Skip to comments.How the NSA's XKeyscore program works
Posted on 08/01/2013 8:17:06 AM PDT by SoFloFreeper
Until Wednesday morning, you'd probably never heard of something called "XKeyscore," a program that the National Security Agency itself describes as its "widest reaching" means of gathering data from across the Internet. According to reports shared by NSA leaker Edward Snowden with the Guardian, is that in addition to all of the other recent revelations about the NSA's surveillance programs, by using XKeyscore, "analysts can also search by name, telephone number, IP address, keywords, the language in which the Internet activity was conducted or the type of browser used."
David Brown, who co-authored the recent book "Deep State: Inside the Government Secrecy Industry" under the pseudonym D.B. Grady, told NBC News Wednesday the main value of XKeyscore is that it serves as a first point of collection for massive amounts of data the NSA can now cull from digital activities, such as a person's email or Web browsing.
(Excerpt) Read more at m.nbcnews.com ...
Beyond that. Your ISP and it’s peering partners routers know your packet’s next hop so it can route it. Also, the NSA is believed the collect every packet that peers with ATT as it’s rumored they have equipment in their data centers.
The internet is a dangerous place.
Facebook, Twitter and any social network are dangerous, add to that the government using the internet to build a case against you and it is truly a dangerous place.
Name any person in the world and somewhere there is his picture ,his address, his medical records ,his family, his habits, his history of web sites visited.
Have you ever wondered why some RINO’s act like RINO’s? It’s worth considering. “Sir, we’ve noticed you’ve been googling ‘cabana boys.’”
It's not the truth of the charges, it's the severity.
Besides, who is going to doubt the government?
most of the TOR network nodes are operated by the US. gov ... Big Obozo keeps watching you ...
His reputation preceded him...
I'm using it on FireFox and it's interesting how many bugs it stops.
“Ghostery is a cost free privacy browser extension for Internet Explorer, Opera, Mozilla Firefox, Apple Safari, and Google Chrome owned by the privacy technology company Evidon. It enables its users to easily detect and control web bugs which are objects embedded in a web page, invisible to the user, that allow the collection of data on the user's browsing habits. Ghostery also has a privacy team that creates profiles of page elements and companies for educational purposes.” - Wikipedia
xkeyscore ACCESSES a database of information. like a web browser.
the real question is...
what and/or who is filling the database and with what information?
digging into that will result in answers that will freak you out.
are they tapping your isp? yes.
your phones? yes.
your cable tv? yes.
your driving habits? yes.
your cell data? yes.
your credit card purchases? yes.
your medical history? yes
that’s all generally understood. what most people are unaware of is... your phone is ALWAYS an open mic. that audio data can/will be processed and pushed through voice recognition to produce a text document to be parsed
You're probably right...
I use Torguard. They do not have a hard drive and keep no files. I have over 20 countries with which to make my IP address. Some are fast, some are slow.
Many Chinese and middle eastern folks use Torguard to hide themselves from their governments.
Even if subpena, they could turn over nothing, as they have no records. Even if you use CC, it is a different agency, and they still do not log your activity but you can still use bitcoins if you like (I pay by the year in bitcoins).
I use the TCP client and it is fully encrypted transmission both ways.
3.6 MB PDF of an NSA presentation obtained by Cryptome.org. Very interesting.
TAILS is a bootable live distribution that is built around Tor, and also provides additional pre-configured SSL enabled services and blocks all services a site might attempt to open outside the defined ones. It also leaves no trace behind once it is turned off although it is possible to create a persistent volume.
All the provider can know is that your IP address is accessing a Tor IP. You can use VirtualBox or something similar to create a virtual host on your own system and try it, and even use it in that way for everyday use. I sometimes use it to access Google search.
You only need to google the wrong words to get a visit from the KGB ehh.. US-GOV.
Try Tor. It’s slower for browsing but not too slow for me. You might try contributing computer resources or more to the project (easy stuff, see explanation at the Tor site). If you want more of a commercial service with more features, you could try something like TorGuard (don’t know if they’re associated with Tor in any way).
I’ve seen some myths about Tor posted here. With Tor, properly configured and used, your ISP cannot see or log destination IP addresses. The ISP can only see accesses to Tor servers. It’s not a government conspiracy. Tor servers are located at various points on the globe and are owned by privacy activists. None of the activists could even see what is going through their servers without enormous resources for decryption.
So what we need to have is a coordinated effort to google those words and make their heads explode.
Liken it to a DoS attack on their sorry asses.