Jump to content

Talk:XKeyscore

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 71.20.55.6 (talk) at 11:30, 4 August 2013 (→‎Article seems quite undeveloped so far). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Source of the documents on Germany's access to program

Is Snowden actually the source of the documents describing Germany's ACCESS to X-Keyscore?

The wiki article says he is, and it seems to me probable that he is. But the English Der Spiegel article really isn't saying, in my reading of it. Is the German version more specific? I am not quite certain, and I am hesitant to remove that datum absent a discussion.

--71.20.55.6 (talk) 05:18, 21 July 2013 (UTC)[reply]

Source: The Guardian?

The first time XKeyScore (in this spelling) was mentioned in an article by The Guardian at 27th of June 2013. Ace von point (talk) 16:51, 21 July 2013 (UTC)[reply]

Good catch! This passing reference predates the O Globo article (which Greenwald co-wrote) considerably. 71.20.55.6 (talk) 00:56, 23 July 2013 (UTC)[reply]

Job listings for XKeyscore

Mentioning here because information on the program is pretty lacking generally.

Interesting how fast the program started to appear on publicly accessible websites after being leaked.

--71.20.55.6 (talk) 01:43, 23 July 2013 (UTC)[reply]

An article with more meat.
--71.20.55.6 (talk) 01:56, 23 July 2013 (UTC)[reply]

X-Keyscore in UK

I think it is obvious that Tempora operated by GCHQ is part of X-Keyscore. Getting a citation may be harder, but the technical description is the same. — Preceding unsigned comment added by 80.47.125.210 (talk) 03:27, 23 July 2013 (UTC)[reply]

Full program

This link refers to the full take which has the same parameters as X-Keyscore. Perhaps a reference should be made. — Preceding unsigned comment added by 80.47.125.210 (talk) 03:30, 23 July 2013

Latest from the Guardian

These new disclosures, the presentation in particular ought to expand the article significantly, and move it beyond a stub.

  • http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
  • http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation
  • No prior authorization, or FISA court order is required. All you have to do is type a justification in the box that says "justification".
  • 150 sites, and 700 servers (2008)
  • Retroactive
    • ~3 days stored 'full take' (CONTENT)
    • ~30 days metadata
  • Real time -- see new information related you query as it happens
  • Capable of VERY broad queries (all encrypted word documents in Iran)
  • Data volume prohibits forwarding of the largest queries
  • Capable of returning a broad range of queries, google maps, web searches.
  • May use actual hacking/and exploitation/malware "Show me a list of all exploitable machines in country X"
  • Another mention of Turbulence, Trafficthief and Turmoil (first revealed in 2007, in Baltimore Sun)
  • Frequently updated to allow new capabilities (update early and often)
  • Ties in with other systems: Marina, specifically
  • Exif tags. -- Very powerful. Often describe what type of camera or scanner the image was acquired from and/or the software it was edited with. In the case of smartphone pictures may have a GPS location.
  • Integration with Google Earth
  • Web interface
    • Slide XKS4-001 has a list of foreignness factors. Including "person is a user of storage media seized outside the US." Nothing in the list precludes US citizens from being targeted while abroad.
  • Slide XKS8-001 has a list of corporate logos. Facebook, yahoo, twitter, myspace, cnn, wikipedia, Google earth, Gmail, @mail.ru
  • Slide XKS10-001 outlines Trafficthief, Pinwale, Marina and Xkeyscore

--71.20.55.6 (talk) 18:48, 31 July 2013 (UTC)[reply]

http://www.cbsnews.com/8301-201_162-57596376/leaked-documents-give-new-insight-into-nsas-searches/

http://www.newyorker.com/online/blogs/closeread/2013/07/presenting-xkeyscore-what-the-nsa-is-still-hiding.html

http://securitywatch.pcmag.com/security/314336-nsa-s-gigantic-surveillance-program-xkeyscore-revealed --71.20.55.6 (talk) 06:52, 1 August 2013 (UTC)[reply]

The Five Eyes

On the top of the slide presentation is the following line: Top Secret//COMINT//Rel to USA, AUS, CAN, GBR, NZL

This is a reference to the Five Eyes alliance. Ergo: Australia, Canada, Great Britain, and New Zealand are aware of, and possibly are also users of, this program. --71.20.55.6 (talk) 07:01, 1 August 2013 (UTC)[reply]

Foreignness Criteria

  • The person has stated he is located out the US
  • Human intelligence source indicates person is located outside the US
  • The person is a user of storage media seized outside the US
  • Foreign govt indicates person is located outside the US
  • Phone number country code indicates person is located outside the US
  • Phone number is registered in a country other than US
  • SIGINT reporting confirms person is located outside the US
  • Open source information indicates person is located outside the US
  • Network machine or tech info indicates person is located outside the US
  • In direct contact w/agt overseas, no info to show proposed tgt in US

http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data

http://static.guim.co.uk/sys-images/Guardian/Pix/audio/video/2013/7/31/1375269316245/KS4-001.jpg

--71.20.55.6 (talk) 07:31, 1 August 2013 (UTC)[reply]

Article of interest

If true, this would appear to validate the Snowden's claims of suspicionless blanket domestic spying of web searches.

A woman in Brooklyn received a visit from Authorities after researching pressure cookers. Combined with her son's news searches on the Boston bombers, and her husband's searches for backpacks.

http://www.theguardian.com/world/2013/aug/01/new-york-police-terrorism-pressure-cooker

--71.20.55.6 (talk) 20:35, 1 August 2013 (UTC)[reply]

This case appears to be FBI and we don't know how they investigated it. Most of Snowden's claims are not true. Until now there's hardly to no evidence which proves what he claims. The same thing again with XKeyscore: that's not the super data collecting thing as the Guardian says, but only a data analysing tool. P2Peter (talk) 23:06, 1 August 2013 (UTC)[reply]
In the case above: it is indeed hard to prove at the moment, and shouldn't be moved to the body of the article yet. That said: involvement of the FBI does not preclude the use of XKEYSCORE, nor would a "tip" from the British or others in the Five Eyes alliance, since the headers on the slideshow indicate that each intelligence is aware of its existence.
To date nearly every one of Snowden's claims has been validated, either by his documents themselves, by testimony before congress, or by additional governmental disclosures. I could go on in tremendous detail if you really want me to. I've spent some time with the documents. The slides from XKeyscore show that it is a full take system on internet content we can debate whether it has a role in acquiring the content, or is merely analyzing content acquired from other systems. A database of all Americans really is maintained by the NSA (page 3, last paragraph)[1] The NSA really is collecting a log of all your phone calls[2] [3]. The various internet companies all deny involvement in PRISM but then there are the slides to contend with[4]. There are also documents on boundless informant. [5]. His documents also back up earlier disclosures, particularly those of Thomas Drake, Bill Binney, and Mark Klein. Additional supporting material can also be found on the senate site of Ron Wyden [6].
--71.20.55.6 (talk) 00:05, 2 August 2013 (UTC)[reply]

References

An updated version of the above article mentions that the FBI actually started investigating as a result of a tip from the father's employer. I suppose that's good news. --71.20.55.6 (talk) —Preceding undated comment added 15:17, 2 August 2013 (UTC)[reply]

Reactions

First....

Wikimedia will be incrementally enabling HTTPS services. Seems important somehow.

http://blog.wikimedia.org/2013/08/01/future-https-wikimedia-projects/

---71.20.55.6 (talk) 04:45, 2 August 2013 (UTC)[reply]

Reactions and analysis by experts.

http://delimiter.com.au/2013/08/02/xkeyscore-nsa-surveillance-leaks-australian-expert-reaction/

--71.20.55.6 (talk) 05:09, 2 August 2013 (UTC)[reply]

Article seems quite undeveloped so far

There is a lot of notable info in the CNN story but I think only the NSA response has been included here? Also the New Yorker article [1] seems absent. I'll check back in the next few days and try to help out. And what's with the Guardian "interpretation"? That could be said about every news article, I think...maybe I'm wrong? May122013 (talk) 04:42, 4 August 2013 (UTC)[reply]

It could use a your help. Actually, it could use other people's help too.
  • Clarify the "revealing" section. Find out who really was First, I think Armbinder probably has first claim (i think his primary sources are public job postings and linkedin, find out more). Then the guardian had a one line log entry in an article. Next O Globo with a big reveal in Latin America, which turned up a few documents. And then the BIG reveal in the guardian.
  • UPLOAD the rest of the images in the Guardian's article. And at least let us know where to find them. They are not subject to copyright, as they were created by the US government.
  • expansion.
  • hunt more sources regarding capabilities. That paragraph is based largely on MY reading of the slides themselves. I'm fairly geeky, but hardly a top expert.
  • hunt info about reactions and effects around the world.
  • All kinds of cleanup, grammar, wording.
  • Determine with more certainty whether the tool is used solely for analytics, or if it also plays a role in collection itself. (Im my view the slides seem to confirm Armbinder's view of it being purely analytic)
  • use info to expand the Pinwale, turbulance, marina other associated articles.
  • Determine whether and how the system ties in with PRISM, or for that matter any other known NSA tools.
  • find out what isn't mentioned above and include it, too. :)

--71.20.55.6 (talk) 11:30, 4 August 2013 (UTC)[reply]