Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

How the NSA's XKeyscore program works
NBC ^ | 7/31/13 | Yannick LeJacq

Posted on 08/01/2013 8:17:06 AM PDT by SoFloFreeper

Until Wednesday morning, you'd probably never heard of something called "XKeyscore," a program that the National Security Agency itself describes as its "widest reaching" means of gathering data from across the Internet. According to reports shared by NSA leaker Edward Snowden with the Guardian, is that in addition to all of the other recent revelations about the NSA's surveillance programs, by using XKeyscore, "analysts can also search by name, telephone number, IP address, keywords, the language in which the Internet activity was conducted or the type of browser used."

David Brown, who co-authored the recent book "Deep State: Inside the Government Secrecy Industry" under the pseudonym D.B. Grady, told NBC News Wednesday the main value of XKeyscore is that it serves as a first point of collection for massive amounts of data the NSA can now cull from digital activities, such as a person's email or Web browsing.

(Excerpt) Read more at m.nbcnews.com ...


TOPICS: Breaking News; Constitution/Conservatism; Culture/Society; News/Current Events
KEYWORDS: communism; computerprivacy; computertsecurity; democrats; dontspyonme; donttreadonme; encryption; govtabuse; internet; nsa; nsabrownshirts; nsaleaks; nsascandals; obama; privacy; rapeofliberty; scandals; tyranny; waronliberty; xkeyscore; xkeystore; yeswescan
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-74 next last
To: proxy_user

Beyond that. Your ISP and it’s peering partners routers know your packet’s next hop so it can route it. Also, the NSA is believed the collect every packet that peers with ATT as it’s rumored they have equipment in their data centers.


21 posted on 08/01/2013 9:11:49 AM PDT by miliantnutcase
[ Post Reply | Private Reply | To 18 | View Replies]

To: SoFloFreeper

The internet is a dangerous place.

Facebook, Twitter and any social network are dangerous, add to that the government using the internet to build a case against you and it is truly a dangerous place.

Name any person in the world and somewhere there is his picture ,his address, his medical records ,his family, his habits, his history of web sites visited.


22 posted on 08/01/2013 9:14:02 AM PDT by Venturer ( cowardice posturing as tolerance =political correctness)
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #23 Removed by Moderator

To: Buckeye McFrog

Have you ever wondered why some RINO’s act like RINO’s? It’s worth considering. “Sir, we’ve noticed you’ve been googling ‘cabana boys.’”


24 posted on 08/01/2013 9:20:27 AM PDT by 1rudeboy
[ Post Reply | Private Reply | To 12 | View Replies]

To: 1rudeboy
Yep, and if they can't find a skeleton, they can always make one up.

It's not the truth of the charges, it's the severity.

Besides, who is going to doubt the government?

25 posted on 08/01/2013 9:24:44 AM PDT by null and void (You don't know what "cutting edge" means till you insult Mohammed.)
[ Post Reply | Private Reply | To 24 | View Replies]

To: proxy_user

most of the TOR network nodes are operated by the US. gov ... Big Obozo keeps watching you ...


26 posted on 08/01/2013 9:26:25 AM PDT by SgtBilko
[ Post Reply | Private Reply | To 18 | View Replies]

To: Shimmer1

His reputation preceded him...


27 posted on 08/01/2013 9:34:28 AM PDT by null and void (You don't know what "cutting edge" means till you insult Mohammed.)
[ Post Reply | Private Reply | To 19 | View Replies]

To: null and void; SoFloFreeper
Ever hear of Ghostery (http://www.ghostery.com/)?

I'm using it on FireFox and it's interesting how many bugs it stops.

“Ghostery is a cost free privacy browser extension for Internet Explorer, Opera, Mozilla Firefox, Apple Safari, and Google Chrome owned by the privacy technology company Evidon. It enables its users to easily detect and control web bugs which are objects embedded in a web page, invisible to the user, that allow the collection of data on the user's browsing habits. Ghostery also has a privacy team that creates profiles of page elements and companies for educational purposes.” - Wikipedia

28 posted on 08/01/2013 9:41:28 AM PDT by Lady Jag (If you can't make them see the light, let them feel the heat. - Reagan)
[ Post Reply | Private Reply | To 6 | View Replies]

To: SoFloFreeper

xkeyscore ACCESSES a database of information. like a web browser.

the real question is...

what and/or who is filling the database and with what information?

digging into that will result in answers that will freak you out.

are they tapping your isp? yes.
your phones? yes.
your cable tv? yes.
your driving habits? yes.
your cell data? yes.
your credit card purchases? yes.
your medical history? yes

that’s all generally understood. what most people are unaware of is... your phone is ALWAYS an open mic. that audio data can/will be processed and pushed through voice recognition to produce a text document to be parsed


29 posted on 08/01/2013 9:42:05 AM PDT by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void
In terms of FR? If you’re here, you’re probably on a death list.

You're probably right...

30 posted on 08/01/2013 9:48:39 AM PDT by alancarp (Obama will grab your guns and ship them to Mexican drug mobs.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: max americana

I use Torguard. They do not have a hard drive and keep no files. I have over 20 countries with which to make my IP address. Some are fast, some are slow.

Many Chinese and middle eastern folks use Torguard to hide themselves from their governments.

Even if subpena, they could turn over nothing, as they have no records. Even if you use CC, it is a different agency, and they still do not log your activity but you can still use bitcoins if you like (I pay by the year in bitcoins).

I use the TCP client and it is fully encrypted transmission both ways.


31 posted on 08/01/2013 9:50:43 AM PDT by esoxmagnum (The rats have been trained to pull the D voting lever to get their little food pellet)
[ Post Reply | Private Reply | To 15 | View Replies]

To: SoFloFreeper
NSA XKEYSCORE 2008

3.6 MB PDF of an NSA presentation obtained by Cryptome.org. Very interesting.

32 posted on 08/01/2013 10:17:02 AM PDT by Constitution Day
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user

TAILS is a bootable live distribution that is built around Tor, and also provides additional pre-configured SSL enabled services and blocks all services a site might attempt to open outside the defined ones. It also leaves no trace behind once it is turned off although it is possible to create a persistent volume.

All the provider can know is that your IP address is accessing a Tor IP. You can use VirtualBox or something similar to create a virtual host on your own system and try it, and even use it in that way for everyday use. I sometimes use it to access Google search.


33 posted on 08/01/2013 10:43:27 AM PDT by wrencher
[ Post Reply | Private Reply | To 18 | View Replies]

To: alancarp; null and void

You only need to google the wrong words to get a visit from the KGB ehh.. US-GOV.

http://www.theatlanticwire.com/national/2013/08/government-knocking-doors-because-google-searches/67864/


34 posted on 08/01/2013 10:47:57 AM PDT by SgtBilko
[ Post Reply | Private Reply | To 30 | View Replies]


35 posted on 08/01/2013 11:02:22 AM PDT by LucyT (What happens in Vegas stays in the Utah data center.)
[ Post Reply | Private Reply | To 34 | View Replies]

To: SkyDancer
If Bush did one-tenth of what this moron is doing the MSM then would have had conniptions.

The MSM would have demanded his head on an impeachment platter and the RAT caucus would have gone along.
36 posted on 08/01/2013 11:09:28 AM PDT by Cheerio (Barry Hussein Soetoro-0bama=The Complete Destruction of American Capitalism)
[ Post Reply | Private Reply | To 2 | View Replies]

To: jurroppi1

bump


37 posted on 08/01/2013 11:11:19 AM PDT by jurroppi1
[ Post Reply | Private Reply | To 11 | View Replies]

To: OpusatFR

Try Tor. It’s slower for browsing but not too slow for me. You might try contributing computer resources or more to the project (easy stuff, see explanation at the Tor site). If you want more of a commercial service with more features, you could try something like TorGuard (don’t know if they’re associated with Tor in any way).

I’ve seen some myths about Tor posted here. With Tor, properly configured and used, your ISP cannot see or log destination IP addresses. The ISP can only see accesses to Tor servers. It’s not a government conspiracy. Tor servers are located at various points on the globe and are owned by privacy activists. None of the activists could even see what is going through their servers without enormous resources for decryption.


38 posted on 08/01/2013 11:14:14 AM PDT by familyop (We Baby Boomers are croaking in an avalanche of rotten politics smelled around the planet.)
[ Post Reply | Private Reply | To 7 | View Replies]

Comment #39 Removed by Moderator

To: SgtBilko
You only need to google the wrong words to get a visit from the KGB ehh.. US-GOV.

So what we need to have is a coordinated effort to google those words and make their heads explode.

Liken it to a DoS attack on their sorry asses.

40 posted on 08/01/2013 11:42:20 AM PDT by unixfox (Abolish Slavery, Repeal the 16th Amendment)
[ Post Reply | Private Reply | To 34 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-74 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson