XKeyscore





Xkeyscore - the Intercept: LINK ¤ the INTERCEPT

_________________________________________

 

  • "the NSA - had an Internet program !"

 

 

 

 

_________________________________________

  • "the documents described a program - called "Xkeyscore"  !"

 

 

 

 

 

_________________________________________

  • "a kind of Google - Internet searches - for people’s communications !"

 

 

 

 

_________________________________________

  • "emails - documents - usernames - passwords - and other private communications !"

 

 

 

 

 

_________________________________________

  • "top-secret documents described - the functionality - of the "Xkeyscore" program !"

 

 

 

 

_________________________________________

  • "a backbone was Internet traffic - from fiber optic cables !"

 

 

 

 

 

_________________________________________

  • "150 field sites - consisted of 700 servers !"

 

 

 

 

_________________________________________

  • "that servers had a - "full-take data" - at the collection sites !"

 

 

 

 

 

 

_________________________________________
  • "the documents described billions of records - were stored in its database !"

 

 

 

 

_________________________________________

  • "it was a fully distributed - processing - and query system !"

 

 

 

 

 

_________________________________________

  • "it also collected and processed Internet traffic - from US people !"

 

 

 

 

 

_________________________________________

  • "an instrument a wide system - that had been shared with partners !"

 

 

 

 

_________________________________________

  • "the documents described databases of - Xkeyscore of - emails - chats !"

 

 

 

 

 

_________________________________________

  • "web-browsing traffic - pictures - documents - voice calls - webcam photos !"

 

 

 

 

_________________________________________

  • "web searches - advertising analytics traffic - social media traffic - botnet traffic !"

 


 

 

 

_________________________________________

  • "logged keystrokes - intercepted username - password pairs - and Skype sessions !"

 

 

 

 

 

 

_________________________________________
  • "the documents described - to query the system - to show the activities !"

 

 

 

 

_________________________________________

  • "of people - based on their location - nationality - and websites visited !"

 

 

 

 

 

_________________________________________

  • "social media sites - like Twitter and Facebook - were described !"

 

 

 

 

_________________________________________

  • "as "a great starting point" - tracked individuals !"

 

 

 

 

 

_________________________________________
  • "a publication described analysts - had used "Xkeyscore"  !"

 

 

 

 

_________________________________________

  • "obtained - UN Secretary General Ban Ki-moon’s - talking points !"

 

 

 

 

 

_________________________________________

  • "prior to a meeting - with Barack Obama !"

 

 

 

 

 

 

_________________________________________

  • "a training document described - repeatedly highlighted !"

 

 

 

 

_________________________________________

  • "how user-friendly - the program was !"

 

 

 

 

 

_________________________________________

  • "with just a few clicks - an analyst with access - could conduct searches !"

 

 

 

 

 

_________________________________________
  • "simply entered a person’s - email address !"

 

 

 

 

_________________________________________

  • "telephone number - name - or other identifying data !"

 

 

 

 

 

_________________________________________

  • "the online activity of a person - was a matter of a few mouse clicks !"

 

 

 

 

_________________________________________

  • "as easy as typing a few words - in Google !"

 

 

 

 

 

_________________________________________
  • "there was no indication in the documents - that prior approval was needed - for specific searches !"

 

 

 

 

 

_________________________________________

  • "because of the nature - of how it worked !"

 

 

 

 

_________________________________________

  • "Xkeyscore - gathered communications - of US people !"

 

 

 

 

 

_________________________________________

  • "( the fourth amendment protects against - "unreasonable search and seizure" - including searching data without a warrant !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! )"

 

 

 

 

 

_________________________________________
  • "the training document said - that the "burden - was on user"  !"

 

 

 

 

_________________________________________
  • "auditor - to comply with USSID-18 - or other rules !"

 

 

 

 

 

 

_________________________________________
  • "Edward Snowden said that the majority - of the people !"

 

 

 

 

_________________________________________

  • "who were doing the auditing - were the colleagues - of the analysts !"

 

 

 

 

 

_________________________________________

  • "they worked in the - same office !"

 

 

 

 

 

 

 

 

 

______________________________________________________________________________

XKeyscore Source Code - ARD: LINK ¤ A R D

_________________________________________

 

  • "the source code - of the program "XKeyscore"  !"

 

 

 

 

_________________________________________

  • "was top secret - and showed privacy software users !"

 

 

 

 

 

_________________________________________

  • "and all connections to a server - that hosts part of an - anonymous email service !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "at the MIT - computer science and artificial intelligence laboratory - CSAIL !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "it recorded details - about visits to a popular Internet journal !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "for Linux operating system users - called "the Linux Journal"  !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "the original magazine - of the Linux community !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "and it described it an - "extremist forum"  !"

 

 

 

 

 

_________________________________________

  • "it was specifically directed - at the infrastructure - and the users !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "of the "Tor" - network !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

 

_________________________________________

  • "Tor - also known as "the Onion Router" - is a network of several thousand !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "volunteer-operated servers - or nodes !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "that work in concert - to conceal Tor users' - IP addresses !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "and thus keep them anonymous - while online !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "merely visiting privacy-related websites - was enough !"

 

 

 

 

_________________________________________

  • "for a user's IP address - to be logged into a database !"

 

 

 

 

 

 

_________________________________________

  • "the source code described elements - known as "appids" - "fingerprints" - and "microplugins"  !"

 

 

 

 

_________________________________________

  • "each connection a user makes online - to a search engine - for example !"

 

 

 

 

 

_________________________________________

  • "could be assigned a single appid - and any number of fingerprints !"

 

 

 

 

 

_________________________________________

  • "it specifically described the - Tor project's - email - and web infrastructure !"

 

 

 

 

_________________________________________

  • "as well as servers - operated by key volunteers !"

 

 

 

 

 

_________________________________________

  • "one goal was to find potential - Tor clients - connecting to the Tor directory servers !"

 

 

 

 

 

_________________________________________

  • "beyond being ethically questionable - this also raises legal concerns !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "the IP addresses of Tor servers - were in many different states !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "( mainly in Europe - but also in the US !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! )"

 

 

 

 

 

_________________________________________

  • "the attorney Thomas Stadler - who specializes in IT law !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "the citizens are - and must be protected !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 


 

 

 

_________________________________________

  • "this could be illegal activities - in the country !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

 

_________________________________________

  • "the source code described first checks - if a message used the - "email_address" function ?!"

 

 

 

 

_________________________________________

  • "if the message - was to or from - "bridges@torproject.org"  ?!"

 

 

 

 

 

_________________________________________

  • "next it used the "email_body" - function !"

 

 

 

 

_________________________________________

  • "searched the full content - of the email !"

 

 

 

 

 

_________________________________________

  • "if the "email_body" function - found what it was looking for ?!"

 

 

 

 

_________________________________________

  • "it passed the full email text - to a C++ program !"

 

 

 

 

 

_________________________________________

  • "which extracted the - bridge addresses !"

 

 

 

 

_________________________________________

  • "and stored them - in a database !"

 

 

 

 

 

_________________________________________

  • "( the full content - of this email - must have been intercepted - before this code could analyze it ! )"

 

 

 

 

 

_________________________________________

  • "the Tor project's leader - Roger Dingledine - MIT !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "said the bridge address distribution service - and Tor's millions of daily users !"

 


 

 

 

_________________________________________

  • "showed their - mentality !"

 

 

 

 

 

 

_________________________________________

  • "the source code described - an analytic tool !"

 

 

 

 

_________________________________________

  • "deep packet inspection software - 150 Internet facilities !"

 

 

 

 

 

_________________________________________

  • "Internet traffic - both metadata - and full content !"

 

 

 

 

 

_________________________________________

  • "it analyzed - and stored temporarily !"

 

 

 

 

_________________________________________

  • "at the collection sites - for periods ranging from days - to weeks !"

 

 

 

 

 

_________________________________________

  • "while selected data - was forwarded on to other locations !"

 

 

 

 

_________________________________________

  • "for long-term - storage !"

 

 

 

 

 

_________________________________________

  • "it described a modular architecture - in which tens of thousands !"

 

 

 

 

_________________________________________

  • "of small computer programs - or rules !"

 

 

 

 

 

_________________________________________

  • "were run against - Internet traffic !"

 


 

 

_________________________________________

  • "categorized it - and extracted data !"

 

 

 

 

 

 

 

 


 

 

 

 


______________________________________________________________________________

XKEYSCORE
- Wikipedia EN:
LINK ¤ XKEYSCORE
______________________________________________________________________________

______________________________________________________________________________



XKeyscore Quelltext - ARD: LINK ¤ A R D

_________________________________________

 

  • "die NSA hatte ein - Internet Programm !"

 

 

_________________________________________

  • "die Dokumente beschrieben ein Programm - genannt "XKeyscore"  !"

 

 

 

_________________________________________

  • "eine Art von Google - Internet Suche - von Kommunikationen !"

 

 

 

_________________________________________
  • "in einem Quelltext - reihen Programmierer Regeln aneinander !"

 

 

_________________________________________

  • "der Quelltext des Programms - "XKeyscore" - war streng geheim !"

 

 

 

_________________________________________

  • "der Quelltext beschrieb die Kennzeichnung - von Verbindungen von Computern - mit dem Internet !"

 

 

_________________________________________

  • "der Ablegung in einer Art Datenbank - der Markierung eines Nutzers !"

 

 

 

_________________________________________

  • "der Quelltext beschrieb die Markierung - der Infrastruktur !"

 

 

_________________________________________

  • "und der Nutzer - des Tor-Netzwerks !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "ein Programm - bei dem Internetverkehr - durch verschiedene Server geleitet wird !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "und sich Anonymisierungsschichten - ähnlich wie bei einer Zwiebel - um die Anfrage legen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "es gibt zirka 5000 Tor-Server weltweit - die von Freiwilligen betrieben werden !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "Tor wird von - Journalisten !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "Menschenrechtsaktivisten - und Anwälten - weltweit verwendet !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________
  • "ironischerweise waren es - also ausgerechnet Personen - mit dem Wunsch nach Anonymisierung !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "der Quelltext beschrieb das Wort - Extremisten !"

 

 

 

_________________________________________

  • "in der Kommentarspalte des Quelltexts - notiert von Programmierern !"

 

 

_________________________________________

  • "( dies ist keine Rhetorik - keine journalistische Zuspitzung ! )"

 

 

 

_________________________________________

  • "es sind Personen - die um die Sicherheit ihrer Daten - besorgt sind !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "der Quelltext beschrieb ebenfalls die Beobachtung - von Suchanfragen !"

 

 

_________________________________________

  • "allein schon die einfache Suche - nach Anonymisierungssoftware !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "wie "Tails" - reichte aus !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "der Quelltext beschrieb nicht nur sogenannte - Metadaten !"

 

 

_________________________________________

  • "also Verbindungsdaten - sondern auch Inhalte !"

 

 

 

_________________________________________

  • "wenn E-Mails - zur Verbindung mit dem Tor-Netzwerk - genutzt werden !"

 

 

_________________________________________

  • "dann würden laut Programmierzeile - auch die Inhalte !"

 

 

 

_________________________________________

  • "der sogenannte E-Mail-Body - ausgewertet - und gespeichert werden !"

 

 

 

_________________________________________

  • "das entsprechende Zitat - aus dem Quellcode lautete !"

 

_________________________________________

  • "email_body('https://bridges.torproject.org/' : c++ extractors:  !"

 

 

 

 

 

 

 

______________________________________________________________________________

XKEYSCORE - Wikipedia DE:
LINK ¤ XKEYSCORE
______________________________________________________________________________




xkeyscore - 14378XKS
designed by Free CSS Templates | powerd by pluck | hosted by akis