Chatham County Online BBS
December 11, 2017, 11:35:38 PM *
Welcome, Guest. Please login or register.

Login with username, password and session length
News: The Best Email List in the Triangle! Join the Chatham Chatlist
 
   Home   Help Search Calendar Tags Login Register  





Pages: [1]   Go Down
  Send this topic  |  Print  
Author Topic: XKeystore  (Read 686 times)
0 Members and 1 Guest are viewing this topic.
BOFH
Chathamite
***
Offline Offline

Last Login:March 07, 2017, 04:48:08 PM
Date Registerd:October 03, 2013, 09:15:08 AM
Posts: 145


« on: July 01, 2015, 02:31:10 PM »

http://www.businessinsider.com/nsa-xkeyscore-surveillance-program-details-revealed-in-new-snowden-documents-2015-7?google_editors_picks=true

Now, new documents show the breadth of this program and just what sort of data XKeyscore catalogs.

According to a new report from The Intercept, the amount of data XKeyscore scoops up as well as the sort of data it collects is much larger than originally thought.

Here are a few highlights from the new report:

    The XKeyescore database is "fed a constant flow of Internet traffic from fiber optic cables that make up the back of the world’s communication network, among other sources, for processing," the new report writes. Its servers collect all of this data for up to five days, and store the metadata of this traffic for up to 45 days.
    Web traffic wasn't XKeyscore's only target. In fact, according to the documents posted by The Intercept, it was able to gather data like voice recordings. A list of the intercepted data included "pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation (CNE) targeting, intercepted username and password pairs, file uploads to online services, Skype sessions and more."
    How the search works is very advanced. The new documents detail ways that analysts can query the database for information on people based on location, nationality, and previous web traffic.
    XKeyscore was also used to help hack into computer networks for both the US and its spying allies. One document dated in 2009 claims that the program could be used to gain access into unencrypted networks.
    Using XKeyscore was reportedly insanely easy. "The amount of work an analyst has to perform to actually break into remote computers over the Internet seems ridiculously reduced — we are talking minutes, if not seconds," security researcher Jonathan Brossard told The Intercept. "Simple. As easy as typing a few words in Google."

While XKeyscore has been known as an intelligence tool for years now, these new documents highlight just how advanced and far-reaching the program’s surveillance is.

The NSA, in a statement to The Intercept, claims that all of its intelligence operations are "authorized by law." It added, "NSA goes to great lengths to narrowly tailor and focus its signals intelligence operations on the collection of communications that are most likely to contain foreign intelligence or counterintelligence information."

Read more: http://www.businessinsider.com/nsa-xkeyscore-surveillance-program-details-revealed-in-new-snowden-documents-2015-7#ixzz3efaZdnIC
Logged
choseb
Member
**
Offline Offline

Last Login:July 01, 2015, 07:18:27 PM
Date Registerd:August 27, 2014, 08:55:26 AM
Posts: 18



« Reply #1 on: July 01, 2015, 07:01:22 PM »

Luckily, we have some methods of combating programs like this.

https://www.eff.org/secure-messaging-scorecard
https://freedom.press/encryption-works

Logged
BOFH
Chathamite
***
Offline Offline

Last Login:March 07, 2017, 04:48:08 PM
Date Registerd:October 03, 2013, 09:15:08 AM
Posts: 145


« Reply #2 on: July 05, 2015, 09:04:56 PM »

Luckily, we have some methods of combating programs like this.

https://www.eff.org/secure-messaging-scorecard
https://freedom.press/encryption-works



Yes, of course, but that's not really the point is it?
Logged
BOFH
Chathamite
***
Offline Offline

Last Login:March 07, 2017, 04:48:08 PM
Date Registerd:October 03, 2013, 09:15:08 AM
Posts: 145


« Reply #3 on: July 12, 2015, 08:54:29 PM »

More:

https://www.schneier.com/blog/archives/2015/07/more_about_the_.html

Mujahedeen Secrets is an encryption program written by al Qaeda supporters. It has been around since 2007. Last year, Stuart Baker cited its increased use as evidence that Snowden harmed America. I thought the opposite, that the NSA benefits from al Qaeda using this program. I wrote: "There's nothing that screams 'hack me' more than using specially designed al Qaeda encryption software."

It's not just Mujahedeen Secrets. Nicholas Weaver explains how you can use XKEYSCORE to identify co-conspirators who are all using PGP.

E-mails, chats, web-browsing traffic, pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, file uploads to online services, Skype sessions and more: if you can figure out how to form the query, you can ask XKEYSCORE for it. For an example of how complex the searches can be, look at this XKEYSCORE query published in March, showing how New Zealand used the system to spy on the World Trade Organization: automatically track any email body with any particular WTO-related content for the upcoming election. (Good new documents to read include this, this, and this.)

If you want to stay secure, whether you're trying to evade surveillance by Russia, China, the NSA, criminals intercepting large amounts of traffic, or anyone else, try not to stand out. Don't use some homemade specialized cryptography that can be easily identified by a system like this. Use reasonably strong encryption software on a reasonably secure device. If you trust Apple's claims (pages 35-6), use iMessage and Facetime on your iPhone. I really like Moxie Marlinspike's Signal for both text and voice, but worry that it's too obvious because it's still rare. Ubiquitous encryption is the bane of listeners worldwide, and it's the best thing we can deploy to make the world safer.
Logged
Tags:
Pages: [1]   Go Up
  Send this topic  |  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.21 | SMF © 2015, Simple Machines Valid XHTML 1.0! Valid CSS!