have found that environmental stressors – from the Trail of Tears to the Civil War – led to significant changes in the shape of skulls in the eastern and western bands of the Cherokee people. The findings highlight the role of environmental factors in shaping our physical characteristics. ...
Our Fears May Be Shaped by Ancestral Trauma
2014 04 18
Last December, an unsettling Nature Neuroscience study found that mice who were taught to associate the smell of cherry blossoms with pain produced offspring who feared the smell of cherry blossoms, even if they had never been exposed to it before. We knew that the process was epigenetic—that it was not hard-wired in the permanent genetic structure of the mouse—but ...
More News »