XKeyscore
Xkeyscore - the Intercept: LINK ¤ the INTERCEPT
_________________________________________
- "the NSA - had an Internet program !"
_________________________________________
- "the documents described a program - called "Xkeyscore" !"
_________________________________________
- "a kind of Google - Internet searches - for people’s communications !"
_________________________________________
- "emails - documents - usernames - passwords - and other private communications !"
_________________________________________
- "top-secret documents described - the functionality - of the "Xkeyscore" program !"
_________________________________________
- "a backbone was Internet traffic - from fiber optic cables !"
_________________________________________
- "150 field sites - consisted of 700 servers !"
_________________________________________
- "that servers had a - "full-take data" - at the collection sites !"
- "the documents described billions of records - were stored in its database !"
_________________________________________
- "it was a fully distributed - processing - and query system !"
_________________________________________
- "it also collected and processed Internet traffic - from US people !"
_________________________________________
- "an instrument a wide system - that had been shared with partners !"
_________________________________________
- "the documents described databases of - Xkeyscore of - emails - chats !"
_________________________________________
- "web-browsing traffic - pictures - documents - voice calls - webcam photos !"
_________________________________________
- "web searches - advertising analytics traffic - social media traffic - botnet traffic !"
_________________________________________
- "logged keystrokes - intercepted username - password pairs - and Skype sessions !"
- "the documents described - to query the system - to show the activities !"
_________________________________________
- "of people - based on their location - nationality - and websites visited !"
_________________________________________
- "social media sites - like Twitter and Facebook - were described !"
_________________________________________
- "as "a great starting point" - tracked individuals !"
- "a publication described analysts - had used "Xkeyscore" !"
_________________________________________
- "obtained - UN Secretary General Ban Ki-moon’s - talking points !"
_________________________________________
- "prior to a meeting - with Barack Obama !"
_________________________________________
- "a training document described - repeatedly highlighted !"
_________________________________________
- "how user-friendly - the program was !"
_________________________________________
- "with just a few clicks - an analyst with access - could conduct searches !"
- "simply entered a person’s - email address !"
_________________________________________
- "telephone number - name - or other identifying data !"
_________________________________________
- "the online activity of a person - was a matter of a few mouse clicks !"
_________________________________________
- "as easy as typing a few words - in Google !"
- "there was no indication in the documents - that prior approval was needed - for specific searches !"
_________________________________________
- "because of the nature - of how it worked !"
_________________________________________
- "Xkeyscore - gathered communications - of US people !"
_________________________________________
- "( the fourth amendment protects against - "unreasonable search and seizure" - including searching data without a warrant !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! )"
- "the training document said - that the "burden - was on user" !"
- "auditor - to comply with USSID-18 - or other rules !"
- "Edward Snowden said that the majority - of the people !"
_________________________________________
- "who were doing the auditing - were the colleagues - of the analysts !"
_________________________________________
- "they worked in the - same office !"
______________________________________________________________________________
XKeyscore Source Code - ARD: LINK ¤ A R D_________________________________________
- "the source code - of the program "XKeyscore" !"
_________________________________________
- "was top secret - and showed privacy software users !"
_________________________________________
- "and all connections to a server - that hosts part of an - anonymous email service !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "at the MIT - computer science and artificial intelligence laboratory - CSAIL !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "it recorded details - about visits to a popular Internet journal !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "for Linux operating system users - called "the Linux Journal" !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "the original magazine - of the Linux community !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "and it described it an - "extremist forum" !"
_________________________________________
- "it was specifically directed - at the infrastructure - and the users !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "of the "Tor" - network !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "Tor - also known as "the Onion Router" - is a network of several thousand !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "volunteer-operated servers - or nodes !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "that work in concert - to conceal Tor users' - IP addresses !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "and thus keep them anonymous - while online !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "merely visiting privacy-related websites - was enough !"
_________________________________________
- "for a user's IP address - to be logged into a database !"
_________________________________________
- "the source code described elements - known as "appids" - "fingerprints" - and "microplugins" !"
_________________________________________
- "each connection a user makes online - to a search engine - for example !"
_________________________________________
- "could be assigned a single appid - and any number of fingerprints !"
_________________________________________
- "it specifically described the - Tor project's - email - and web infrastructure !"
_________________________________________
- "as well as servers - operated by key volunteers !"
_________________________________________
- "one goal was to find potential - Tor clients - connecting to the Tor directory servers !"
_________________________________________
- "beyond being ethically questionable - this also raises legal concerns !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "the IP addresses of Tor servers - were in many different states !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "( mainly in Europe - but also in the US !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! )"
_________________________________________
- "the attorney Thomas Stadler - who specializes in IT law !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "the citizens are - and must be protected !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "this could be illegal activities - in the country !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "the source code described first checks - if a message used the - "email_address" function ?!"
_________________________________________
- "if the message - was to or from - "bridges@torproject.org" ?!"
_________________________________________
- "next it used the "email_body" - function !"
_________________________________________
- "searched the full content - of the email !"
_________________________________________
- "if the "email_body" function - found what it was looking for ?!"
_________________________________________
- "it passed the full email text - to a C++ program !"
_________________________________________
- "which extracted the - bridge addresses !"
_________________________________________
- "and stored them - in a database !"
_________________________________________
- "( the full content - of this email - must have been intercepted - before this code could analyze it ! )"
_________________________________________
- "the Tor project's leader - Roger Dingledine - MIT !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "said the bridge address distribution service - and Tor's millions of daily users !"
_________________________________________
- "showed their - mentality !"
_________________________________________
- "the source code described - an analytic tool !"
_________________________________________
- "deep packet inspection software - 150 Internet facilities !"
_________________________________________
- "Internet traffic - both metadata - and full content !"
_________________________________________
- "it analyzed - and stored temporarily !"
_________________________________________
- "at the collection sites - for periods ranging from days - to weeks !"
_________________________________________
- "while selected data - was forwarded on to other locations !"
_________________________________________
- "for long-term - storage !"
_________________________________________
- "it described a modular architecture - in which tens of thousands !"
_________________________________________
- "of small computer programs - or rules !"
_________________________________________
- "were run against - Internet traffic !"
_________________________________________
- "categorized it - and extracted data !"
XKEYSCORE - Wikipedia EN: LINK ¤ XKEYSCORE
XKeyscore Quelltext - ARD: LINK ¤ A R D
_________________________________________
- "die NSA hatte ein - Internet Programm !"
_________________________________________
- "die Dokumente beschrieben ein Programm - genannt "XKeyscore" !"
_________________________________________
- "eine Art von Google - Internet Suche - von Kommunikationen !"
- "in einem Quelltext - reihen Programmierer Regeln aneinander !"
_________________________________________
- "der Quelltext des Programms - "XKeyscore" - war streng geheim !"
_________________________________________
- "der Quelltext beschrieb die Kennzeichnung - von Verbindungen von Computern - mit dem Internet !"
_________________________________________
- "der Ablegung in einer Art Datenbank - der Markierung eines Nutzers !"
_________________________________________
- "der Quelltext beschrieb die Markierung - der Infrastruktur !"
_________________________________________
- "und der Nutzer - des Tor-Netzwerks !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "ein Programm - bei dem Internetverkehr - durch verschiedene Server geleitet wird !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "und sich Anonymisierungsschichten - ähnlich wie bei einer Zwiebel - um die Anfrage legen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "es gibt zirka 5000 Tor-Server weltweit - die von Freiwilligen betrieben werden !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "Tor wird von - Journalisten !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "Menschenrechtsaktivisten - und Anwälten - weltweit verwendet !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
- "ironischerweise waren es - also ausgerechnet Personen - mit dem Wunsch nach Anonymisierung !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "der Quelltext beschrieb das Wort - Extremisten !"
_________________________________________
- "in der Kommentarspalte des Quelltexts - notiert von Programmierern !"
_________________________________________
- "( dies ist keine Rhetorik - keine journalistische Zuspitzung ! )"
_________________________________________
- "es sind Personen - die um die Sicherheit ihrer Daten - besorgt sind !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "der Quelltext beschrieb ebenfalls die Beobachtung - von Suchanfragen !"
_________________________________________
- "allein schon die einfache Suche - nach Anonymisierungssoftware !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "wie "Tails" - reichte aus !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "der Quelltext beschrieb nicht nur sogenannte - Metadaten !"
_________________________________________
- "also Verbindungsdaten - sondern auch Inhalte !"
_________________________________________
- "wenn E-Mails - zur Verbindung mit dem Tor-Netzwerk - genutzt werden !"
_________________________________________
- "dann würden laut Programmierzeile - auch die Inhalte !"
_________________________________________
- "der sogenannte E-Mail-Body - ausgewertet - und gespeichert werden !"
_________________________________________
- "das entsprechende Zitat - aus dem Quellcode lautete !"
_________________________________________
- "email_body('https://bridges.torproject.org/' : c++ extractors: !"
XKEYSCORE - Wikipedia DE: LINK ¤ XKEYSCORE