XKeyscore:
NSA tool collects
'nearly everything a user
does on the internet'
- XKeyscore gives 'widest-reaching' collection of online data
- NSA analysts require no prior authorization for searches
- Sweeps up emails, social media activity and browsing history
- NSA's XKeyscore program – read one of the presentations
31
July, 2013
spying,
A
top secret National Security Agency program allows analysts to search
with no prior authorization through vast databases containing emails,
online chats and the browsing histories of millions of individuals,
according to documents provided by
whistleblower Edward Snowden.
The NSA boasts
in training materials that the program, called XKeyscore, is its
"widest-reaching" system for developing intelligence from
the internet.
The
latest revelations will add to the intense public and congressional
debate around the extent of NSA surveillance programs.
They come as senior intelligence officials testify to the Senate
judiciary committee on Wednesday, releasing classified documents in
response to the
Guardian's earlier stories on
bulk collection of phone records and Fisasurveillance
court oversight.
The
files shed light on one of Snowden's most controversial statements,
made in his first
video interview published by the Guardian on
June 10.
"I,
sitting at my desk," said Snowden, could "wiretap anyone,
from you or your accountant, to a federal judge or even the
president, if I had a personal email".
US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."
But
training materials for XKeyscore detail how analysts can use it and
other systems to mine enormous agency databases by filling in a
simple on-screen form giving only a broad justification for the
search. The request is not reviewed by a court or any NSA personnel
before it is processed.
XKeyscore,
the documents boast, is the NSA's "widest reaching"
system developing intelligence from computer networks – what the
agency calls Digital Network Intelligence (DNI).
One presentation claims the program covers "nearly everything a
typical user does on the internet", including the content of
emails, websites visited and searches, as well as theirmetadata.
Analysts
can also use XKeyscore and other NSA systems to obtain
ongoing "real-time" interception of an individual's
internet activity.
Under
US law, the NSA is required to obtain an
individualized Fisawarrant
only if the target of their surveillance is a 'US
person', though no such warrant is required for
intercepting the communications of Americans with foreign targets.
But XKeyscore provides the technological capability, if not the
legal authority, to target even US persons for extensive electronic
surveillance without a warrant provided that some identifying
information, such as their email or IP address, is known to the
analyst.
One
training slide illustrates the digital activity constantly being
collected by XKeyscore and the analyst's ability to query the
databases at any time.
The
purpose of XKeyscore is to allow analysts to search the metadataas
well as the content of emails and other internet activity, such as
browser history, even when there is no known email account (a
"selector" in NSA parlance) associated with the
individual being targeted.
Analysts
can also search by name, telephone number, IP address, keywords, the
language in which the internet activity was conducted or the type of
browser used.
One
document notes that this is because "strong selection [search
by email address] itself gives us only a very limited capability"
because "a large amount of time spent on the web is performing
actions that are anonymous."
The NSA documents
assert that by 2008, 300 terrorists had been captured using
intelligence from XKeyscore.
Analysts
are warned that searching the full database for content will yield
too many results to sift through. Instead they are advised to use
themetadata also stored in the databases to narrow down what to
review.
A
slide entitled "plug-ins" in a December 2012 document
describes the various fields of information that can be searched. It
includes "every email address seen in a session by both
username and domain", "every phone number seen in a
session (eg address book entries or signature block)" and user
activity – "the webmail and chat activity to include
username, buddylist, machine specific cookies etc".
Email monitoring
In
a second Guardian interview in June, Snowden elaborated on his
statement about being able to read any individual's email if he had
their email address. He said the claim was based in part on the
email search capabilities of XKeyscore, which Snowden says he was
authorized to use while working as a Booz Allen contractor for
the NSA.
One
top-secret document describes how the program "searches within
bodies of emails, webpages and documents", including the "To,
From, CC, BCC lines" and the 'Contact Us' pages on websites".
To
search for emails, an analyst using XKS enters the individual's
email address into a simple online search form, along with the
"justification" for the search and the time period for
which the emails are sought.
The
analyst then selects which of those returned emails they want to
read by opening them in NSA reading software.
The
system is similar to the way in which NSA analysts
generally can intercept the communications of anyone they select,
including, as one NSA document put it, "communications that
transit the United
States and
communications that terminate in the United States".
One
document, a top secret 2010 guide describing the training received
by NSA analysts for general surveillance under
the Fisa Amendments Act of 2008, explains that analysts
can begin surveillance on anyone by clicking a few simple pull-down
menus designed to provide both legal and targeting justifications.
Once options on the pull-down menus are selected, their target is
marked for electronic surveillance and the analyst is able to review
the content of their communications:
Chats, browsing history and other internet activity
Beyond
emails, the XKeyscore system allows analysts to monitor a virtually
unlimited array of other internet activities, including those within
social media.
An NSA tool
called DNI Presenter,
used to read the content of stored emails, also enables an analyst
using XKeyscore to read the content of Facebook chats or private
messages.
An
analyst can monitor such Facebook chats by entering the Facebook
user name and a date range into a simple search screen.
Analysts
can search for internet browsing activities using a wide range of
information, including search terms entered by the user or the
websites viewed.
As
one slide indicates, the ability to search HTTP activity by keyword
permits the analyst access to what the NSA calls "nearly
everything a typical user does on the internet".
The
XKeyscore program also allows an analyst to learn the IP addresses
of every person who visits any website the analyst specifies.
The
quantity of communications accessible through programs such as
XKeyscore is staggeringly large. One NSA report from 2007
estimated that there were 850bn "call events" collected
and stored in the NSA databases, and close to 150bn internet
records. Each day, the document says, 1-2bn records were added.
William
Binney, a former NSA mathematician, said last year that
the agency had "assembled on the order of 20tn transactions
about US citizens with other US citizens", an estimate, he
said, that "only was involving phone calls and emails". A
2010 Washington Post article reported that "every day,
collection systems at the [NSA] intercept and store 1.7bn emails,
phone calls and other type of communications."
The
XKeyscore system is continuously collecting so much internet data
that it can be stored only for short periods of time. Content
remains on the system for only three to five days, while metadata is
stored for 30 days. One document explains: "At some sites, the
amount of data we receive per day (20+ terabytes) can only be stored
for as little as 24 hours."
To
solve this problem, the NSA has created a multi-tiered
system that allows analysts to store "interesting" content
in other databases, such as one named Pinwale which can store
material for up to five years.
It
is the databases of XKeyscore, one document shows, that now contain
the greatest amount of communications data collected by the NSA.
In
2012, there were at least 41 billion total records collected and
stored in XKeyscore for a single 30-day period.
Legal
v technical restrictions
While
the Fisa Amendments Act of 2008 requires an individualized
warrant for the targeting of US persons, NSA analysts are
permitted to intercept the communications of such individuals
without a warrant if they are in contact with one of the NSA's
foreign targets.
The
ACLU's deputy legal director, Jameel Jaffer, told the Guardian last
month that national security officials expressly said that a primary
purpose of the new law was to enable them to collect large amounts
of Americans' communications without individualized warrants.
"The
government doesn't need to 'target' Americans in order to collect
huge volumes of their communications," said Jaffer. "The
government inevitably sweeps up the communications of many
Americans" when targeting foreign nationals for surveillance.
An
example is provided by one XKeyscore document showing an NSAtarget
in Tehran communicating with people in Frankfurt, Amsterdam and New
York.
In
recent years, the NSA has attempted to segregate
exclusively domestic US communications in separate databases. But
even NSA documents acknowledge that such efforts are imperfect, as
even purely domestic communications can travel on foreign systems,
and NSA tools are sometimes unable to identify the national origins
of communications.
Moreover,
all communications between Americans and someone on foreign soil are
included in the same databases as foreign-to-foreign communications,
making them readily searchable without warrants.
Some
searches conducted by NSA analysts are periodically
reviewed by their supervisors within the NSA. "It's very rare
to be questioned on our searches," Snowden told the Guardian in
June, "and even when we are, it's usually along the lines of:
'let's bulk up the justification'."
In
a letter this week to senator Ron Wyden, director of national
intelligence James Clapper acknowledged that NSA analysts
have exceeded even legal limits as interpreted by the NSA in
domestic surveillance.
Acknowledging
what he called "a number of compliance problems", Clapper
attributed them to "human error" or "highly
sophisticated technology issues" rather than "bad faith".
However,
Wyden said on the Senate floor on Tuesday: "These violations
are more serious than those stated by the intelligence community,
and are troubling."
In
a statement to the Guardian, the NSA said: "NSA's
activities are focused and specifically deployed against – and
only against – legitimate foreign intelligence targets in response
to requirements that our leaders need for information necessary to
protect our nation and its interests.
"XKeyscore
is used as a part of NSA's lawful foreign signals intelligence
collection system.
"Allegations
of widespread, unchecked analyst access to NSA collection
data are simply not true. Access to XKeyscore, as well as all
of NSA's analytic tools, is limited to only those personnel who
require access for their assigned tasks … In addition, there are
multiple technical, manual and supervisory checks and balances
within the system to prevent deliberate misuse from occurring."
"Every
search by an NSA analyst is fully auditable, to ensure
that they are proper and within the law.
"These
types of programs allow us to collect the information that enables
us to perform our missions successfully – to defend the nation and
to protect US and allied troops abroad."
No comments:
Post a Comment
Note: only a member of this blog may post a comment.