Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

XKeyscore

From Wikipedia, the free encyclopedia
(Redirected fromXKEYSCORE)


National Security Agency surveillance
Map of global NSA data collection as of 2007[update], with countries subject to the most data collection shown in red
Mass surveillance system

XKeyscore (XKEYSCORE orXKS) is a secret computer system used by the United StatesNational Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligence agencies, including theAustralian Signals Directorate, Canada'sCommunications Security Establishment, New Zealand'sGovernment Communications Security Bureau, Britain'sGovernment Communications Headquarters, Japan'sDefense Intelligence Headquarters, and Germany'sBundesnachrichtendienst.[1]

In July 2013,Edward Snowden publicly revealed the program's purpose and use by the NSA inThe Sydney Morning Herald andO Globo newspapers. The code name was already public knowledge because it was mentioned in earlier articles, and, like many other code names, it appears in job postings and onlinerésumés of employees.[2][3]

On July 3, 2014, Germanpublic broadcasterNorddeutscher Rundfunk, a member ofARD, published excerpts of XKeyscore's source code.[4][5]

Scope and functioning

[edit]
Part ofa series on
Global surveillance
Disclosures
Systems
Selected agencies
Places
Laws
Proposed changes
Concepts
Related topics

XKeyscore is a complicated system, and various authors have different interpretations of its actual capabilities.Edward Snowden andGlenn Greenwald have said that XKeyscore is a system that enables almost unlimitedsurveillance of anyone anywhere in the world, while the NSA has claimed that usage of the system is limited and restricted.[citation needed]

According toThe Washington Post and national security reporterMarc Ambinder, XKeyscore is an NSA data-retrieval system which consists of a series of user interfaces,backend databases, servers and software that selects certain types of data andmetadata that the NSA has already collected using other methods.[6][7]

According to Snowden and Greenwald

[edit]

On January 26, 2014, the German broadcasterNorddeutscher Rundfunk asked Edward Snowden in its TV interview: "What could you do if you would use XKeyscore?" and he answered:[1]

You could read anyone's email in the world, anybody you've got an email address for. Any website: You can watch traffic to and from it. Any computer that an individual sits at: You can watch it. Any laptop that you're tracking: you can follow it as it moves from place to place throughout the world. It's a one-stop-shop for access to the NSA's information.... You can tag individuals ... Let's say you work at a major German corporation and I want access to that network, I can track your username on a website on a forum somewhere, I can track your real name, I can track associations with your friends and I can build what's called a fingerprint, which is network activity unique to you, which means anywhere you go in the world, anywhere you try to sort of hide your online presence, your identity.

According toThe Guardian'sGlenn Greenwald, low-level NSA analysts can, via systems like XKeyscore, "listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it's all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst."[8]

He added that the NSA's database of collected communications allows its analysts to listen "to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you've entered, and it also alerts them to any further activity that people connected to that email address or that IP address do in the future".[8]

According to the NSA

[edit]
Further information:SIGINT

In an official statement from July 30, 2013, the NSA said "XKeyscore is used as a part of NSA's lawful foreignsignals intelligence collection system" to legally obtain information about "legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests. ... to collect the information, that enables us to perform our missions successfully – to defend the nation and to protect U.S. and allied troops abroad."[9]In terms of access, an NSA press statement reads that there is no "unchecked analyst access to NSA collection data. Access to XKeyscore, as well as all of NSA's analytic tools, is limited to only those personnel who require access for their assigned tasks." and that there are "stringent oversight and compliance mechanisms built in at several levels. One feature is the system's ability to limit what an analyst can do with a tool, based on the source of the collection and each analyst's defined responsibilities."[10]

Workings

[edit]
XKeyscore logo
XKeyscore logo
Slide from a 2008 NSA presentation about XKeyscore, showing a world map with the locations of XKeyscore servers
Slide from a 2008 NSA presentation about XKeyscore, showing the query hierarchy

According to an NSA slide presentation about XKeyscore from 2013, it is a "DNI Exploitation System/Analytic Framework". DNI stands for Digital Network Intelligence, which means intelligence derived from internet traffic.[11]

Edward Snowden said about XKeyscore: "It's a front end search engine" in an interview with the GermanNorddeutscher Rundfunk.[12]

XKeyscore is a "piece of Linux software that is typically deployed onRed Hat servers. It uses theApache web server and stores collected data inMySQL databases".[13]

XKeyscore is considered a "passive" program, in that it listens, but does not transmit anything on the networks that it targets.[5] But it can trigger other systems, which perform "active" attacks throughTailored Access Operations which are "tipping", for example, the QUANTUM family of programs, including QUANTUMINSERT, QUANTUMHAND, QUANTUMTHEORY, QUANTUMBOT and QUANTUMCOPPER andTurbulence. These run at so-called "defensive sites" including theRamstein Air Force base in Germany,Yokota Air Base in Japan, and numerous military and non-military locations within the US. Trafficthief, a core program of Turbulence, can alert NSA analysts when their targets communicate, and trigger other software programs, so select data is "promoted" from the local XKeyscore data store to the NSA's "corporate repositories" for long term storage.[5]

Data sources

[edit]

XKeyscore consists of over 700 servers at approximately 150 sites where the NSA collects data, like "US and allied military and other facilities as well as US embassies and consulates" in many countries around the world.[14][15][16] Among the facilities involved in the program are four bases inAustralia and one inNew Zealand.[15]

According to an NSA presentation from 2008, these XKeyscore servers are fed with data from the following collection systems:[17]

  1. F6 (Special Collection Service) – joint operation of the CIA and NSA that carries out clandestine operations including espionage on foreign diplomats and leaders
  2. FORNSAT – which stands for "foreign satellite collection", and refers to intercepts from satellites
  3. SSO (Special Source Operations) – a division of the NSA that cooperates with telecommunication providers

In a single, undated slide published by Swedish media in December 2013, the following additional data sources for XKeyscore are mentioned:[18]

  1. Overhead – intelligence derived from American spy planes, drones and satellites
  2. Tailored Access Operations – a division of the NSA that deals with hacking andcyberwarfare
  3. FISA – all types of surveillance approved by theForeign Intelligence Surveillance Court
  4. Third party – foreign partners of the NSA such as the (signals) intelligence agencies of Belgium, Denmark, France, Germany, Italy, Japan, the Netherlands, Norway, Sweden, etc. However the Netherlands is out of any cooperation concerning intelligence gathering and sharing for illegal spying.

From these sources, XKeyscore stores "full-take data", which is scanned by plug-ins that extract certain types of metadata (like phone numbers, e-mail addresses, log-ins, and user activity) and indexs them in metadata tables, which can be queried by analysts. XKeyscore has been integrated withMARINA, which is NSA's database for internet metadata.[11]

However, the system continuously gets so much Internet data that it can be stored only for short periods of time. Content data remains on the system for only three to five days, while metadata is stored for up to thirty days.[19] A detailed commentary on an NSA presentation published inThe Guardian in July 2013 cites a document published in 2008 declaring that "At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours."[20]

Types of XKeyscore

[edit]

According to a document from an internal GCHQ website which was disclosed by the German magazineDer Spiegel in June 2014, there are three different types of the XKeyscore system:[21]

  • Traditional: The initial version of XKeyscore is fed with data from low-rate data signals, after being processed by the WEALTHYCLUSTER system. This traditional version is not only used by NSA but also at many intercept sites of GCHQ.
  • Stage 2: This version of XKeyscore is used for higher data rates. The data is first processed by the TURMOIL system, which sends 5% of the internet data packets to XKeyscore. GCHQ only uses this version for collection under theMUSCULAR program.
  • Deep Dive: This latest version can process internet traffic at data rates of 10 gigabits per second. Data that could be useful for intelligence purposes is then selected and forwarded by using the "GENESIS selection language". GCHQ also operates a number of Deep Dive versions of XKeyscore at three locations under the codenameTEMPORA.[22]

Capabilities

[edit]
Slide from a 2008 NSA presentation about XKeyscore, showing the differences between the various NSA database systems

For analysts, XKeyscore provides a "series of viewers for common data types", which allows them to query terabytes of raw data gathered at the aforementioned collection sites. This enables them to find targets that cannot be found by searching only the metadata, and also to do this against data sets that otherwise would have been dropped by the front-end data processing systems. According to a slide from an XKeyscore presentation, NSA collection sites select and forward less than 5% of the internet traffic to thePINWALE database for internet content.[19]

Because XKeyscore holds raw and unselected communications traffic, analysts can not only perform queries using "strong selectors" like e-mail addresses, but also using "soft selectors", like keywords, against the body texts of e-mail and chat messages and digital documents and spreadsheets in English, Arabic and Chinese.[11]

This is useful because "a large amount of time spent on the web is performing actions that are anonymous" and therefore those activities can't be found by just looking for e-mail addresses of a target. When content has been found, the analyst might be able to find new intelligence or a strong selector, which can then be used for starting a traditional search.[11]

Besides using soft selectors, analysts can also use the following other XKeyscore capabilities:[11][23]

  • Look for the usage ofGoogle Maps and terms entered into a search engine by known targets looking for suspicious things or places.
  • Look for "anomalies" without any specific person attached, like detecting the nationality of foreigners by analyzing the language used within intercepted emails. An example would be a German speaker in Pakistan. The Brazilian paperO Globo claims that this has been applied to Latin America and specifically to Colombia, Ecuador, Mexico and Venezuela.[14][24]
  • Detect people who use encryption by doing searches like "allPGP usage in Iran". The caveat given is that very broad queries can result in too much data to transmit back to the analyst.
  • Showing the usage ofvirtual private networks (VPNs) and machines that can potentially behacked viaTAO.
  • Track the source and authorship of a document that has passed through many hands.
  • On July 3, 2014ARD revealed that XKeyscore is used to closely monitor users of theTor anonymity network,[5] people who search for privacy-enhancing software on the web,[5] and readers ofLinux Journal.[25]

The Guardian revealed in 2013 that most of these things cannot be detected by other NSA tools, because they operate with strong selectors (like e-mail and IP addresses and phone numbers) and the raw data volumes are too high to be forwarded to other NSA databases.[11]

In 2008, NSA planned to add a number of new capabilities in the future including access toVoIP and other, unspecified network protocols and additional forms of metadata such asExif tags, which often includegeolocation (GPS) data.[11]

Contribution to U.S. security

[edit]

The NSA slides published inThe Guardian during 2013 claimed that XKeyscore had played a role in capturing 300 terrorists by 2008,[11] which could not be substantiated as the redacted documents do not cite instances of terrorist interventions.

A 2011 report from the NSA unit in theDagger Complex (close toGriesheim in Germany) said that XKeyscore made it easier and more efficient to target surveillance. Previously, analysis often accessed data NSA was not interested in. XKeyscore allowed them to focus on the intended topics, while ignoring unrelated data. XKeyscore also proved to be outstanding for tracking active groups associated with theAnonymous movement in Germany, because it allows for searching on patterns, rather than particular individuals. An analyst is able to determine when targets research new topics, or develop new behaviors.[26]

To create additional motivation, the NSA incorporated variousgamification features. For instance, analysts who were especially good at using XKeyscore could acquire "skilz" points and "unlock achievements." The training units in Griesheim were apparently successful and analysts there had achieved the "highest average of skilz points" compared with all other NSA departments participating in the training program.[26]

Usage by foreign partners of the NSA

[edit]

Germany

[edit]
Excerpt of an NSA document leaked byEdward Snowden that reveals theBND's usage of the NSA's XKeyscore to wiretap a German domestic target

According to documentsDer Spiegel acquired from Snowden, the German intelligence agenciesBND (foreign intelligence) andBfV (domestic intelligence) were also allowed to use the XKeyscore system. In those documents the BND agency was described as the NSA's most prolific partner in information gathering.[27] This led to political confrontations, after which the directors of the German intelligence agencies briefed members of the German parliamentary intelligence oversight committee on July 25, 2013. They declared that XKeyscore has been used by the BND since 2007 and that the BfV has been using a test version since 2012. The directors also explained that the program is not for collecting data, but rather only for the analysis of collected data.[28]

Sweden

[edit]

As part of theUKUSA Agreement, a secret treaty was signed in 1954 by Sweden with the United States, the United Kingdom, Canada, Australia and New Zealand (called theFive Eyes) for the purpose of intelligence collaboration anddata sharing.[29] According to documents leaked by Snowden, theNational Defence Radio Establishment (FRA) has been granted access to XKeyscore.[30]

Denmark

[edit]

In an ongoing scandal, where it has been revealed that NSA helped FE (Danish Defence Intelligence Service) build a new Spy datacenter at Sandagergård, Amager, XKeyscore has been made available for FE to use on the collected data.[31]

Japan

[edit]

The classified documents leaked by Snowden also indicate that in April 2013, NSA had secretly provided the XKeyscore system to theJapanese government.[32]

See also

[edit]

References

[edit]
  1. ^abSeipel, Hubert (January 26, 2014)."Sweden Interview: Transcript".Norddeutscher Rundfunk. p. 3. Archived fromthe original on January 28, 2014. RetrievedMay 6, 2019.
  2. ^Greenwald, Glenn;Ackerman, Spencer (June 27, 2013)."How the NSA Is Still Harvesting Your Online Data – Files Show Vast Scale of Current NSA Metadata Programs, with One Stream Alone Celebrating 'One Trillion Records Processed'".The Guardian.Archived from the original on August 4, 2013. RetrievedAugust 5, 2013.{{cite news}}: CS1 maint: multiple names: authors list (link)
  3. ^Layne, Ken (June 18, 2013)."Job Networking Site LinkedIn Filled With Secret NSA Program Names". Archived fromthe original on December 8, 2017. RetrievedAugust 6, 2013.
  4. ^"xkeyscorerules100".Panorama.ARD (broadcaster). July 3, 2014.Archived from the original on July 7, 2014. RetrievedJuly 4, 2014.
  5. ^abcdeJacob Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge (July 3, 2014)."NSA targets the privacy-conscious".Panorama. Norddeutscher Rundfunk.Archived from the original on July 3, 2014. RetrievedJuly 4, 2014.{{cite news}}: CS1 maint: multiple names: authors list (link)
  6. ^Nakashima, Ellen (July 31, 2013)."Newly Declassified Documents on Phone Records Program Released".The Washington Post.Archived from the original on July 2, 2014. RetrievedAugust 6, 2013.
  7. ^Fisher, Max (August 1, 2013)."Is XKeyscore Still Active? Defense Contractor Posted a Job Listing for it 2 weeks Ago". WorldViews, blog ofThe Washington Post. RetrievedAugust 6, 2013.
  8. ^abRea, Kari (July 28, 2013)."Glenn Greenwald: Low-Level NSA Analysts Have 'Powerful and Invasive' Search Tool".ABC News.Archived from the original on July 30, 2013. RetrievedAugust 4, 2013.
  9. ^Wills, Amanda (August 1, 2013)."New Snowden Leak: NSA Program Taps All You Do Online".Mashable (viaCNN).Archived from the original on August 4, 2013. RetrievedAugust 4, 2013.
  10. ^NSAPress Statement on 30 July 2013Archived August 1, 2013, at theWayback Machine
  11. ^abcdefghStaff (July 31, 2013)."XKeyscore Presentation from 2008 – Read in Full".The Guardian.Archived from the original on August 1, 2013. RetrievedAugust 6, 2013.
  12. ^"Snowden Interview Transcript".Norddeutscher Rundfunk. n.d. Archived fromthe original on January 28, 2014. RetrievedJanuary 27, 2014.
  13. ^Lee, Micah; Greenwald, Glenn; Marquis-Boire, Morgan (July 2, 2015)."A Look at the Inner Workings of NSA's XKEYSCORE".The Intercept. RetrievedJuly 2, 2020.
  14. ^abStaff (c. 2013)."No alvo dos EUA – O big-brother na América Latina e no mundo" [Targeted By The U.S. – Big Brother in Latin America and in the World].O Globo (in Portuguese). Archived fromthe original on July 12, 2013. RetrievedAugust 5, 2013.
  15. ^abDorling, Philip (July 8, 2013)."Snowden Reveals Australia's Links to US Spy Web".The Sydney Morning Herald.Archived from the original on August 10, 2013. RetrievedAugust 2, 2013.
  16. ^Greenwald, Glenn; Casado, Roberto Kaz e José (July 6, 2013)."EUA expandem o aparato de vigilância continuamente – Software de vigilância usa mais de 700 servidores espalhados pelo mundo".O Globo (in Portuguese).Archived from the original on July 10, 2013. RetrievedAugust 2, 2013.{{cite news}}: CS1 maint: multiple names: authors list (link)
  17. ^Ambinder, Marc (July 31, 2013)."What's XKEYSCORE?".The Compass (blog ofThe Week).Archived from the original on January 30, 2014. RetrievedAugust 4, 2013.
  18. ^Gunnar Rensfeldt."Read the Snowden Documents From the NSA".Sveriges Television.Archived from the original on February 9, 2014. RetrievedDecember 21, 2013.
  19. ^abSee also:3 slides about the XKeyscore programArchived February 2, 2014, at theWayback Machine
  20. ^Greenwald, Glenn (July 31, 2013)."XKeyscore: NSA tool collects 'nearly everything a user does on the internet' – XKeyscore Gives 'Widest-Reaching' Collection of Online Data – NSA Analysts Require No Prior Authorization for Searches – Sweeps Up Emails, Social Media Activity and Browsing History"Archived December 31, 2013, at theWayback Machine.The Guardian. Retrieved August 1, 2013.
  21. ^XKeyscoreTabs XKS DevelopmentArchived June 30, 2014, at theWayback Machine, published by Der Spiegel on June 18, 2014
  22. ^Der Spiegel:GCHQ report on the technical abilities of the powerful spying program TEMPORA, which allows for a "full take"Archived June 5, 2019, at theWayback Machine
  23. ^Gallagher, Sean (August 1, 2013)."NSA's Internet Taps Can Find Systems to Hack, Track VPNs and Word Docs – X-Keyscore Gives NSA the Ability to Find and Exploit Vulnerable Systems".Ars Technica.Archived from the original on August 4, 2013. RetrievedAugust 4, 2013.
  24. ^Greenwald, Glenn; Casado, Roberto Kaz e José (July 13, 2013)."Espionagem dos EUA se espalhou pela América Latina – Depois do Brasil, Colômbia foi o país mais vigiado – Venezuela também entrou na mira de programas americanos" [U.S. Spying Spread Through Latin America – After Brazil, Colombia Was the Most Watched Country – Venezuela Also Came in the Crosshairs of American Programs].O Globo (in Portuguese).Archived from the original on July 15, 2013. RetrievedAugust 5, 2013.{{cite web}}: CS1 maint: multiple names: authors list (link)
  25. ^Kyle Rankin (July 3, 2014)."NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance".Archived from the original on July 3, 2014. RetrievedJuly 3, 2014.
  26. ^abLaura Poitras, Marcel Rosenbach and Holger Stark,Ally and Target: US Intelligence Watches Germany CloselyArchived August 20, 2013, at theWayback Machine, August 12, 2013.
  27. ^"German Intelligence Agencies Used NSA Spying Program".Der Spiegel. July 20, 2013.ISSN 2195-1349. RetrievedSeptember 14, 2024.
  28. ^Top Level Telecommunications,New slides about NSA collection programsArchived July 26, 2013, at theWayback Machine, July 16, 2013
  29. ^"Cold War treaty confirms Sweden was not neutral".The Local.Archived from the original on December 11, 2013. RetrievedDecember 12, 2013.
  30. ^Gunnar Rensfeldt."Read the Snowden Documents From the NSA".Sveriges Television.Archived from the original on February 9, 2014. RetrievedDecember 12, 2013.
  31. ^"Ny afsløring: FE masseindsamler oplysninger om danskere gennem avanceret spionsystem".DR (in Danish). September 24, 2020. RetrievedSeptember 24, 2020.
  32. ^Ryan Gallagher (April 24, 2017)."Japan made secret deals with the NSA that expanded global surveillance".Archived from the original on April 24, 2017. RetrievedApril 24, 2017.

External links

[edit]
Wikimedia Commons has media related toXKeyscore.
Locations
Leaders
Divisions
Technology
Controversy
Programs
Databases
Other
Mass surveillance on citizens
Disclosures
Systems
Current
Discontinued
Stasi (Germany, 1950–1990)
Agencies
People
Laws
  • Portals: Terrorism
  • Freedoms
  • Human Rights
Retrieved from "https://en.wikipedia.org/w/index.php?title=XKeyscore&oldid=1277306523"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp