Snowden told of another large-scale Internet surveillance program
Today, the press has broken cover with another controversial surveillance program implemented by the United States in the bowels of the NSA. The new program gathers data on "almost everything a user does on the Internet." The publication of new data, compromising the NSA, occurs against the background of how departments are already raging around scandals involving mass Prowhisper people. Like today newspaper The Guardian, XKeyscore program covers the analysis of the e-mail address, social resources, and the history of Internet browsing users.
All this is available NSA analysts with a minimum of authorization. The newspaper notes that the program data were obtained from Edward Snowden. Today the Guardian publishes an accompanying story about XKeyscore. Interestingly, another blow was dealt by the NSA for a couple of hours before the head of the department, General Keith Alexander going to speak at the Black Hat hacker conference 2013 in Las Vegas. According to the Guardian, the secret program NSA spying allows military analysts departments to search the database containing electronic address, logs of online chats, as well as the history of browsing million. In documents leaked to the editors, it is said that XKeyscore - this is the most extensive program of exploration on the internet.
Also, the publication notes that in its scope XKeyscore not inferior to the previously known program PRISM, and perhaps surpasses it. If PRISM relies on the already stored data and the pre-trial access to them on the servers of Internet companies Google, Yahoo, Facebook, Apple and AOL (themselves the company denies it - note), then XKeyscore can analyze real-time data during transmission through cooperation with telecom companies. The article presents data on how the NSA is the U.S. real-time data on the target intercept e-mail addresses.
Which, in theory, should cause an uproar western user, so this is what XKeyscore works not only without a court order, but if the Staff Analyst listen to some data, in most cases it does not even asks permission of his superiors to these actions. "Maybe it was to listen to any e-mail, such as your, or your accountant, or federal judge or even the President, if it had been," - says the article. The article says that the PRISM program and Keyscore complementary and can be associated with other initiatives, the NSA, to the intelligence community in real time could get the most complete picture of what is happening. "program provides the technological capabilities to provide data about citizens and the establishment of an electronic spying on them without the presence of any warrants out," notes Guardian. publication notes that XKeyscore type solution has been created to ensure that NSA analysts do not work with simple reports on addresses, phone numbers and names of people, exploring the large "data dump" and give quick access to data. At the same time, to work with so-called metadata XKeyscore also able to.
"Until recently, the NSA was making to explore the" raw "traffic, but since 2008 it has appeared," - says the article. It is also reported that the system XKeyscore applies to systems with a level of "Top Secret", that is, its data circulate only in the U.S. intelligence community, and in rare cases, the NSA share data with colleagues from the UK, Australia, New Zealand and Canada. Guardian notes that XKeyscore has one drawback - the program generates an enormous amount of data - about 20 terabytes a day, so much of the information here is not stored for more than 5 days, and metadata - to 30 days.
Therefore, military analysts c XKeyscore need to work in real-time all the time. It is also said that this month the program collects data on approximately 41 billion transactions. material in the NSA said that XKeyscore - it is a useful tool, and since 2008 he has detected some 300 terrorists. Guardian notes that confirmed the presence of representatives of the NSA program and stated that it exists in the "framework of legal systems of intelligence gathering." "Allegations that the NSA collects all indiscriminately data does not match reality, the choice of data is very limited and related only to individual persons. Each request NSA fully audited and verified for compliance with laws," - said the agency.