Skip to comments.How the NSA's XKeyscore program works
Posted on 08/01/2013 8:17:06 AM PDT by SoFloFreeper
Until Wednesday morning, you'd probably never heard of something called "XKeyscore," a program that the National Security Agency itself describes as its "widest reaching" means of gathering data from across the Internet. According to reports shared by NSA leaker Edward Snowden with the Guardian, is that in addition to all of the other recent revelations about the NSA's surveillance programs, by using XKeyscore, "analysts can also search by name, telephone number, IP address, keywords, the language in which the Internet activity was conducted or the type of browser used."
David Brown, who co-authored the recent book "Deep State: Inside the Government Secrecy Industry" under the pseudonym D.B. Grady, told NBC News Wednesday the main value of XKeyscore is that it serves as a first point of collection for massive amounts of data the NSA can now cull from digital activities, such as a person's email or Web browsing.
(Excerpt) Read more at m.nbcnews.com ...
If Bush did one-tenth of what this moron is doing the MSM then would have had conniptions.
Provided, of course, you don’t use Tor, an offshore commercial VPN, or a free wireless connection.
He did and they did.
Could one of you computer whizzes explain this in terms of FR? Does this program sweep in the titles or content of the articles we read on this site?
Nut-job Conspiracy Theory Ping!
To get onto The Nut-job Conspiracy Theory Ping List you must threaten to report me to the Mods if I dont add you to the list...
Anyone familiar with TOR or Albine for privacy? I’m looking for a good program and haven’t a clue.
Maxine Waters was right.
Impeachment File on Benghazi Coward B. Hussein Obama, formerly known as Barry Soetoro, currently a Legal Citizen of the Sovereign Nation of Indonesia.
Shut up !
It`s just another phony scandal/sarc off
Tor still exposes your browsing targets to your provider if your are not diligent. TAILS on a bootable USB stick uses Tor and also ensures everything is SSL on both ends. TAILS on open wireless is best.
The Pubbies have thrown in with Nancy Pelosi on this one.
When the backlash comes it will be driven by Libertarians.
<< The Pubbies have thrown in with Nancy Pelosi on this one. When the backlash comes it will be driven by Libertarians. >>
I wonder how many RINOs have pacemakers or insulin pumps?
In terms of FR? If you’re here, you’re probably on a death list.
Our techie has TOR on his laptop but it’s slow accdg to him. My advice? Buy a VPN using bitcoin as once u pay by CC, “they” will be able to read the PW once the emailed receipt comes in. And change your IP address once you do all these stuff..
We all are.
If my number’s up at least I’ll go out informed (And among friends.)
You mean DNS lookups? I believe there is a way around that with TOR. Many people don’t use their ISP’s DNS anyway. You could build your own DNS caching server if you wanted to.
Thank you! New tagline. Did John Adams know Barack Obambi or WHAT???????!!!!!
Sounds like everything on every unencrypted website.
Beyond that. Your ISP and it’s peering partners routers know your packet’s next hop so it can route it. Also, the NSA is believed the collect every packet that peers with ATT as it’s rumored they have equipment in their data centers.
The internet is a dangerous place.
Facebook, Twitter and any social network are dangerous, add to that the government using the internet to build a case against you and it is truly a dangerous place.
Name any person in the world and somewhere there is his picture ,his address, his medical records ,his family, his habits, his history of web sites visited.
Have you ever wondered why some RINO’s act like RINO’s? It’s worth considering. “Sir, we’ve noticed you’ve been googling ‘cabana boys.’”
It's not the truth of the charges, it's the severity.
Besides, who is going to doubt the government?
most of the TOR network nodes are operated by the US. gov ... Big Obozo keeps watching you ...
His reputation preceded him...
I'm using it on FireFox and it's interesting how many bugs it stops.
“Ghostery is a cost free privacy browser extension for Internet Explorer, Opera, Mozilla Firefox, Apple Safari, and Google Chrome owned by the privacy technology company Evidon. It enables its users to easily detect and control web bugs which are objects embedded in a web page, invisible to the user, that allow the collection of data on the user's browsing habits. Ghostery also has a privacy team that creates profiles of page elements and companies for educational purposes.” - Wikipedia
xkeyscore ACCESSES a database of information. like a web browser.
the real question is...
what and/or who is filling the database and with what information?
digging into that will result in answers that will freak you out.
are they tapping your isp? yes.
your phones? yes.
your cable tv? yes.
your driving habits? yes.
your cell data? yes.
your credit card purchases? yes.
your medical history? yes
that’s all generally understood. what most people are unaware of is... your phone is ALWAYS an open mic. that audio data can/will be processed and pushed through voice recognition to produce a text document to be parsed
You're probably right...
I use Torguard. They do not have a hard drive and keep no files. I have over 20 countries with which to make my IP address. Some are fast, some are slow.
Many Chinese and middle eastern folks use Torguard to hide themselves from their governments.
Even if subpena, they could turn over nothing, as they have no records. Even if you use CC, it is a different agency, and they still do not log your activity but you can still use bitcoins if you like (I pay by the year in bitcoins).
I use the TCP client and it is fully encrypted transmission both ways.
3.6 MB PDF of an NSA presentation obtained by Cryptome.org. Very interesting.
TAILS is a bootable live distribution that is built around Tor, and also provides additional pre-configured SSL enabled services and blocks all services a site might attempt to open outside the defined ones. It also leaves no trace behind once it is turned off although it is possible to create a persistent volume.
All the provider can know is that your IP address is accessing a Tor IP. You can use VirtualBox or something similar to create a virtual host on your own system and try it, and even use it in that way for everyday use. I sometimes use it to access Google search.
You only need to google the wrong words to get a visit from the KGB ehh.. US-GOV.
Try Tor. It’s slower for browsing but not too slow for me. You might try contributing computer resources or more to the project (easy stuff, see explanation at the Tor site). If you want more of a commercial service with more features, you could try something like TorGuard (don’t know if they’re associated with Tor in any way).
I’ve seen some myths about Tor posted here. With Tor, properly configured and used, your ISP cannot see or log destination IP addresses. The ISP can only see accesses to Tor servers. It’s not a government conspiracy. Tor servers are located at various points on the globe and are owned by privacy activists. None of the activists could even see what is going through their servers without enormous resources for decryption.
So what we need to have is a coordinated effort to google those words and make their heads explode.
Liken it to a DoS attack on their sorry asses.
Thanks bro for the tip. :)
I am on ELEVEN lists.
How many are YOU on?
Bump for later image swiping! ;)
Tor works pretty good these days. In the beginning it was MUCH slower. As for VPN this one seems good so far in about 6 months of use. http://www.ibvpn.com/
www.i2p2.de, a darknet, has out proxies to the regular web too but, i havent used it in good while so don’t know the quality or availability lately.
alternative DNS providers:
useful page to bookmark:
Dunno. How do I get a count?
Funny how they named their program after an old universal password for opening cash registers “X-Key” and the new term for master key to XBOX 360 and other game consoles...
I do private Infosec work. I don’t have anything to hide but, i run with a lot of security just to annoy these .Gov creeps. Using a virtual machine is good advice. https://www.virtualbox.org/ Other good advice to consider here below.
Consider changing your browser homepage and search default. When your worried about your search use Startpage’s integrated proxy feature in the search results. https://startpage.com
Consider putting Truecrypt on your host if you want an elevated degree of the assurance of the confidentiality of your computer. Use a long strong pass PHRASE with it. http://www.truecrypt.org/
Consider the TOR browser package and/or VPN. https://www.torproject.org/projects/torbrowser.html.en
Consider installing a NON-PERSISTENT RAMDrive program (there are free ones but i like “Primo’s”) and put a portable version of your preferred web browser program on it. https://en.wikipedia.org/wiki/List_of_RAM_drive_software
Consider using Sandboxie in the RAMDrive to isolate the browser further against “hacks”. Optionally set the program to dump and wipe the contents of the sandbox on browser close. “Eraser” can be called for a secure wipe.
Consider using “Boxcryptor” if you use online storage. https://www.boxcryptor.com/
Consider annoying your friends to setup Mozilla Thunderbird with a service like GMail and integrate GPGP4Win for secure email. http://www.enigmail.net/home/index.php
Consider annoying your friends to all get the free Keytone app from the app store for secure voice and text on your mobile phones. https://itunes.apple.com/us/app/keytone-free!/id532401119?mt=8
FR thread posted earlier:
“When the backlash comes it will be driven by Libertarians.”
I hope it’s that simple.
Fearing The Beast may pull a false-flag operation, validate all they have done and take even more freedom.