<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>spy Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<atom:link href="https://goodshepherdmedia.net/tag/spy/feed/" rel="self" type="application/rss+xml" />
	<link>https://goodshepherdmedia.net/tag/spy/</link>
	<description>Christian, Political, ‎‏‏‎Social &#38; Legal Free Speech News &#124; Ⓒ2024 Good News Media LLC &#124; Shepherd for the Herd! God 1st Programming</description>
	<lastBuildDate>Wed, 15 Jan 2025 02:27:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://goodshepherdmedia.net/wp-content/uploads/2023/08/Good-Shepherd-News-Logo-150x150.png</url>
	<title>spy Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<link>https://goodshepherdmedia.net/tag/spy/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>X-Keyscore: Allows the NSA and Allies to Monitor Emails, Web Browsing, Internet Searches and Social Media</title>
		<link>https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Fri, 24 Jan 2025 05:14:33 +0000</pubDate>
				<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[allies]]></category>
		<category><![CDATA[how to spy]]></category>
		<category><![CDATA[Internet Searches]]></category>
		<category><![CDATA[Monitor Emails]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[spy]]></category>
		<category><![CDATA[spy gate]]></category>
		<category><![CDATA[spygate]]></category>
		<category><![CDATA[USA spy]]></category>
		<category><![CDATA[Web Browsing]]></category>
		<category><![CDATA[web spying]]></category>
		<category><![CDATA[world spy]]></category>
		<category><![CDATA[X-Keyscore]]></category>
		<category><![CDATA[XKeyscore]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=6808</guid>

					<description><![CDATA[XKeyscore: NSA tool collects &#8216;nearly everything a user does on the internet&#8217; written by Glenn Greenwald cited   XKeyscore gives &#8216;widest-reaching&#8217; collection of online data  NSA analysts require no prior authorization for searches  Sweeps up emails, social media activity and browsing history A top secret National Security Agency program allows analysts to search with no prior authorization through [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="dcr-1djovmt" data-gu-name="headline">
<div class="dcr-14emo0l">
<div class="dcr-1msbrj1">
<h1></h1>
<h1 class="dcr-y70mar" style="text-align: center;">XKeyscore: NSA tool collects &#8216;nearly everything a user does on the internet&#8217;</h1>
</div>
</div>
</div>
<div style="text-align: center;">written by <a href="https://www.theguardian.com/profile/glenn-greenwald" rel="author" data-link-name="auto tag link">Glenn Greenwald</a> <a href="https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data" target="_blank" rel="noopener">cited </a></div>
<div></div>
<blockquote>
<div><span style="color: #ff0000;"> XKeyscore gives &#8216;widest-reaching&#8217; collection of online data  NSA analysts require no prior authorization for searches  Sweeps up emails, social media activity and browsing history</span></div>
</blockquote>
<div></div>
<div>
<p><iframe title="Exposing the NSA’s Mass Surveillance of Americans | Cyberwar" width="640" height="360" src="https://www.youtube.com/embed/tYVm62oEyWA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<div class="dcr-1yi1cnj" data-gu-name="standfirst">
<div class=" dcr-iuxtqj">
<div class="dcr-1yi1cnj" data-gu-name="standfirst">
<div class=" dcr-iuxtqj"></div>
</div>
<div class="dcr-6ufhd0" data-gu-name="media">
<div class="dcr-14emo0l">
<div class="dcr-ubxqwv">
<figure id="a6b7ed7c-8cd0-451d-8171-65a3e80a5649" class="dcr-142siv7">
<div class="dcr-1t8m8f2">
<figure id="attachment_6816" aria-describedby="caption-attachment-6816" style="width: 648px" class="wp-caption alignright"><img fetchpriority="high" decoding="async" class=" wp-image-6816" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010.webp" alt="One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet'" width="648" height="389" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010-300x180.webp 300w" sizes="(max-width: 648px) 100vw, 648px" /><figcaption id="caption-attachment-6816" class="wp-caption-text"><em><span style="color: #ff6600;">One presentation claims the XKeyscore program covers &#8216;nearly everything a typical user does on the internet&#8217;</span></em></figcaption></figure>
</div>
</figure>
</div>
</div>
</div>
<div class="dcr-kt8blz" data-gu-name="lines">
<div class="dcr-14emo0l"></div>
</div>
<aside class="dcr-1rbr3jc" data-gu-name="meta">
<div class="dcr-14emo0l">
<div class=" dcr-c7ke56">
<div class="dcr-rnfrqq">
<div class="dcr-9dgpdq" data-print-layout="hide">
<div class=" dcr-2zv6">
<div class="dcr-16dmhab">
<div class="meta-number">
<div class="css-pbkcyu" data-testid="long-comment-count" aria-hidden="true"></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</aside>
<div class="dcr-ch7w1w" data-gu-name="body">
<div class="dcr-i7zira">
<div id="maincontent" class="dcr-1ncmr12">
<div class="article-body-commercial-selector article-body-viewer-selector dcr-1vqv39r">
<p class="dcr-h26idz">A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.</p>
<p class="dcr-h26idz">The <a href="https://www.theguardian.com/us-news/nsa" data-component="auto-linked-tag" data-link-name="in body link">NSA</a> boasts in training materials that the program, called XKeyscore, is its &#8220;widest-reaching&#8221; system for developing intelligence from the internet.</p>
<div id="sign-in-gate"></div>
<p class="dcr-h26idz">The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to <a href="https://www.theguardian.com/world/the-nsa-files" data-link-name="in body link">the Guardian&#8217;s earlier stories</a> on bulk collection of phone records and Fisa surveillance court oversight.</p>
<div class="ad-slot-container ad-slot-container--im">
<div id="dfp-ad--im" class="js-ad-slot ad-slot ad-slot-- ad-slot--im" data-link-name="ad slot im" data-name="im" aria-hidden="true" data-label="false" data-refresh="false">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_8__container__"></div>
</div>
</div>
<p class="dcr-h26idz">The files shed light on one of Snowden&#8217;s most controversial statements, made in his <a href="https://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video" data-link-name="in body link">first video interview published by the Guardian</a> on June 10.</p>
<p class="dcr-h26idz">&#8220;I, sitting at my desk,&#8221; said Snowden, could &#8220;wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email&#8221;.</p>
<p class="dcr-h26idz">US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden&#8217;s assertion: &#8220;He&#8217;s lying. It&#8217;s impossible for him to do what he was saying he could do.&#8221;</p>
<p class="dcr-h26idz">But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.</p>
<p>&nbsp;</p>
<div id="dfp-ad--carrot" class="js-ad-slot ad-slot ad-slot--carrot" data-link-name="ad slot carrot" data-name="carrot" aria-hidden="true" data-label="false" data-refresh="false">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_16__container__">
<blockquote>
<h2 class="jeg_post_title" style="text-align: center;"><span style="color: #0000ff;">XKeyScore – the NSA’s secret tool that collects and reveals ‘nearly everything a user does on the internet’</span></h2>
</blockquote>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="dcr-1yi1cnj" data-gu-name="standfirst">
<div class=" dcr-iuxtqj">
<div class="dcr-ch7w1w" data-gu-name="body">
<div class="dcr-i7zira">
<div id="maincontent" class="dcr-1ncmr12">
<div class="article-body-commercial-selector article-body-viewer-selector dcr-1vqv39r">
<div id="dfp-ad--carrot" class="js-ad-slot ad-slot ad-slot--carrot" data-link-name="ad slot carrot" data-name="carrot" aria-hidden="true" data-label="false" data-refresh="false">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_16__container__">
<blockquote>
<blockquote><p>&nbsp;</p></blockquote>
</blockquote>
<h1><img decoding="async" class="size-full wp-image-6839 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/thumb-5.jpg" alt="" width="640" height="420" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/thumb-5.jpg 640w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/thumb-5-300x197.jpg 300w" sizes="(max-width: 640px) 100vw, 640px" /></h1>
</div>
</div>
<p class="dcr-h26idz">XKeyscore, the documents boast, is the NSA&#8217;s &#8220;widest reaching&#8221; system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers &#8220;nearly everything a typical user does on the internet&#8221;, including the content of emails, websites visited and searches, as well as their metadata.</p>
<p class="dcr-h26idz">Analysts can also use XKeyscore and other NSA systems to obtain ongoing &#8220;real-time&#8221; interception of an individual&#8217;s internet activity.</p>
<p class="dcr-h26idz">Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a &#8216;US person&#8217;, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.</p>
<p class="dcr-h26idz">One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst&#8217;s ability to query the databases at any time.</p>
<figure id="39187de4-7a62-46be-a900-2974c4f3e73b" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6817" aria-describedby="caption-attachment-6817" style="width: 460px" class="wp-caption alignright"><img decoding="async" class="size-full wp-image-6817" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001.webp" alt="Photograph: Guardian" width="460" height="347" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001-300x226.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6817" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz">The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a &#8220;selector&#8221; in NSA parlance) associated with the individual being targeted.</p>
<div class="ad-slot-container ">
<div id="dfp-ad--inline1" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline1" data-link-name="ad slot inline1" data-name="inline1" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_9__container__"></div>
</div>
</div>
<p class="dcr-h26idz">Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.</p>
<p class="dcr-h26idz">One document notes that this is because &#8220;strong selection [search by email address] itself gives us only a very limited capability&#8221; because &#8220;a large amount of time spent on the web is performing actions that are anonymous.&#8221;</p>
<p class="dcr-h26idz">The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.</p>
<p class="dcr-h26idz">Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.</p>
<p class="dcr-h26idz">A slide entitled &#8220;plug-ins&#8221; in a December 2012 document describes the various fields of information that can be searched. It includes &#8220;every email address seen in a session by both username and domain&#8221;, &#8220;every phone number seen in a session (eg address book entries or signature block)&#8221; and user activity – &#8220;the webmail and chat activity to include username, buddylist, machine specific cookies etc&#8221;.</p>
<h2 id="email-monitoring">Email monitoring</h2>
<div class="ad-slot-container ad-slot-container-2 offset-right ad-slot--offset-right ad-slot-container--offset-right">
<div id="dfp-ad--inline2" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline2" data-link-name="ad slot inline2" data-name="inline2" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_10__container__"></div>
</div>
</div>
<p class="dcr-h26idz">In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual&#8217;s email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.</p>
<p class="dcr-h26idz">One top-secret document describes how the program &#8220;searches within bodies of emails, webpages and documents&#8221;, including the &#8220;To, From, CC, BCC lines&#8221; and the &#8216;Contact Us&#8217; pages on websites&#8221;.</p>
<p class="dcr-h26idz">To search for emails, an analyst using XKS enters the individual&#8217;s email address into a simple online search form, along with the &#8220;justification&#8221; for the search and the time period for which the emails are sought.</p>
<figure id="6f7527ef-7d35-49c9-b75f-448055cdb0bb" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6818" aria-describedby="caption-attachment-6818" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6818" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001.webp" alt="Photograph: Guardian" width="460" height="314" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001-300x205.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6818" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<figure id="96e72c9e-88f5-4c5f-b2ea-daf2e6cbaadd" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<div class="mceTemp"></div>
<figure id="attachment_6819" aria-describedby="caption-attachment-6819" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6819" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001.webp" alt="Photograph: Guardian" width="460" height="345" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001-300x225.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6819" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<div class="ad-slot-container ad-slot-container-3 offset-right ad-slot--offset-right ad-slot-container--offset-right">
<div id="dfp-ad--inline3" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline3" data-link-name="ad slot inline3" data-name="inline3" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_11__container__"></div>
</div>
</div>
<p class="dcr-h26idz">The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.</p>
<p class="dcr-h26idz">The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, &#8220;communications that transit the United States and communications that terminate in the United States&#8221;.</p>
<p class="dcr-h26idz">One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:</p>
<figure id="3b5403ae-d94a-417f-9823-9a6385cd0581" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6820" aria-describedby="caption-attachment-6820" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6820" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001.webp" alt="Photograph: Guardian" width="460" height="353" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001-300x230.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6820" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<h2 id="chats-browsing-history-and-other-internet-activity">Chats, browsing history and other internet activity</h2>
<p class="dcr-h26idz">Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.</p>
<p class="dcr-h26idz">An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.</p>
<figure id="f23d3d68-a7fa-4fee-a7d2-80557f73560c" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6815" aria-describedby="caption-attachment-6815" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6815" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001.webp" alt="Photograph: Guardian" width="460" height="333" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001-300x217.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6815" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<div class="ad-slot-container ad-slot-container-4 offset-right ad-slot--offset-right ad-slot-container--offset-right">
<div id="dfp-ad--inline4" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline4" data-link-name="ad slot inline4" data-name="inline4" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_12__container__"></div>
</div>
</div>
<p class="dcr-h26idz">An analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.</p>
<figure id="d930b8e7-5acf-4dda-93b2-35ec2ddeee63" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6821" aria-describedby="caption-attachment-6821" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6821" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001.webp" alt="Photograph: Guardian" width="460" height="314" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001-300x205.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6821" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz">Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed.</p>
<figure id="e140f8b1-b46b-439d-b01c-74dc6f9f3a55" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6822" aria-describedby="caption-attachment-6822" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6822" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001.webp" alt="Photograph: Guardian" width="460" height="329" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001-300x215.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6822" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz">As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls &#8220;nearly everything a typical user does on the internet&#8221;.</p>
<figure id="8d77ef1c-3621-40c0-bd0f-f2e05728c522" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6823" aria-describedby="caption-attachment-6823" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6823" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001.webp" alt="Photograph: Guardian" width="460" height="324" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001-300x211.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6823" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<div class="ad-slot-container ad-slot-container-5 offset-right ad-slot--offset-right ad-slot-container--offset-right">
<div id="dfp-ad--inline5" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline5" data-link-name="ad slot inline5" data-name="inline5" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_13__container__"></div>
</div>
</div>
<p class="dcr-h26idz">The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.</p>
<figure id="00c1e536-a688-4f21-802d-4939523a6e05" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6811" aria-describedby="caption-attachment-6811" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6811" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001.webp" alt="Photograph: Guardian" width="460" height="258" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001-300x168.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6811" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz">The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn &#8220;call events&#8221; collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.</p>
<p class="dcr-h26idz">William Binney, a former NSA mathematician, said last year that the agency had &#8220;assembled on the order of 20tn transactions about US citizens with other US citizens&#8221;, an estimate, he said, that &#8220;only was involving phone calls and emails&#8221;. A 2010 Washington Post article reported that &#8220;every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications.&#8221;</p>
<p class="dcr-h26idz">The XKeyscore system is continuously collecting so much internet data that it can be stored only for short periods of time. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: &#8220;At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.&#8221;</p>
<p class="dcr-h26idz">To solve this problem, the NSA has created a multi-tiered system that allows analysts to store &#8220;interesting&#8221; content in other databases, such as one named Pinwale which can store material for up to five years.</p>
<p class="dcr-h26idz">It is the databases of XKeyscore, one document shows, that now contain the greatest amount of communications data collected by the NSA.</p>
<figure id="7e4f1ce3-2465-4b56-b5bf-56b8682a6ede" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6812" aria-describedby="caption-attachment-6812" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6812" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001.webp" alt="Photograph: Guardian" width="460" height="325" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001-300x212.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6812" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<div class="ad-slot-container ad-slot-container-6 offset-right ad-slot--offset-right ad-slot-container--offset-right">
<div id="dfp-ad--inline6" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline6" data-link-name="ad slot inline6" data-name="inline6" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_14__container__"></div>
</div>
</div>
<p class="dcr-h26idz">In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.</p>
<figure id="c1a585ad-590e-41fa-ac56-44338f6f3b94" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6813" aria-describedby="caption-attachment-6813" style="width: 481px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class=" wp-image-6813" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS11-002.webp" alt="Photograph: Guardian" width="481" height="409" /><figcaption id="caption-attachment-6813" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz"><strong>Legal v technical restrictions</strong></p>
<p class="dcr-h26idz">While the Fisa Amendments Act of 2008 requires an individualized warrant for the targeting of US persons, NSA analysts are permitted to intercept the communications of such individuals without a warrant if they are in contact with one of the NSA&#8217;s foreign targets.</p>
<p class="dcr-h26idz">The ACLU&#8217;s deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans&#8217; communications without individualized warrants.</p>
<p class="dcr-h26idz">&#8220;The government doesn&#8217;t need to &#8216;target&#8217; Americans in order to collect huge volumes of their communications,&#8221; said Jaffer. &#8220;The government inevitably sweeps up the communications of many Americans&#8221; when targeting foreign nationals for surveillance.</p>
<p class="dcr-h26idz">An example is provided by one XKeyscore document showing an NSA target in Tehran communicating with people in Frankfurt, Amsterdam and New York.</p>
<figure id="ed3b735f-ff29-417c-9753-dfc157d41ab8" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6814" aria-describedby="caption-attachment-6814" style="width: 714px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class=" wp-image-6814" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001.webp" alt="Photograph: Guardian" width="714" height="399" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001-300x168.webp 300w" sizes="(max-width: 714px) 100vw, 714px" /><figcaption id="caption-attachment-6814" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz">In recent years, the NSA has attempted to segregate exclusively domestic US communications in separate databases. But even NSA documents acknowledge that such efforts are imperfect, as even purely domestic communications can travel on foreign systems, and NSA tools are sometimes unable to identify the national origins of communications.</p>
<p class="dcr-h26idz">Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.</p>
<p class="dcr-h26idz">Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. &#8220;It&#8217;s very rare to be questioned on our searches,&#8221; Snowden told the Guardian in June, &#8220;and even when we are, it&#8217;s usually along the lines of: &#8216;let&#8217;s bulk up the justification&#8217;.&#8221;</p>
<p class="dcr-h26idz">In a letter this week to senator Ron Wyden, director of national intelligence James Clapper acknowledged that NSA analysts have exceeded even legal limits as interpreted by the NSA in domestic surveillance.</p>
<p class="dcr-h26idz">Acknowledging what he called &#8220;a number of compliance problems&#8221;, Clapper attributed them to &#8220;human error&#8221; or &#8220;highly sophisticated technology issues&#8221; rather than &#8220;bad faith&#8221;.</p>
<p class="dcr-h26idz">However, Wyden said on the Senate floor on Tuesday: &#8220;These violations are more serious than those stated by the intelligence community, and are troubling.&#8221;</p>
<p class="dcr-h26idz">In a statement to the Guardian, the NSA said: &#8220;NSA&#8217;s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.</p>
<p class="dcr-h26idz">&#8220;XKeyscore is used as a part of NSA&#8217;s lawful foreign signals intelligence collection system.</p>
<p class="dcr-h26idz">&#8220;Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA&#8217;s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.&#8221;</p>
<p class="dcr-h26idz">&#8220;Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.</p>
<p class="dcr-h26idz">&#8220;These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad.&#8221;</p>
</div>
</div>
</div>
</div>
</div>
</div>
<h1 data-testid="headline"></h1>
<hr />
<h1 style="text-align: center;" data-testid="headline"><span style="color: #ff0000;"><span style="color: #0000ff;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-6840" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/us-nsa-spying-germany.si_.jpg" alt="" width="690" height="388" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/us-nsa-spying-germany.si_.jpg 690w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/us-nsa-spying-germany.si_-300x169.jpg 300w" sizes="(max-width: 690px) 100vw, 690px" /></span></span></h1>
<h1 style="text-align: center;" data-testid="headline"><span style="color: #ff0000;"><span style="color: #0000ff;">X-</span>K<span style="color: #0000ff;">e</span>y<span style="color: #0000ff;">s</span>c<span style="color: #0000ff;">o</span>r<span style="color: #0000ff;">e<span style="color: #ff0000;">:</span></span></span><br />
<span style="color: #0000ff;">Allows the</span> <span style="color: #ff0000;">NSA</span> <span style="color: #0000ff;">and</span> <span style="color: #ff0000;">Allies</span> <span style="color: #0000ff;">to</span> <span style="color: #ff0000;">Monitor Emails</span><span style="color: #0000ff;">,<br />
</span> <span style="color: #ff0000;">Web Browsing</span><span style="color: #0000ff;">,</span> <span style="color: #ff0000;">Internet Searches</span> a<span style="color: #0000ff;">n</span>d <span style="color: #ff0000;">Social Media</span></h1>
<div class="Post-feature-subtitle-container" data-reactid="111">
<h2 class="Post-feature-subtitle" style="text-align: center;" data-reactid="112"><span style="color: #ff0000;">NSA’s Google</span> for the <span style="color: #0000ff;">World’s Private Communications</span></h2>
</div>
<h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">XKeyscore </span></h1>
<p><b>XKeyscore</b> (<b>XKEYSCORE</b> or <b>XKS</b>) is a secret computer system used by the United States <a title="National Security Agency" href="https://en.wikipedia.org/wiki/National_Security_Agency">National Security Agency</a> (NSA) for searching and analyzing global Internet data, which it collects in <a title="Real-time" href="https://en.wikipedia.org/wiki/Real-time">real time</a>. The NSA has shared XKeyscore with other intelligence agencies, including the <a title="Australian Signals Directorate" href="https://en.wikipedia.org/wiki/Australian_Signals_Directorate">Australian Signals Directorate</a>, Canada&#8217;s <a title="Communications Security Establishment" href="https://en.wikipedia.org/wiki/Communications_Security_Establishment">Communications Security Establishment</a>, New Zealand&#8217;s <a title="Government Communications Security Bureau" href="https://en.wikipedia.org/wiki/Government_Communications_Security_Bureau">Government Communications Security Bureau</a>, Britain&#8217;s <a class="mw-redirect" title="Government Communications Headquarters" href="https://en.wikipedia.org/wiki/Government_Communications_Headquarters">Government Communications Headquarters</a>, Japan&#8217;s <a title="Defense Intelligence Headquarters" href="https://en.wikipedia.org/wiki/Defense_Intelligence_Headquarters">Defense Intelligence Headquarters</a>, and Germany&#8217;s <a class="mw-redirect" title="Bundesnachrichtendienst" href="https://en.wikipedia.org/wiki/Bundesnachrichtendienst">Bundesnachrichtendienst</a>.<sup id="cite_ref-Snowden_Interview_Transcript_1-0" class="reference"><a href="https://en.wikipedia.org/wiki/XKeyscore#cite_note-Snowden_Interview_Transcript-1">[1]</a></sup></p>
<p>In July 2013, <a title="Edward Snowden" href="https://en.wikipedia.org/wiki/Edward_Snowden">Edward Snowden</a> publicly revealed the program&#8217;s purpose and use by the NSA in <i><a title="The Sydney Morning Herald" href="https://en.wikipedia.org/wiki/The_Sydney_Morning_Herald">The Sydney Morning Herald</a></i> and <i><a title="O Globo" href="https://en.wikipedia.org/wiki/O_Globo">O Globo</a></i> newspapers. The code name was already public knowledge because it was mentioned in earlier articles, and, like many other code names, it appears in job postings and online <a title="Résumé" href="https://en.wikipedia.org/wiki/R%C3%A9sum%C3%A9">résumés</a> of employees.<sup id="cite_ref-Guardian3_2-0" class="reference"><a href="https://en.wikipedia.org/wiki/XKeyscore#cite_note-Guardian3-2">[2]</a></sup><sup id="cite_ref-StrangeCreatures_3-0" class="reference"><a href="https://en.wikipedia.org/wiki/XKeyscore#cite_note-StrangeCreatures-3">[3]</a></sup></p>
<p>On July 3, 2014, German <a title="Public broadcasting" href="https://en.wikipedia.org/wiki/Public_broadcasting">public broadcaster</a> <a title="Norddeutscher Rundfunk" href="https://en.wikipedia.org/wiki/Norddeutscher_Rundfunk">Norddeutscher Rundfunk</a>, a member of <a title="ARD (broadcaster)" href="https://en.wikipedia.org/wiki/ARD_(broadcaster)">ARD</a>, published excerpts of XKeyscore&#8217;s source code.<sup id="cite_ref-ARD_4-0" class="reference"><a href="https://en.wikipedia.org/wiki/XKeyscore#cite_note-ARD-4">[4]</a></sup> A team of experts analyzed the source code.<sup id="cite_ref-NDR_5-0" class="reference"><a href="https://en.wikipedia.org/wiki/XKeyscore#cite_note-NDR-5">[5]</a></sup> <a href="https://en.wikipedia.org/wiki/XKeyscore" target="_blank" rel="noopener">cited</a></p>
<div>
<hr />
<h1 style="text-align: center;" data-testid="headline"><img loading="lazy" decoding="async" class=" wp-image-6832 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/12225549305_1850d9c45a_b.jpg" alt="" width="541" height="415" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/12225549305_1850d9c45a_b.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/12225549305_1850d9c45a_b-300x230.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/12225549305_1850d9c45a_b-768x590.jpg 768w" sizes="(max-width: 541px) 100vw, 541px" />X-Keyscore spy program tracks &#8216;nearly all&#8217; web use</h1>
</div>
<div>
<h5 style="text-align: center;">BY <a href="https://www.smh.com.au/technology/xkeyscore-spy-program-tracks-nearly-all-web-use-20130802-hv17w.html" target="_blank" rel="noopener"><span data-testid="byline">Philip Dorling</span></a></h5>
</div>
<div>Top-secret US intelligence documents leaked by whistleblower Edward Snowden have revealed details of a key signals intelligence program used by the Australian intelligence community to harvest internet and telecommunications traffic across the Asia-Pacific region.</div>
<div>The system known as X-Keyscore allows the US National Security Agency and international partners including Australia to monitor &#8221;nearly everything a typical user does on the internet&#8221;, according to the leaked documents published by Britain&#8217;s Guardian newspaper.</div>
<div>
<figure id="attachment_6809" aria-describedby="caption-attachment-6809" style="width: 431px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-6809" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/c25ce7ebab9bf4296aa1be2a783b7eb495bb7d2a.webp" alt="X-Keyscore: Allows the NSA and allies to monitor emails, web browsing, internet searches and social media.CREDIT:MAYU KANAMORI/JESSICA HROMAS" width="431" height="243" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/c25ce7ebab9bf4296aa1be2a783b7eb495bb7d2a.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/c25ce7ebab9bf4296aa1be2a783b7eb495bb7d2a-300x169.webp 300w" sizes="(max-width: 431px) 100vw, 431px" /><figcaption id="caption-attachment-6809" class="wp-caption-text"><span style="color: #ff6600;"><em>X-Keyscore: Allows the NSA and allies to monitor emails, web browsing, internet searches and social media.CREDIT:MAYU KANAMORI/JESSICA HROMAS</em></span></figcaption></figure>
</div>
<div></div>
<div>According to classified intelligence training materials, X-Keyscore allows the NSA and its allied partners to comprehensively monitor the emails, web browsing, internet searches and social media use of targets.</div>
<div>This includes &#8221;real-time target activity [tipping]&#8221; and a &#8221;rolling buffer of three days of all unfiltered data&#8221; with the &#8221;full take&#8221; stored at collection facilities &#8211; enabling analysts to retrospectively access the communications of newly identified targets.</div>
<div>Significantly, all the secret documents are classified as available to personnel from <a href="http://www.smh.com.au/it-pro/security-it/five-eyes-spying-alliance-will-survive-edward-snowden-experts-20130718-hv0xw.html">&#8221;Five-eyes&#8221; intelligence partners</a>: the US, UK, Canada, Australia and New Zealand.</div>
<div>Australian intelligence sources recently confirmed to Fairfax Media that Australia&#8217;s electronic espionage agency, the Defence Signals Directorate, was a &#8221;full partner&#8221; in the program.</div>
<div>It is claimed that by 2008 more than 300 terrorists had been captured thanks to intelligence from X-Keyscore.</div>
<div>However, Australian intelligence sources emphasise the reach of the system for diplomatic, political and economic intelligence collection on &#8221;targets of interest across the whole Asia-Pacific&#8221; &#8211; including China, Indonesia, Malaysia, India, Sri Lanka and Pakistan.</div>
<div>Advertisement</div>
<div></div>
<div>Documents previously disclosed by Mr Snowden identified Australian signals intelligence facilities at Geraldton in Western Australia, Shoal Bay near Darwin, HMAS Harman near Canberra and the US-Australian Joint Defence Facility at Pine Gap near Alice Springs as contributors to the global collection of internet and telecoms traffic under the X-Keyscore program.</div>
<div><a href="http://www.canberratimes.com.au/it-pro/government-it/australia-gets-deluge-of-us-secret-data-prompting-a-new-data-facility-20130612-2o4kf.html">Fairfax recently reported the construction of a new data storage facility</a> at HMAS Harman to support the surge in data collection by Australian intelligence agencies.</div>
<div>Last week the US House of Representatives only narrowly voted down a proposal to defund the NSA&#8217;s ability to collect electronic information, including phone call records.</div>
<div>But President Barack Obama has been forced to <a href="http://www.smh.com.au/it-pro/security-it/us-declassifies-nsa-program-as-further-disclosure-emerges-20130801-hv177.html">declassify aspects of the surveillance programs</a>.</div>
<div>Democrat senator Dianne Feinstein &#8211; the chairwoman of the US Senate intelligence committee and a staunch supporter of the wide-ranging electronic surveillance &#8211; says she is looking into reforms including greater public reporting of phone interception and meta-data collection statistics</div>
<div>Australian diplomat cables show close consultation between US and Australian officials about Mr Snowden&#8217;s disclosures. However, most details have been redacted on the grounds they would reveal confidential discussions or &#8221;comment and analysis of any implications of Snowden&#8217;s breach for Australian communications systems&#8221;.</div>
<div>NSA director General Keith Alexander, who is also Commander of the United States Cyber Command, <a href="http://www.smh.com.au/it-pro/security-it/nsa-chief-defends-surveillance-at-black-hat-security-conference-20130801-hv174.html">defended the surveillance programs this week</a> at the annual Black Hat computer security conference in Las Vegas.</div>
<div></div>
<div>
<hr />
</div>
<div>
<hr />
</div>
<div>
<div data-reactid="192">
<div class="Post-feature-title-container" data-reactid="108">
<h1 class="Post-feature-title" style="text-align: center;" data-reactid="109">XKEYSCORE</h1>
</div>
<div class="Post-feature-subtitle-container" data-reactid="111">
<h2 class="Post-feature-subtitle" style="text-align: center;" data-reactid="112">NSA’s Google for the World’s Private Communications</h2>
<p><span class="disable-staff-detail" data-reactid="171">Morgan Marquis-Boire</span>, <a class="PostByline-link" href="https://theintercept.com/staff/glenn-greenwald/" rel="author" data-reactid="173"><span data-reactid="174">Glenn Greenwald</span></a>, <a class="PostByline-link" href="https://theintercept.com/staff/micah-lee/" rel="author" data-reactid="176"><span data-reactid="177">Micah Lee</span></a> cited <a href="https://theintercept.com/2015/07/01/nsas-google-worlds-private-communications/" target="_blank" rel="noopener">theintercept.com</a></p>
</div>
<p><u>ONE OF THE</u> National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, <em>The Intercept</em> is publishing 48 top-secret and other classified documents about XKEYSCORE dated up to 2013, which shed new light on the breadth, depth and functionality of this critical spy system — one of the largest releases yet of documents provided by NSA whistleblower Edward Snowden.</p>
<p>The NSA’s XKEYSCORE program, first <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data">revealed</a> by <em>The Guardian</em>, sweeps up countless people’s Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is fed a constant flow of Internet traffic from <a href="https://web.archive.org/web/20150123062050/https://www.eff.org/files/2014/06/23/report_on_the_nsas_access_to_tempora.pdf">fiber optic cables</a> that make up the backbone of the world’s communication network, among other sources, for processing. As of 2008, the surveillance system boasted approximately 150 field sites in the United States, Mexico, Brazil, United Kingdom, Spain, Russia, Nigeria, Somalia, Pakistan, Japan, Australia, as well as many other countries, consisting of over 700 servers.</p>
<p>These servers store “full-take data” at the collection sites — meaning that they captured all of the traffic collected — and, as of 2009, stored content for 3 to 5 days and metadata for 30 to 45 days. NSA documents indicate that tens of billions of records are stored in its database. “It is a fully distributed processing and query system that runs on machines around the world,” an NSA briefing on XKEYSCORE says. “At field sites, XKEYSCORE can run on multiple computers that gives it the ability to scale in both processing power and storage.”</p>
</div>
<div class="img-wrap align-center width-fixed" data-reactid="193">
<div data-reactid="194">
<figure id="attachment_6826" aria-describedby="caption-attachment-6826" style="width: 568px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-6826" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-2.webp" alt="Illustration: Blue Delliquanti and David Axe for The Intercept" width="568" height="465" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-2.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-2-300x245.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-2-1024x838.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-2-768x628.webp 768w" sizes="(max-width: 568px) 100vw, 568px" /><figcaption id="caption-attachment-6826" class="wp-caption-text"><em><span style="color: #ff6600;">Illustration: Blue Delliquanti and David Axe for The Intercept</span></em></figcaption></figure>
</div>
</div>
<div data-reactid="195">
<p>XKEYSCORE also collects and processes Internet traffic from Americans, though NSA analysts are taught to avoid querying the system in ways that might result in spying on U.S. data. Experts and privacy activists, however, have long doubted that such exclusions are effective in preventing large amounts of American data from being swept up. One document <em>The Intercept</em> is publishing today suggests that FISA warrants have authorized “full-take” collection of traffic from at least some U.S. web forums.</p>
<p>The system is not limited to collecting web traffic. The 2013 document, “VoIP Configuration and Forwarding Read Me,” details how to forward VoIP data from XKEYSCORE into NUCLEON, NSA’s repository for voice intercepts, facsimile, video and “pre-released transcription.” At the time, it supported more than 8,000 users globally and was made up of 75 servers absorbing 700,000 voice, fax, video and tag files per day.</p>
<p>The reach and potency of XKEYSCORE as a surveillance instrument is astonishing. The <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data"><em>Guardian</em> report</a> noted that NSA itself refers to the program as its “widest reaching” system. In February of this year, <em>The Intercept</em> <a href="https://firstlook.org/theintercept/2015/02/19/great-sim-heist/">reported</a> that NSA and GCHQ hacked into the internal network of Gemalto, the world’s largest provider of cell phone SIM cards, in order to steal millions of encryption keys used to protect the privacy of cell phone communication. XKEYSCORE played a vital role in the spies’ hacking by providing government hackers access to the email accounts of Gemalto employees.</p>
<p>Numerous key NSA partners, including Canada, New Zealand and the U.K., have access to the mass surveillance databases of XKEYSCORE. In March, the <em>New Zealand Herald</em>, in partnership with <em>The Intercept</em>, <a href="https://firstlook.org/theintercept/2015/03/22/new-zealand-gcsb-spying-wto-director-general/">revealed</a> that the New Zealand government used XKEYSCORE to spy on candidates for the position of World Trade Organization director general and also members of the <a href="https://firstlook.org/theintercept/2015/03/14/new-zealand-xkeyscore-solomon-islands-nsa-targets/">Solomon Islands government</a>.</p>
<p>These newly published documents demonstrate that collected communications not only include emails, chats and web-browsing traffic, but also pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation (CNE) targeting, intercepted username and password pairs, file uploads to online services, Skype sessions and more.</p>
<h3>Bulk collection and population surveillance</h3>
<p>XKEYSCORE allows for incredibly broad surveillance of people based on perceived patterns of suspicious behavior. It is possible, for instance, to query the system to show the activities of people based on their location, nationality and websites visited. For instance, one slide displays the search “germansinpakistn,” showing an analyst querying XKEYSCORE for all <a href="https://www.documentcloud.org/documents/2116488-xks-targets-visiting-specific-websites.html#document/p1">individuals in Pakistan visiting specific German language message boards</a>.</p>
<p>As sites like Twitter and Facebook become increasingly significant in the world’s day-to-day communications (a Pew study <a href="http://www.pewinternet.org/fact-sheets/social-networking-fact-sheet/">shows</a> that 71 percent of online adults in the U.S. use Facebook), they become a critical source of surveillance data. Traffic from popular social media sites is described as “a great starting point” for tracking individuals, according to an XKEYSCORE <a href="https://www.documentcloud.org/documents/2116185-tracking-targets-on-online-social-networks.html#document/p19">presentation</a> titled “Tracking Targets on Online Social Networks.”</p>
<p>When intelligence agencies collect massive amounts of Internet traffic all over the world, they face the challenge of making sense of that data. The vast quantities collected make it difficult to connect the stored traffic to specific individuals.</p>
<p>Internet companies have also encountered this problem and have solved it by tracking their users with identifiers that are unique to each individual, often in the form of browser cookies. Cookies are small pieces of data that websites store in visitors’ browsers. They are used for a variety of purposes, including authenticating users (cookies make it possible to log in to websites), storing preferences, and uniquely tracking individuals even if they’re using the same IP address as many other people. Websites also embed code used by third-party services to collect analytics or host ads, which also use cookies to track users. According to <a href="https://www.documentcloud.org/documents/2115979-advanced-http-activity-analysis.html#document/p52">one slide</a>, “Almost all websites have cookies enabled.”</p>
<p>The NSA’s ability to piggyback off of private companies’ tracking of their own users is a vital instrument that allows the agency to trace the data it collects to individual users. It makes no difference if visitors switch to public Wi-Fi networks or connect to VPNs to change their IP addresses: the tracking cookie will follow them around as long as they are using the same web browser and fail to clear their cookies.</p>
</div>
<div class="img-wrap align-center width-fixed" data-reactid="196">
<div data-reactid="197">
<figure id="attachment_6827" aria-describedby="caption-attachment-6827" style="width: 532px" class="wp-caption alignleft"><img loading="lazy" decoding="async" class=" wp-image-6827" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-3.webp" alt="Illustration: Blue Delliquanti and David Axe for The Intercept" width="532" height="435" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-3.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-3-300x245.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-3-1024x838.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-3-768x628.webp 768w" sizes="(max-width: 532px) 100vw, 532px" /><figcaption id="caption-attachment-6827" class="wp-caption-text"><em><span style="color: #ff6600;">Illustration: Blue Delliquanti and David Axe for The Intercept</span></em></figcaption></figure>
</div>
</div>
<div data-reactid="198">
<p>Apps that run on tablets and smartphones also use analytics services that uniquely track users. Almost every time a user sees an advertisement (in an app or in a web browser), the ad network is tracking users in the same way. A <a href="https://firstlook.org/theintercept/2015/01/26/secret-badass-spy-program/">secret GCHQ and CSE program called BADASS</a>, which is similar to XKEYSCORE but with a much narrower scope, mines as much valuable information from leaky smartphone apps as possible, including unique tracking identifiers that app developers use to track their own users. In May of this year, CBC, in partnership with <em>The Intercept</em>, <a href="https://firstlook.org/theintercept/2015/05/21/nsa-five-eyes-google-samsung-app-stores-spyware/">revealed</a> that XKEYSCORE was used to track smartphone connections to the app marketplaces run by Samsung and Google. Surveillance agency analysts also use other types of traffic data that gets scooped into XKEYSCORE to track people, such as <a href="http://arstechnica.com/business/2013/12/why-nsa-spied-on-inexplicably-unencrypted-windows-crash-reports/">Windows crash reports</a>.</p>
<p>In a statement to <em>The Intercept</em>, the NSA reiterated its position that such sweeping surveillance capabilities are needed to fight the War on Terror:</p>
<p>“The U.S. Government calls on its intelligence agencies to protect the United States, its citizens, and its allies from a wide array of serious threats. These threats include terrorist plots from al-Qaeda, ISIL, and others; the proliferation of weapons of mass destruction; foreign aggression against the United States and our allies; and international criminal organizations.”</p>
<p>Indeed, one of the specific examples of XKEYSCORE applications given in the documents is spying on Shaykh Atiyatallah, an al Qaeda senior leader and Osama bin Laden confidant. A few years before his death, Atiyatallah did what many people have often done: He googled himself. He searched his various aliases, an associate and the name of his book. As he did so, all of that information was captured by XKEYSCORE.</p>
<p>XKEYSCORE has, however, also been used to spy on non-terrorist targets. The April 18, 2013 issue of the internal NSA publication Special Source Operations Weekly <a href="https://firstlook.org/theintercept/document/2015/07/01/un-secretary-general-xks/">boasts</a> that analysts were successful in using XKEYSCORE to obtain U.N. Secretary General Ban Ki-moon’s talking points prior to a meeting with President Obama.</p>
</div>
<div class="img-wrap align-center width-fixed" data-reactid="199">
<div data-reactid="200">
<figure id="attachment_6828" aria-describedby="caption-attachment-6828" style="width: 649px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-6828" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-4.webp" alt="Illustration: Blue Delliquanti and David Axe for The Intercept" width="649" height="531" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-4.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-4-300x245.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-4-1024x838.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-4-768x628.webp 768w" sizes="(max-width: 649px) 100vw, 649px" /><figcaption id="caption-attachment-6828" class="wp-caption-text"><em><span style="color: #ff6600;">Illustration: Blue Delliquanti and David Axe for The Intercept</span></em></figcaption></figure>
</div>
</div>
<div data-reactid="201">
<h3></h3>
<h3></h3>
<h3>XKEYSCORE for hacking: Easily collecting user names, passwords and much more</h3>
<p>XKEYSCORE plays a central role in how the U.S. government and its surveillance allies hack computer networks around the world. One top-secret 2009 NSA document describes how the system is used by the NSA to gather information for the Office of Tailored Access Operations, an NSA division responsible for Computer Network Exploitation (CNE) — i.e., targeted hacking.</p>
<p>Particularly in 2009, the hacking tactics enabled by XKEYSCORE would have yielded significant returns as use of encryption was less widespread than today. Jonathan Brossard, a security researcher and the CEO of Toucan Systems, told <em>The Intercept</em>: “Anyone could be trained to do this in less than one day: they simply enter the name of the server they want to hack into XKEYSCORE, type enter, and are presented login and password pairs to connect to this machine. Done. Finito.” <a href="https://firstlook.org/theintercept/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/">Previous reporting</a> by <em>The Intercept</em> revealed that systems administrators are a popular target of the NSA. “Who better to target than the person that already has the ‘keys to the kingdom?’” <span class="s1">read a 2012 post on an internal NSA discussion board.</span></p>
<p>This system enables analysts to access web mail servers with <a href="https://www.documentcloud.org/documents/2116255-using-xks-to-enable-tao.html#document/p35">remarkable ease</a>.</p>
<p>The same methods are used to steal the credentials — user names and passwords — of individual users of <a href="https://www.documentcloud.org/documents/2116268-web-forum-exploitation-using-xks.html#document/p2">message boards</a>.</p>
<p><a href="https://www.documentcloud.org/documents/2153970-osint-fusion-project.html#document/p6">Hacker forums</a> are also monitored for people selling or using exploits and other hacking tools. While the NSA is clearly monitoring to understand the capabilities developed by its adversaries, it is also monitoring locations where such capabilities can be purchased.</p>
<p>Other information gained via XKEYSCORE facilitates the remote exploitation of target computers. By extracting browser fingerprint and operating system versions from Internet traffic, the system allows analysts to quickly assess the <a href="https://www.documentcloud.org/documents/2116373-xks-intro.html#document/p24">exploitability of a target</a>. Brossard, the security researcher, said that “NSA has built an impressively complete set of automated hacking tools for their analysts to use.”</p>
<p>Given the breadth of information collected by XKEYSCORE, accessing and exploiting a target’s online activity is a matter of a few mouse clicks. Brossard explains: “The amount of work an analyst has to perform to actually break into remote computers over the Internet seems ridiculously reduced — we are talking minutes, if not seconds. Simple. As easy as typing a few words in Google.”</p>
<p>These facts bolster one of Snowden’s most controversial statements, made in his <a href="http://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video">first video interview published by <em>The Guardian</em></a> on June 9, 2013. “I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge to even the president, if I had a personal email.”</p>
<p>Indeed, training documents for XKEYSCORE repeatedly highlight how user-friendly the program is: with just a few clicks, any analyst with access to it can conduct sweeping searches simply by entering a person’s email address, telephone number, name or other identifying data. There is no indication in the documents reviewed that prior approval is needed for specific searches.</p>
<p>In addition to login credentials and other target intelligence, XKEYSCORE collects <a href="https://www.documentcloud.org/documents/2116255-using-xks-to-enable-tao.html#document/p5">router configuration information</a>, which it shares with Tailored Access Operations. The office is able to exploit routers and then feed the traffic traveling through those routers into their collection infrastructure. This allows the NSA to spy on traffic from otherwise out-of-reach networks. XKEYSCORE documents reference router configurations, and <a href="http://www.spiegel.de/media/media-35672.pdf">a document previously published by <em>Der Spiegel</em></a> shows that “active implants” can be used to “cop[y] traffic and direc[t]” it past a passive collector.</p>
<h3>XKEYSCORE for counterintelligence</h3>
<p>Beyond enabling the collection, categorization, and querying of metadata and content, XKEYSCORE has also been used to monitor the surveillance and hacking actions of foreign nation states and to gather the fruits of their hacking. <em>The Intercept</em> <a href="https://firstlook.org/theintercept/2015/02/04/demonize-prosecute-hackers-nsa-gchq-rely-intel-expertise/">previously reported</a> that NSA and its allies spy on hackers in order to collect what they collect.</p>
<p>Once the hacking tools and techniques of a foreign entity (for instance, <a href="https://www.documentcloud.org/documents/2116354-xks-for-counter-cne.html#document/p16">South Korea</a>) are identified, analysts can then extract the country’s espionage targets from XKEYSCORE, and gather information that the foreign power has managed to steal.</p>
<p>Monitoring of foreign state hackers could allow the NSA to gather techniques and tools used by foreign actors, including knowledge of zero-day exploits—software bugs that allow attackers to hack into systems, and that not even the software vendor knows about—and implants. Additionally, by monitoring vulnerability reports sent to vendors such as <a href="https://firstlook.org/theintercept/2015/06/22/nsa-gchq-targeted-kaspersky/">Kaspersky</a>, the agency could learn when exploits they were actively using need to be retired because they’ve been discovered by a third party.</p>
<h3>Seizure v. searching: Oversight, audit trail and the Fourth Amendment</h3>
<p>By the nature of how it sweeps up information, XKEYSCORE gathers communications of Americans, despite the Fourth Amendment protection against “unreasonable search and seizure” — including searching data without a warrant. The NSA says it does not target U.S. citizens’ communications without a warrant, but acknowledges that it “incidentally” collects and reads some of it without one, minimizing the information that is retained or shared.</p>
<p>But that interpretation of the law is dubious at best.</p>
<p>XKEYSCORE training documents say that the “burden is on user/auditor to comply with USSID-18 or other rules,” apparently including the British Human Rights Act (HRA), which protects the rights of U.K. citizens. U.S. Signals Intelligence Directive 18 (USSID 18) is the American directive that governs “U.S. person minimization.”</p>
<p>Kurt Opsahl, the Electronic Frontier Foundation’s general counsel, describes USSID 18 as “an attempt by the intelligence community to comply with the Fourth Amendment. But it doesn’t come from a court, it comes from the executive.”</p>
<p>If, for instance, an analyst searched XKEYSCORE for all iPhone users, this query would <a href="https://www.documentcloud.org/documents/2116130-intro-to-xks-appids-and-fingerprints.html#document/p41">violate USSID 18</a> due to the inevitable American iPhone users that would be grabbed without a warrant, as the NSA’s own training materials make clear.</p>
<p>Opsahl believes that analysts are not prevented by technical means from making queries that violate USSID 18. “The document discusses whether auditors will be happy or unhappy. This indicates that compliance will be achieved by after-the-fact auditing, not by preventing the search.”</p>
<p>Screenshots of the XKEYSCORE web-based user interface included in slides show that analysts see a prominent warning message: “This system is audited for USSID 18 and Human Rights Act compliance.” When analysts log in to the system, they see a more detailed message warning that “an audit trail has been established and will be searched” in response to HRA complaints, and as part of the USSID 18 and USSID 9 audit process.</p>
<p>Because the XKEYSCORE system does not appear to prevent analysts from making queries that would be in violation of these rules, Opsahl concludes that “there’s a tremendous amount of power being placed in the hands of analysts.” And while those analysts may be subject to audits, “at least in the short term they can still obtain information that they shouldn’t have.”</p>
<p>During a <a href="http://computefest.seas.harvard.edu/symposium">symposium</a> in January 2015 hosted at Harvard University, Edward Snowden, who spoke via video call, said that NSA analysts are “completely free from any meaningful oversight.” Speaking about the people who audit NSA systems like XKEYSCORE for USSID 18 compliance, he said, “The majority of the people who are doing the auditing are the friends of the analysts. They work in the same office. They’re not full-time auditors, they’re guys who have other duties assigned. There are a few traveling auditors who go around and look at the things that are out there, but really it’s not robust.”</p>
<p>In a statement to <em>The Intercept</em>, the NSA said:</p>
<p>“The National Security Agency’s foreign intelligence operations are 1) authorized by law; 2) subject to multiple layers of stringent internal and external oversight; and 3) conducted in a manner that is designed to protect privacy and civil liberties. As provided for by Presidential Policy Directive 28 (PPD-28), all persons, regardless of their nationality, have legitimate privacy interests in the handling of their personal information. NSA goes to great lengths to narrowly tailor and focus its signals intelligence operations on the collection of communications that are most likely to contain foreign intelligence or counterintelligence information.”</p>
</div>
</div>
<div></div>
<div></div>
<div></div>
<div>
<hr />
</div>
<div>
<h1>XKeyscore presentation from 2008 – read in full</h1>
<div id="stand-first" class="stand-first-alone" data-component="Document:standfirst_cta">Training materials for the XKeyscore program detail how analysts can use it and other systems to mine enormous agency databases and develop intelligence from the web</div>
</div>
<div></div>
<div></div>
<div><iframe src="https://beta.documentcloud.org/documents/743252-nsa-pdfs-redacted-ed?sidebar=0&amp;pdf=0" width="640" height="480"><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span><span data-mce-type="bookmark" style="display: inline-block; width: 1000px; overflow: hidden; line-height: 0;" class="mce_SELRES_start"><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span>﻿</span></iframe></div>
<div></div>
<div></div>
<div></div>
<div>
<hr />
</div>
<div></div>
<h1 style="text-align: center;">XKeyscore: NSA tool collects &#8216;nearly everything a user does on the internet&#8217;</h1>
<div style="text-align: center;">written by <a href="https://www.theguardian.com/profile/glenn-greenwald" rel="author" data-link-name="auto tag link">Glenn Greenwald</a> <a href="https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data" target="_blank" rel="noopener">cited</a></div>
<ul>
<li><strong>XKeyscore gives &#8216;widest-reaching&#8217; collection of online data</strong></li>
<li><strong>NSA analysts require no prior authorization for searches</strong></li>
<li><strong>Sweeps up emails, social media activity and browsing history</strong></li>
</ul>
<div></div>
<div></div>
<div></div>
<div></div>
<div>
<figure id="attachment_6816" aria-describedby="caption-attachment-6816" style="width: 783px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-6816" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010.webp" alt="One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet'" width="783" height="470" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010-300x180.webp 300w" sizes="(max-width: 783px) 100vw, 783px" /><figcaption id="caption-attachment-6816" class="wp-caption-text"><em><span style="color: #ff6600;">One presentation claims the XKeyscore program covers &#8216;nearly everything a typical user does on the internet&#8217;</span></em></figcaption></figure>
</div>
<div>
<div></div>
</div>
<div></div>
<div>A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.</div>
<div>The <a href="https://www.theguardian.com/us-news/nsa" data-component="auto-linked-tag" data-link-name="in body link">NSA</a> boasts in training materials that the program, called XKeyscore, is its &#8220;widest-reaching&#8221; system for developing intelligence from the internet.</div>
<div>The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to <a href="https://www.theguardian.com/world/the-nsa-files" data-link-name="in body link">the Guardian&#8217;s earlier stories</a> on bulk collection of phone records and Fisa surveillance court oversight.</div>
<div>The files shed light on one of Snowden&#8217;s most controversial statements, made in his <a href="https://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video" data-link-name="in body link">first video interview published by the Guardian</a> on June 10.</div>
<div>&#8220;I, sitting at my desk,&#8221; said Snowden, could &#8220;wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email&#8221;.</div>
<div>US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden&#8217;s assertion: &#8220;He&#8217;s lying. It&#8217;s impossible for him to do what he was saying he could do.&#8221;</div>
<div>But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.</div>
<div>XKeyscore, the documents boast, is the NSA&#8217;s &#8220;widest reaching&#8221; system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers &#8220;nearly everything a typical user does on the internet&#8221;, including the content of emails, websites visited and searches, as well as their metadata.</div>
<div>Analysts can also use XKeyscore and other NSA systems to obtain ongoing &#8220;real-time&#8221; interception of an individual&#8217;s internet activity.</div>
<div>Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a &#8216;US person&#8217;, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.</div>
<div>One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst&#8217;s ability to query the databases at any time.</div>
<div>
<figure id="attachment_6817" aria-describedby="caption-attachment-6817" style="width: 460px" class="wp-caption aligncenter"><img decoding="async" class="size-full wp-image-6817" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001.webp" alt="Photograph: Guardian" width="460" height="347" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001-300x226.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6817" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a &#8220;selector&#8221; in NSA parlance) associated with the individual being targeted.</div>
<div>Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.</div>
<div>One document notes that this is because &#8220;strong selection [search by email address] itself gives us only a very limited capability&#8221; because &#8220;a large amount of time spent on the web is performing actions that are anonymous.&#8221;</div>
<div>The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.</div>
<div>Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.</div>
<div>A slide entitled &#8220;plug-ins&#8221; in a December 2012 document describes the various fields of information that can be searched. It includes &#8220;every email address seen in a session by both username and domain&#8221;, &#8220;every phone number seen in a session (eg address book entries or signature block)&#8221; and user activity – &#8220;the webmail and chat activity to include username, buddylist, machine specific cookies etc&#8221;.</div>
<div>Email monitoring</div>
<div>In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual&#8217;s email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.</div>
<div>One top-secret document describes how the program &#8220;searches within bodies of emails, webpages and documents&#8221;, including the &#8220;To, From, CC, BCC lines&#8221; and the &#8216;Contact Us&#8217; pages on websites&#8221;.</div>
<div>To search for emails, an analyst using XKS enters the individual&#8217;s email address into a simple online search form, along with the &#8220;justification&#8221; for the search and the time period for which the emails are sought.</div>
<div></div>
<div>
<figure id="attachment_6818" aria-describedby="caption-attachment-6818" style="width: 519px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-6818" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001.webp" alt="Photograph: Guardian" width="519" height="354" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001-300x205.webp 300w" sizes="(max-width: 519px) 100vw, 519px" /><figcaption id="caption-attachment-6818" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>
<figure id="attachment_6819" aria-describedby="caption-attachment-6819" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6819" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001.webp" alt="Photograph: Guardian" width="460" height="345" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001-300x225.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6819" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div>The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.</div>
<div>The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, &#8220;communications that transit the United States and communications that terminate in the United States&#8221;.</div>
<div>One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:</div>
<div>
<figure id="attachment_6820" aria-describedby="caption-attachment-6820" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6820" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001.webp" alt="Photograph: Guardian" width="460" height="353" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001-300x230.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6820" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>Chats, browsing history and other internet activity</div>
<div>Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.</div>
<div>An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.</div>
<div>
<figure id="attachment_6815" aria-describedby="caption-attachment-6815" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6815" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001.webp" alt="Photograph: Guardian" width="460" height="333" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001-300x217.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6815" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>An analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.</div>
<div>
<figure id="attachment_6821" aria-describedby="caption-attachment-6821" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6821" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001.webp" alt="Photograph: Guardian" width="460" height="314" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001-300x205.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6821" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed.</div>
<div>
<figure id="attachment_6822" aria-describedby="caption-attachment-6822" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6822" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001.webp" alt="Photograph: Guardian" width="460" height="329" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001-300x215.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6822" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls &#8220;nearly everything a typical user does on the internet&#8221;.</div>
<div>
<figure id="attachment_6823" aria-describedby="caption-attachment-6823" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6823" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001.webp" alt="Photograph: Guardian" width="460" height="324" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001-300x211.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6823" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.</div>
<div>
<figure id="attachment_6811" aria-describedby="caption-attachment-6811" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6811" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001.webp" alt="Photograph: Guardian" width="460" height="258" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001-300x168.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6811" class="wp-caption-text"><span style="color: #ff6600;"><em>Photograph: Guardian</em></span></figcaption></figure>
</div>
<div></div>
<div>The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn &#8220;call events&#8221; collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.</div>
<div>William Binney, a former NSA mathematician, said last year that the agency had &#8220;assembled on the order of 20tn transactions about US citizens with other US citizens&#8221;, an estimate, he said, that &#8220;only was involving phone calls and emails&#8221;. A 2010 Washington Post article reported that &#8220;every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications.&#8221;</div>
<div>The XKeyscore system is continuously collecting so much internet data that it can be stored only for short periods of time. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: &#8220;At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.&#8221;</div>
<div>To solve this problem, the NSA has created a multi-tiered system that allows analysts to store &#8220;interesting&#8221; content in other databases, such as one named Pinwale which can store material for up to five years.</div>
<div>It is the databases of XKeyscore, one document shows, that now contain the greatest amount of communications data collected by the NSA.</div>
<div>
<figure id="attachment_6812" aria-describedby="caption-attachment-6812" style="width: 460px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="size-full wp-image-6812" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001.webp" alt="Photograph: Guardian" width="460" height="325" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001-300x212.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6812" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div>In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.</div>
<div>
<figure id="attachment_6813" aria-describedby="caption-attachment-6813" style="width: 596px" class="wp-caption alignleft"><img loading="lazy" decoding="async" class=" wp-image-6813" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS11-002.webp" alt="Photograph: Guardian" width="596" height="507" /><figcaption id="caption-attachment-6813" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div><strong>Legal v technical restrictions</strong></div>
<div>While the Fisa Amendments Act of 2008 requires an individualized warrant for the targeting of US persons, NSA analysts are permitted to intercept the communications of such individuals without a warrant if they are in contact with one of the NSA&#8217;s foreign targets.</div>
<div>The ACLU&#8217;s deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans&#8217; communications without individualized warrants.</div>
<div>&#8220;The government doesn&#8217;t need to &#8216;target&#8217; Americans in order to collect huge volumes of their communications,&#8221; said Jaffer. &#8220;The government inevitably sweeps up the communications of many Americans&#8221; when targeting foreign nationals for surveillance.</div>
<div>An example is provided by one XKeyscore document showing an NSA target in Tehran communicating with people in Frankfurt, Amsterdam and New York.</div>
<div>
<figure id="attachment_6814" aria-describedby="caption-attachment-6814" style="width: 460px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="size-full wp-image-6814" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001.webp" alt="Photograph: Guardian" width="460" height="257" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001-300x168.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6814" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>In recent years, the NSA has attempted to segregate exclusively domestic US communications in separate databases. But even NSA documents acknowledge that such efforts are imperfect, as even purely domestic communications can travel on foreign systems, and NSA tools are sometimes unable to identify the national origins of communications.</div>
<div>Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.</div>
<div>Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. &#8220;It&#8217;s very rare to be questioned on our searches,&#8221; Snowden told the Guardian in June, &#8220;and even when we are, it&#8217;s usually along the lines of: &#8216;let&#8217;s bulk up the justification&#8217;.&#8221;</div>
<div>In a letter this week to senator Ron Wyden, director of national intelligence James Clapper acknowledged that NSA analysts have exceeded even legal limits as interpreted by the NSA in domestic surveillance.</div>
<div>Acknowledging what he called &#8220;a number of compliance problems&#8221;, Clapper attributed them to &#8220;human error&#8221; or &#8220;highly sophisticated technology issues&#8221; rather than &#8220;bad faith&#8221;.</div>
<div>However, Wyden said on the Senate floor on Tuesday: &#8220;These violations are more serious than those stated by the intelligence community, and are troubling.&#8221;</div>
<div>In a statement to the Guardian, the NSA said: &#8220;NSA&#8217;s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.</div>
<div>&#8220;XKeyscore is used as a part of NSA&#8217;s lawful foreign signals intelligence collection system.</div>
<div>&#8220;Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA&#8217;s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.&#8221;</div>
<div>&#8220;Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.</div>
<div><iframe id="sp_message_iframe_690155" title="SP Consent Message" src="https://sourcepoint.theguardian.com/index.html?message_id=690155&amp;consentUUID=null&amp;requestUUID=fafa7c17-48b5-4fb8-8c26-3cc97bd5c5cc&amp;preload_message=true&amp;hasCsp=true&amp;version=v1" data-mce-fragment="1"></iframe></div>
<div></div>
<div></div>
<div></div>
<div>
<hr />
<h1 class="smart-header__hed smart-header__hed--size-2" style="text-align: center;">XKEYSCORE Spy Program Revealed by Snowden Still a Problem<img loading="lazy" decoding="async" class="alignnone size-full wp-image-6854" src="https://goodshepherdmedia.net/wp-content/uploads/2022/03/1625080118123-gettyimages-1185502935.webp" alt="" width="1000" height="562" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/03/1625080118123-gettyimages-1185502935.webp 1000w, https://goodshepherdmedia.net/wp-content/uploads/2022/03/1625080118123-gettyimages-1185502935-300x169.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/03/1625080118123-gettyimages-1185502935-768x432.webp 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></h1>
<p style="text-align: center;"><span class="contributor__meta__prefix">By </span><a href="https://www.vice.com/en/contributor/radhamely-de-leon">Radhamely De Leon</a> <a href="https://www.vice.com/en/article/88nmw4/xkeyscore-spy-program-revealed-by-snowden-is-still-a-problem-watchdog-says" target="_blank" rel="noopener">cited</a></p>
<blockquote>
<p style="text-align: center;"><span style="color: #ff0000;"><em>There are still significant privacy issues with an NSA spying program years after Snowden revealed its existence.</em></span></p>
<p>A government watchdog committee is facing criticism for failing to provide sufficient oversight over XKEYSCORE, an NSA surveillance program revealed by Edward Snowden in 2013.</p>
<p>The U.S. Privacy and Civil Liberties Oversight Board (PCLOB) conducted a classified investigation into XKEYSCORE, a highly classified program that the NSA uses to analyze enormous global troves of internet data and communications. That report was delivered late last year to the NSA, Congress, and other executive branch agencies along with recommendations from individual board members. One member of the board who conducted this investigation <a href="https://documents.pclob.gov/prod/Documents/Projects/4b4f65ff-0dba-444b-9c10-7e6b3fce40[%E2%80%A6]21.06.28.Member%20LeBlanc%2012333%20Unclass%20Statement.pdf" target="_blank" rel="noopener">publicly blasted the nature of the board&#8217;s investigation</a> this week, revealing the existence of the report and also blasting it.</p>
<p>“I had hoped that the former majority of the Board would have conducted a more thorough investigation of this highly-classified surveillance program that is unlikely to be scrutinized by another independent oversight authority in the near future,” Travis LeBlanc, a member of the PCLOB wrote, adding that he had &#8220;serious reservations&#8221; with the classified report.</p>
<p>According to a <a href="https://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation" target="_blank" rel="noopener">2008 presentation acquired by </a><em><a href="https://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation" target="_blank" rel="noopener">The Guardian</a></em>, <a href="https://www.vice.com/en/article/d77nvj/snowden-wasnt-lying-the-nsas-xkeyscore-program-can-spy-on-everything-you-do-online-1">XKEYSCORE</a> can collect data from all of its global servers, which at the time spanned 150 locations, using a single query. It can collect metadata from users and also use data from their internet usage to locate them.</p>
<p>LeBlanc writes that, among many things, the report failed to address any algorithmic biases that XKEYSCAPE may have or whether it had the correct compliance procedures in place.</p>
<p>According to LeBlanc, the board “refused” to follow up with any compliance reports that were deemed Questionable Intelligence Activities (QIA), which the Department of Defense defines as an action that resulted in the illegal surveillance or improper review of an individual’s communications. The amount of total QIA’s reported was redacted from the statement.</p>
<p>He also noted that he found it “concerning” that the NSA appeared to not have a written legal analysis until the board requested one in 2015 since these analyses are used to create compliance policies and procedures. The legal analysis that was provided also used decades-old cases to assert that XKEYSCAPE was being used in compliance with the Fourth Amendment.</p>
<p>According to LeBlanc, the board did not do much to investigate the system’s compliance program, which already does not require that analysts receive privacy and civil liberties and compliance training.</p>
<p>The board also failed to investigate the efficacy or cost of the program, which LeBlanc notes is one of the most “basic” parts of an oversight investigation. The 2008 presentation shows that the XKEYSCAPE already had 700 servers across the world but could be scaled even further just by adding more servers. If the NSA has continued to use XKEYSCAPE since then, there’s no telling how much the system has grown or how many people have been affected by its data collection.</p>
<p>“On these points and others, the former Board’s report unfortunately reads more like a book report summary of the XKEYSCORE program than an independent oversight analysis grappling with key concerns in this evolving technological legal landscape,” LeBlanc said in his statement.</p>
<p>LeBlanc urged them to declassify the statement for the sake of transparency as “the public is rightfully worried about secret surveillance programs,” he said.</p>
<p>According to LeBlanc, the board has made no effort to declassify the report.</p></blockquote>
</div>
<hr />
<div>
<blockquote>
<h1 class="jeg_post_title" style="text-align: center;">XKeyScore –</h1>
<h1 class="jeg_post_title" style="text-align: center;">the NSA’s secret tool that collects and reveals</h1>
<h1 class="jeg_post_title" style="text-align: center;">‘nearly everything a user does on the internet’</h1>
<p style="text-align: center;"><span class="meta_text">by</span> <a href="https://www.zmescience.com/author/tibipuiu/">Tibi Puiu</a> <a href="https://www.zmescience.com/research/discoveries/xkeyscore-the-nsas-secret-tool-mass-spying-02432/" target="_blank" rel="noopener">cited</a></p>
<div class="dcr-1yi1cnj" data-gu-name="standfirst">
<div class=" dcr-iuxtqj">
<div class="dcr-ch7w1w" data-gu-name="body">
<div class="dcr-i7zira">
<div id="maincontent" class="dcr-1ncmr12">
<div class="article-body-commercial-selector article-body-viewer-selector dcr-1vqv39r">
<div id="dfp-ad--carrot" class="js-ad-slot ad-slot ad-slot--carrot" data-link-name="ad slot carrot" data-name="carrot" aria-hidden="true" data-label="false" data-refresh="false">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_16__container__">
<blockquote><p>The waves of controversy and outrage following former CIA and NSA technical officer <a href="http://www.boomerangbeat.com/what-is-the-nsa-controversy-and-what-did-edward-snowden-leak/">Edward Snowden’s leaks</a> of details that reveal the US and British governments had been secretly deploying mass<img loading="lazy" decoding="async" class="wp-image-6849 alignright" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3.jpg" alt="" width="555" height="350" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3.jpg 1309w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3-300x189.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3-1024x646.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3-768x485.jpg 768w" sizes="(max-width: 555px) 100vw, 555px" /> surveillance programs on their citizens are far from over. Recently further details as to the extent and reach these programs possess have been uncovered, after a top secret National Security Agency program called <strong>XKeyScore</strong> was recently presented to the general public.</p>
<blockquote><p>“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.</p></blockquote>
<p>This statement made a lot of people at Washington unhappy, and unsurprising Snowden’s claim was quickly refuted by officials. On another note, Snowden – a whistle-blower and hero by one side, and a dangerous traitor from another – is <a href="http://www.policymic.com/articles/47673/snowden-nsa-leak-what-happens-to-edward-snowden-now">currently residing</a> in Moscow, Russia, after fleeing the US via Hong Kong.</p>
<p>Wouldn’t you know it, however, most recently training files for a secret software called XKeyScore have been leaked which show and demonstrate that any analyst has access to a user’s internet history (e-mails, phone number, browsing, chats, just about anything) WITHOUT the need for a warrant. US laws dictates that the NSA is required to obtain an individualized <a href="http://en.wikipedia.org/wiki/Foreign_Intelligence_Surveillance_Act">Fisa warrant</a> only if the target of their surveillance is a ‘US person’, however XKeyScore offers the technological capabilities (legal authority is blurry) for an analyst to perform any kind of digital surveillance on any user, US citizen or otherwise.These training files show how an analyst can easily access just about any digital history for a particular user through a simple point and click interface that can return valuable and relevant information to their queries. The request is not reviewed by a court or any NSA personnel before it is processed.XKeyScore has access to such a wealth of information that the analyst can retrieve relevant information simply by searching using one or a combination of the following: name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used. E-mail is of little interest, since much of the activity on the web is anonymous.The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies. As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls “nearly everything a typical user does on the internet”.</p>
<p>It’s all very easy. For instance, Snowden, who was authorized to use XKeyScore, recalls that to search for emails, an analyst using XKS enters the individual’s email address into a simple online search form, along with the “justification” for the search and the time period for which the emails are sought.</p>
<p>What this means – and these latest insights come as a confirmation – is that the NSA and surrounding agencies are storing immense amounts of data. One NSA report from 2007 estimated that there were 850bn “call events” collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added ( emails, phone calls and other type of communications). William Binney, a former NSA mathematician, said last year that the agency had “assembled on the order of 20 trillion transactions about U.S. citizens with other U.S. citizens,” an estimate, he said, that “only was involving phone calls and emails.”</p>
<p>A few years ago, <a href="https://www.zmescience.com/research/inventions/ibm-is-building-the-largest-data-array-in-the-world-120-petabytes-of-storage/">I reported</a> on ZME Science on the matter that IBM was planning to build the largest data array in the world capable of storing 120 petabytes – 60 downloads of the entire internet or 10 times bigger than any other data center in the world at present date. The contractor is unknown, but it’s easy to guess who. ZME Science also reported how <a href="https://www.zmescience.com/other/every-six-hours-the-nsa-collects-data-the-size-of-the-library-of-congress-423434/">every six hours the NSA collects data the size of the Library of Congress</a>.</p>
<p>Still, even with these resources the NSA can’t store all your data for too long, considering the humongous amount of internet connections. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: “At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.” In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.</p>
<p>In a statement to <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data">the Guardian, </a>the NSA said:</p>
<blockquote><p>“NSA’s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.”</p>
<p>“XKeyscore is used as a part of NSA’s lawful foreign signals intelligence collection system.</p>
<p>“Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.”</p>
<p>“Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.</p>
<p>“These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad.”</p></blockquote>
</blockquote>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</blockquote>
</div>
<p>&nbsp;</p>
<ul>
<li><a href="https://www.cryptomuseum.com/intel/nsa/index.htm#inter" target="_blank" rel="noopener">NSA-backdoored equipment info found OFF this website</a></li>
<li><a href="https://goodshepherdmedia.net/u-s-government-catalogue-of-cellphone-surveillance-devices-used-by-the-military-and-by-cia-nsa-fbi-and-other-intelligence-agencies/" target="_blank" rel="noopener">U.S. Government Catalogue of Cellphone Surveillance Devices</a></li>
<li><a href="https://en.wikipedia.org/wiki/Backdoor_(computing)" target="_blank" rel="noopener">Backdoors on Wikipedia</a></li>
<li><a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">National Security Agency</a></li>
<li><a href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">Central Intelligence Agency</a></li>
<li><a href="https://nsa.gov1.info/dni/index.html" target="_blank" rel="noopener">NSA EXTRACTED INFO</a></li>
<li><a href="https://www.cryptomuseum.com/" target="_blank" rel="noopener">CRYPTO MUSEUM</a></li>
<li><a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener">Edward Snowden</a></li>
<li><a href="https://goodshepherdmedia.net/can-cops-secretly-listen-to-my-phone-how-cops-can-secretly-track-your-phone/" target="_blank" rel="noopener">Stingray</a></li>
<li><a href="https://goodshepherdmedia.net/fbi-vows-not-to-use-pegasus-spyware-after-grilling-from-capitol-hill/" target="_blank" rel="noopener">Pegasus Spyware</a></li>
<li><a href="https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/" target="_blank" rel="noopener">X-Keyscore</a></li>
</ul>
<hr />
<h3 style="text-align: center;">Check out our article on the NSA SPYING SOFTWARE for CELL PHONES called Pegasus &#8211; <a href="https://goodshepherdmedia.net/fbi-vows-not-to-use-pegasus-spyware-after-grilling-from-capitol-hill/" target="_blank" rel="noopener">Pegasus spyware: FBI vows not to use after grilling from Capitol Hill</a></h3>
<p>&nbsp;</p>
<p><iframe title="Exposed: Secret Government Surveillance Tools They DON&#039;T Want You to Know About!" width="640" height="360" src="https://www.youtube.com/embed/iRYji0Q2K30?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NSA ANT Catalog &#8211; Access Network Technology &#8211; ANT Technology</title>
		<link>https://goodshepherdmedia.net/nsa-ant-catalog-access-network-technology-ant-technology/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Thu, 09 Jan 2025 23:29:10 +0000</pubDate>
				<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[United States 🇺🇸]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[Access Network]]></category>
		<category><![CDATA[Access Network Technology]]></category>
		<category><![CDATA[ANT Catalog]]></category>
		<category><![CDATA[ANT Technology]]></category>
		<category><![CDATA[Government Equipment]]></category>
		<category><![CDATA[Government Spy]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[NSA ANT Catalog]]></category>
		<category><![CDATA[spy]]></category>
		<category><![CDATA[Spy Catalog]]></category>
		<category><![CDATA[Spy Equipment]]></category>
		<category><![CDATA[Spy Hardware]]></category>
		<category><![CDATA[Spy Software]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=9563</guid>

					<description><![CDATA[NSA ANT Catalog &#8211; Access Network Technology &#8211; ANT Technology Advanced Network Technologies (ANT) is a department of the US National Security Agency (NSA), that provides tools for the NSA&#8216;s Tailored Access Operations (TAO) 1 unit and other internal and external clients. With the tools it is possible to eavesdrop on conversations (room bugging), personal computers, networks, video displays, [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>NSA ANT Catalog &#8211; Access Network Technology &#8211; ANT Technology</h1>
<p><iframe title="Who Stole the NSA&#039;s Top Secret Hacking Tools?&#x1f399;Darknet Diaries Ep. 53: Shadow Brokers" width="640" height="360" src="https://www.youtube.com/embed/Zje2Pqmh-I0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Advanced Network Technologies (ANT) is a department of the US <a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: National Security Agency (NSA)">National Security Agency (NSA)</span></a>, that provides tools for the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span>&#8216;s Tailored Access Operations (TAO) <sup><span style="color: #ff8800;">1</span></sup> unit and other internal and external clients. With the tools it is possible to eavesdrop on conversations (room bugging), personal computers, networks, video displays, and a lot more, using covertly installed hard- and software implants (covert ware). Most of it is built from commercial off-the-shelf parts (COTS).</p>
<p>Some of these products are listed in the <span class="short tooltip-red" data-balloon-pos="up" aria-label="Access Network Technology (NSA)">ANT</span> <a href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/NSA_ANT_20070108.pdf" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: Product Catalogue">Product Catalogue</span></a>, an internal <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> document that was intended for the US intelligence and law-enforcement community, and that was disclosed to the press on 29 December 2013 by an unknown source. It is believed that this source is <u>not</u> <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> whistleblower <a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: Edward Swowden">Edward Swowden</span></a>, which means there is at least one other whistleblower [3][5].</p>
<h3><span style="color: #ff0000;">➤</span> <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/NSA_ANT_20070108.pdf">Browse the NSA ANT catalog Here</a></span></h3>
<p>&nbsp;</p>
<hr />
<p><b>LOUDAUTO<img loading="lazy" decoding="async" class="size-full wp-image-9565 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/loudauto_1_small.jpg" alt="" width="298" height="199" /></b> is the codename or <i>cryptonym</i> of a <a href="https://www.cryptomuseum.com/covert/bugs/index.htm" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: covert listening device (bug)">covert listening device (bug)</span></a>, developed around 2007 by the US <a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: National Security Agency (NSA)">National Security Agency (NSA)</span></a> as part of their <a href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/NSA_ANT_20070108.pdf"><span data-balloon-pos="up" aria-label="More about: ANT product portfolio">ANT product portfolio</span></a>. The device is an audio-based RF retro reflector that should be activited (illuminated) by a strong continuous wave (CW) 1 GHz <sup><span style="color: #ff8800;">1</span></sup> radio frequency (RF) signal, beamed at it from a nearby listening post (LP).</p>
<p>&nbsp;</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">Although the device is activated by an external illumination signal, it should also be powered by local 3V DC source – typically provided by two button cells – from which it draws just 15µA. In this respect, it is a semi-passive element (SPE).</span></p>
<p>Room audio is picked up and amplified by a Knowles miniature microphone, that modulates the re-radiated illumination signal by means of Pulse Position Modulation (PPM). The re-emitted signal is received at the listening post – typically by a <span style="color: #f52e00;">CTX-4000</span> or <span style="color: #f52e00;">PHOTOANGLO</span> system – and further processed by means of <span class="short tooltip-red" data-balloon-pos="up" aria-label="Commercial Off-The-Shelf">COTS</span> equipment.</p>
<p>LOUDAUTO is part of the <span data-balloon-pos="up" aria-label="More about: ANGRYNEIGHBOR">ANGRYNEIGHBOR</span> family of <b>radar retro-reflectors</b>. In this context, the term <i>radar</i> refers to the continuous wave activation beam from the listening post, that operates in the 1-2 GHz frequency band. The processing and demodulation of the returned signal is typically done by means of a commercial spectrum analyser, such as the <span data-balloon-pos="up" aria-label="More about: Rohde &amp; Schwarz FSH-series">Rohde &amp; Schwarz FSH-series</span>, that has been enhanced with FM demodulating capabilities. In many respects, LOUDAUTO can be seen as a further development of the <span data-balloon-pos="up" aria-label="More about: CIA">CIA</span>&#8216;s <span data-balloon-pos="up" aria-label="More about: EASY CHAIR passive elements">EASY CHAIR passive elements</span>, combined with later active bugging devices, like the <span data-balloon-pos="up" aria-label="More about: SRT-52">SRT-52</span> and <span data-balloon-pos="up" aria-label="More about: SRT-56">SRT-56</span>, which also used Pulse Position Modulation (PPM).</p>
<p>Information about LOUDAUTO was first published in an internal Top Secret (TS) NSA document on 1 August 2007, that was available to the so-called five eyes countries (FVEY) <sup><span style="color: #ff8800;">2</span></sup> only. Although it was scheduled for declassification on 1 August 2032 (25 years after its inception), it was revealed to the public on 29 December 2013 by the German magazine <i>Der Spiegel</i>. The source of this leak is still unknown. <sup><span style="color: #ff8800;">3</span></sup> According to a product datasheet of 7 April 2009, the price of a single LOUDAUTO device was just US$ 30. According to that document, the <i>end processing</i> — presumably the demodulation — was still under development in 2009 [1].</p>
<hr />
<p><b>FiREWALK</b></p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;"><b><img loading="lazy" decoding="async" class="size-full wp-image-9567 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/rj45_2usb_small.jpg" alt="" width="298" height="273" />FIREWALK</b> is the codename or <i>cryptonym</i> of a covert implant, developed around 2007 by or on behalf of the US <a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: National Security Agency (NSA)">National Security Agency (NSA)</span></a> as part of their <a href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/NSA_ANT_20070108.pdf"><span data-balloon-pos="up" aria-label="More about: ANT product portfolio">ANT product portfolio</span></a>. The device is implanted into the RJ45 socket of the Ethernet interface of a <span class="short tooltip-red" data-balloon-pos="up" aria-label="Personal Computer">PC</span> or a network peripheral, and can intercept bidirectional gigabit ethernet traffic and inject data packets into the target network.</span></p>
<p>&nbsp;</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">The implant is housed inside a regular stacked RJ45/twin-<span class="short tooltip-red" data-balloon-pos="up" aria-label="Universal Serial Bus">USB</span> socket, such as the one shown in the image on the right. At the top are two <span class="short tooltip-red" data-balloon-pos="up" aria-label="Light Emitting Diode">LED</span>s and inside are the ethernet transformer and in some cases even an Ethernet Phy (eg. Broadcom).</span></p>
<p><span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> was able to manipulate this standard off-the-shelf computer part – probably somewhere in the supply chain or directly at the factory where the product was assembled – and replace the internal electronics by a miniature ARM9 / <span class="short tooltip-red" data-balloon-pos="up" aria-label="Field-Programmable Gate Array">FPGA</span> computer platform, named TRINITY [2].</p>
<p>Also implanted inside the socket, is a miniature wideband radio frequency (RF) tranceiver, named HOWLERMONKEY. It allows the implant to bypass an existing firewall or air gap protection [3].</p>
<p>The implant is suitable for 10/100/1000 Mb (gigabit) networks and intercepts all network traffic, with is then sent through a <span class="short tooltip-red" data-balloon-pos="up" aria-label="Virtual Private Network">VPN</span> tunnel, using the HOWLERMONKEY <span class="short tooltip-red" data-balloon-pos="up" aria-label="Radio Frequency">RF</span> module. If the distance between the target network and the node to the Remote Operations Center (ROC) is too large, other implants in the same building may be used to relay the signal. The implant can also be used to insert data packets into the target network. The diagram below shows the construction.</p>
<div class="tooltip-red" data-balloon-pos="up" aria-label="Artist impression of the NSA's FIREWALK network implant. Copyright Crypto Museum." data-balloon-length="large"><img loading="lazy" decoding="async" class=" wp-image-9566 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/nsa-spy-gear.png" alt="" width="476" height="325" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/nsa-spy-gear.png 744w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/nsa-spy-gear-300x205.png 300w" sizes="(max-width: 476px) 100vw, 476px" /></div>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">At the left are the RJ45 and twin-<span class="short tooltip-red" data-balloon-pos="up" aria-label="Universal Serial Bus">USB</span> sockets, with two <span class="short tooltip-red" data-balloon-pos="up" aria-label="Light Emitting Diode">LED</span> indicators at the top. Immediately behind the sockets is a <span class="short tooltip-red" data-balloon-pos="up" aria-label="Printed Circuit Board">PCB</span> with the power circuitry. At the back is the actual <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> FIREWALK implant, which is built around a TRINITY multi-chip module, consisting of an 180 MHz <span class="short tooltip-red" data-balloon-pos="up" aria-label="Advanced RISC Machines">ARM</span>9 microcontroller, an <span class="short tooltip-red" data-balloon-pos="up" aria-label="Field-Programmable Gate Array">FPGA</span> with 1 million gates, 96 MB <span class="short tooltip-red" data-balloon-pos="up" aria-label="Synchronous Dynamic Random-Access Memory">SDRAM</span> and 4 MB Flash memory. The latter contains the firmware, which can be tailored for a specific application or operation. In practice, the firmware would filter the network packets and relay the desired ones to the NSA&#8217;s <span class="short tooltip-red" data-balloon-pos="up" aria-label="Remote Operations Center">ROC</span>, using a nearby <span class="short tooltip-red" data-balloon-pos="up" aria-label="Radio Frequency">RF</span> node (outside the building) and the internet to transport the intercepted data <a href="https://www.cryptomuseum.com/covert/bugs/nsaant/firewalk/index.htm#ref_1">[1]</a>.</span></p>
<p>The above information was taken from original <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> datasheets from January 2007, that were disclosed to the press in 2013 by former <span class="short" aria-label="Central Intelligence Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">CIA </a></span>/ <a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener"><span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up">NSA</span> </a>contractor <a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: Edward Snowden">Edward Snowden</span></a>. The items were developed by, or on behalf of, the cyber-warfare intelligence-gathering unit of the <a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener"><span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up">NSA</span></a>, known as The Office of Tailored Access Operations (TAO), since renamed Computer Network Operations <a href="https://www.cryptomuseum.com/covert/bugs/nsaant/firewalk/index.htm#ref_4">[4]</a>.</p>
<p>&nbsp;</p>
<hr />
<p><b>Cryptonyms</b></p>
<p>All products in the ANT catalogue are identified by a codeword or <i>cryptonym</i>, which is sometimes abbreviated. At present, the following ANT cryptonyms are known:</p>
<h3>NSA Spy Gear</h3>
<ul>
<li>ANGRYNEIGHBOR</li>
<li>CANDYGRAM</li>
<li>CROSSBEAM</li>
<li>CTX4000</li>
<li>CYCLONE Hx9</li>
<li>DEITYBOUNCE</li>
<li>DROPOUTJEEP</li>
<li>EBSR</li>
<li>ENTOURAGE</li>
<li>FEEDTROUGH</li>
<li>GENESIS</li>
<li>GINSU</li>
<li>GODSURGE</li>
<li>GOPHERSET</li>
<li>COTTONMOUTH-I</li>
<li>COTTONMOUTH-II</li>
<li>COTTONMOUTH-III</li>
</ul>
<ul>
<li>FIREWALK</li>
<li>GOURMETTROUGH</li>
<li>HALLUXWATER</li>
<li>HEADWATER</li>
<li>HOWLERMONKEY</li>
<li>IRATEMONK</li>
<li>IRONCHEF</li>
<li>JETPLOW</li>
<li>JUNIORMINT</li>
<li>LOUDAUTO</li>
<li>MAESTRO-II</li>
<li>MONKEYCALENDAR</li>
<li>NEBULA</li>
<li>NIGHTSTAND</li>
<li>NIGHTWATCH</li>
<li>PHOTOANGLO</li>
<li>PICASSO</li>
</ul>
<ul>
<li>RAGEMASTER</li>
<li>SCHOOLMONTANA</li>
<li>SIERRAMONTANA</li>
<li>SOMBERKNAVE</li>
<li>SOUFFLETROUGH</li>
<li>SPARROW II</li>
<li>STUCCOMONTANA</li>
<li>SURLYSPAWN</li>
<li>SWAP</li>
<li>TOTECHASER</li>
<li>TOTEGHOSTLY</li>
<li>TAWDRYYARD</li>
<li>TRINITY</li>
<li>TYPHON HX</li>
<li>WATERWITCH</li>
<li>WISTFULTOLL</li>
</ul>
<h3>Room surveillance</h3>
<ul>
<li>CTX-4000</li>
<li><a href="https://www.cryptomuseum.com/covert/bugs/nsaant/loudauto/index.htm">LOUDAUTO</a></li>
<li>NIGHTWATCH</li>
<li>PHOTOANGLO</li>
<li>TAWDRYYARD</li>
</ul>
<p><b>Documentation</b><img loading="lazy" decoding="async" src="https://www.cryptomuseum.com/img/blank.gif" width="1" height="1" /><img loading="lazy" decoding="async" src="https://www.cryptomuseum.com/img/blank.gif" width="1" height="4" /></p>
<ol type="A">
<li><a href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/NSA_ANT_20070108.pdf" target="_blank" rel="noopener">NSA, ANT Product catalog</a><br />
8 January 2007. Obtained from <a href="https://www.cryptomuseum.com/covert/bugs/nsaant/index.htm#ref_2">[2]</a>.</li>
</ol>
<p><b>References</b></p>
<ol>
<li><a href="https://nsa.gov1.info/dni/index.htm">IC off the Record, <i>The NSA Toolbox: ANT Product Catalog</i></a><br />
29-30 December 2013.</li>
<li><a href="https://tinyurl.com/qa9vwzm">Jacob Appelbaum, Judith Horchert, Christian Stöcker, <i>Catalogue Advertises NSA Toolbox</i></a><br />
Spiegel Online. 29 December 2013.</li>
<li><a href="https://en.wikipedia.org/wiki/NSA_ANT_catalog" target="_blank" rel="noopener">Wikipedia, <i>NSA ANT catalog</i></a><br />
Retrieved November 2020.</li>
<li><a href="https://en.wikipedia.org/wiki/Tailored_Access_Operations" target="_blank" rel="noopener">Wikipedia, <i>Tailored Access Operations</i></a><br />
Retrieved November 2020.</li>
<li><a href="https://www.reuters.com/article/us-intelligence-commentary-idUSKCN10X01P" target="_blank" rel="noopener">James Bamford, <i>Commentary: Evidence points to another Snowden at the NSA</i></a><br />
Reuters, 22 August 2016.</li>
</ol>
<p><b>Further information</b></p>
<ul>
<li><a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">About the NSA</a></li>
<li><a href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">About the CIA</a></li>
<li><a href="https://www.cryptomuseum.com/covert/bugs/index.htm" target="_blank" rel="noopener">Other bugs</a></li>
</ul>
<p><a href="https://www.cryptomuseum.com/covert/bugs/nsaant/index.htm" target="_blank" rel="noopener">source</a></p>
<hr />
<h2>Backdoors &#8211; <b>Exploitable weaknesses in a cipher system</b></h2>
<p><iframe title="Exposing the NSA’s Mass Surveillance of Americans | CYBERWAR" width="640" height="360" src="https://www.youtube.com/embed/tYVm62oEyWA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Deliberate weakening of a <a href="https://www.cryptomuseum.com/crypto/index.htm"><span data-balloon-pos="up" aria-label="More about: cipher system">cipher system</span></a>, commonly known as a <i>backdoor</i>, is a technique that is used by, or on behalf of, <a href="https://www.cryptomuseum.com/intel/index.htm"><span data-balloon-pos="up" aria-label="More about: intelligence agencies">intelligence agencies</span></a> like the US <a href="https://www.cryptomuseum.com/intel/nsa/index.htm"><span data-balloon-pos="up" aria-label="More about: National Security Agency (NSA)">National Security Agency (NSA)</span></a> – and others – to make it easier for them to break the cipher and access the data. It is often thought that intelligence services have a <i><a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#master"><span data-balloon-pos="up" aria-label="Jump to: Master Key">Master Key</span></a></i> that gives them instant access to the data, but in reality it is often much more complicated, and requires the use of sophisticated computing skills.</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">In the past, intelligence services like the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> weakened the ciphers just enough to allow it to be barely broken with the computing power that was available to them (e.g. by using their vast array of Cray super computers), assuming that other parties did not have that capability. Implementing a <i>backdoor</i> is difficult and dangerous, as it might be discovered by the user — after which it can no longer be used — or by another party, in which case it can be exploited by an adversary.</span></p>
<p><iframe title="Exposed: Secret Government Surveillance Tools They DON&#039;T Want You to Know About!" width="640" height="360" src="https://www.youtube.com/embed/iRYji0Q2K30?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Below is a non-exhaustive overview of known backdoor constructions and examples:</p>
<ul>
<li>Weakening of the encryption algorithm</li>
<li>Weakening the KEY</li>
<li>Hiding the KEY in the cipher text</li>
<li>Manipulation of user instructions (manual)</li>
<li>Key generator with predictive output</li>
<li>Implementation of a hidden &#8216;unlock&#8217; key (master key)</li>
<li>Key escrow</li>
<li>Side channel attack (TEMPEST)</li>
<li>Unintended backdoors</li>
<li>Covertly installed hard- and/or software (spyware)</li>
</ul>
<h3>Weakening of the algorithm</h3>
<p>One of the most widely used types of backdoor, is weakening of the algorithm. This was done with mechanical cipher machines – such as the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: CX-52">CX-52</span></a> – electronic ones – such as the <a href="https://www.cryptomuseum.com/crypto/hagelin/h460/index.htm"><span data-balloon-pos="up" aria-label="More about: H-460">H-460</span></a> – and <a href="https://www.cryptomuseum.com/crypto/algo/index.htm"><span data-balloon-pos="up" aria-label="More about: software-based encryption">software-based encryption</span></a>. <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> often weakened the algorithm just enough to break it with the help from a super computer (e.g. Cray), assuming that adversaries did not have that capacity.</p>
<p>This solution is universal. It can be applied to mechanical, electronic and computer-based encryption systems. One of the first known examples is the weakening of the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: Hagelin CX-52">Hagelin CX-52</span></a> by <a href="https://www.cryptomuseum.com/people/jenks/peter.htm"><span data-balloon-pos="up" aria-label="More about: Peter Jenks">Peter Jenks</span></a> of the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>, in the early 1960s <a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#ref_1">[1]</a>.</p>
<p>The <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: Hagelin CX-52">Hagelin CX-52</span></a> had the problem that it was theoretically safe when used correctly. It was possible however to configure the device in such a way that it produced a short cycle, as a result of which it became easy to break. <a href="https://www.cryptomuseum.com/people/jenks/peter.htm"><span data-balloon-pos="up" aria-label="More about: Jenks">Jenks</span></a> modified the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52"><span data-balloon-pos="up" aria-label="More about: CX-52">CX-52</span></a> in such a way that it always produced a long cycle, albeit one that he could predict.</p>
<div data-balloon-pos="up" aria-label="CX-52 with open lid"><img loading="lazy" decoding="async" class=" wp-image-9589 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/1small.jpg" alt="" width="277" height="186" /></div>
<p>&nbsp;</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">The modified product was designated <b>CX-52M</b> and was marketed by <a href="https://www.cryptomuseum.com/manuf/crypto/index.htm"><span data-balloon-pos="up" aria-label="More about: Crypto AG">Crypto AG</span></a> as a new version with improved security, which customers immediately started ordering in quantities. He repeated the exercise in the mid-1960s, when <a href="https://www.cryptomuseum.com/manuf/crypto/index.htm"><span data-balloon-pos="up" aria-label="More about: Crypto AG">Crypto AG</span></a> moved from mechanical to electronic designs.</span></p>
<p>The first electronic cipher machines were built around (non)linear feedback shift registers – LFSR or NLFSR – built with the (then) newest generation of integrated circuits (ICs). This part is commonly known as the <i>crypto heart</i> or the <i>cryptologic</i>. <a href="https://www.cryptomuseum.com/people/jenks/peter.htm"><span data-balloon-pos="up" aria-label="More about: Jenks">Jenks</span></a> manipulated the shift registers in such as way that it seemed robust from the outside. Nevertheless <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> could break it, as they knew the exact nature of the built-in weakness.</p>
<p>Manipulating the cryptologic, or actually the cryptographic algorithm, requires quite some mathematical ingenuity, and is not trivial at all.<img loading="lazy" decoding="async" class=" wp-image-9590 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/2small.jpg" alt="" width="273" height="183" /></p>
<p>During the 1970s, the weaknesses were discovered by several (unwitting) <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span> employees and even by customers. <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span> usually fended them off with the excuse that the algorithm had been developed a long time ago, and that an improved version would be released soon. It should be no surprise that hiding the weaknesses became increasingly difficult over the years.</p>
<p>The same principle can be applied to software-implementations of cryptographic algorithms as well, but it has become extremely difficult to do that in such a way that it passes existing tests, such as NIST entropy-tests, and can with­stand the peer review of the academic community.</p>
<p>Another popular method for weakening a cipher system, is by shortening the effective length of the crypto KEY. The length is typically specified in <i>bits</i>, and in the 1980s, the keys of military cipher systems were typically 128 bits long, which was about twice the length that was needed.</p>
<p>&nbsp;</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">The <a href="https://www.cryptomuseum.com/crypto/algo/des/index.htm"><span data-balloon-pos="up" aria-label="More about: DES encryption algorithm">DES encryption algorithm</span></a> – that was used for bank transactions – had a key length of 56 bits. It had been developed by Horst Feistel at IBM as <i>Lucifer</i> and had been improved by <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>.</span></p>
<p>In 1983, the small Dutch company <a href="https://www.cryptomuseum.com/manuf/texttell/index.htm"><span data-balloon-pos="up" aria-label="More about: Text Lite">Text Lite</span></a>, introduced the small <a href="https://www.cryptomuseum.com/crypto/philips/px1000/index.htm"><span data-balloon-pos="up" aria-label="More about: PX-1000 pocket terminal">PX-1000 pocket terminal</span></a> shown in the image on the right. It had a built-in text editor and an acoustic modem, by which texts could be uploaded in seconds. The device used <a href="https://www.cryptomuseum.com/crypto/algo/des/index.htm"><span data-balloon-pos="up" aria-label="More about: DES encryption">DES encryption</span></a> for the protection of the text messages, which was thought to be useful for journalists and business men on the move.</p>
<div data-balloon-pos="up" aria-label="Original PX-1000 made in 1983"><img loading="lazy" decoding="async" class=" wp-image-9591 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/3small.jpg" alt="" width="272" height="183" /></div>
<p><a href="https://www.cryptomuseum.com/crypto/algo/des/index.htm"><span data-balloon-pos="up" aria-label="More about: DES">DES</span></a> was considered secure at the time. Although it might have been breakable by <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>, doing so would cost a lot of resources (i.e. computing power). With <span class="short" aria-label="Data Encryption Standard" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/crypto/algo/des/index.htm">DES</a></span> available in a consumer product for an affordable price, <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> faced a serious problem, and turned to <a href="https://www.cryptomuseum.com/crypto/philips/usfa.htm"><span data-balloon-pos="up" aria-label="More about: Philips Usfa">Philips Usfa</span></a></p>
<p>for assistence.<a href="https://www.cryptomuseum.com/crypto/philips/index.htm"><span data-balloon-pos="up" aria-label="More about: Philips">Philips</span></a> bought the entire stock of</p>
<p><a class="short" href="https://www.cryptomuseum.com/crypto/algo/des/index.htm">DES</a>-enabled devices and shipped it to the US. The product was then re-released under the Philips brand, with an algorithm that was supplied by <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>.</p>
<p>The new algorithm was a stream cipher with a key-length of no less than 64 bits. This is more than the 56 bits of <span class="short" aria-label="Data Encryption Standard" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/crypto/algo/des/index.htm">DES</a></span>, and suggested that it was a least a strong as <span class="short" aria-label="Data Encryption Standard" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/crypto/algo/des/index.htm">DES</a></span>, and probably even stronger. By reverse engineering the algorithm, Crypto Museum has meanwhile concluded that of the 64 key bits, only 32 are significant. This means that the key has effectively been halved.</p>
<div data-balloon-pos="up" aria-label="Original ROM (with DES) and replacement EPROM (with NSA algorithm)" data-balloon-length="large"><img loading="lazy" decoding="async" class=" wp-image-9588 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/4small.jpg" alt="" width="264" height="177" /></div>
<p>Does this mean that it takes only half the time to break the key? No, as each key-bit doubles the number of combinations, removing 32 bits means that it has become 4,294,967,296 times easier to break the key (2<sup>32</sup>). For example: if we assume that it takes one full year to break a 64-bit key, breaking a 32-bit key would take just 0.007 seconds. A piece of cake for <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>&#8216;s super computers.</p>
<p>Hide the KEY in the ciphertext</p>
<p>It is sometimes suggested that the cryptographic key might be hidden in the output stream (i.e. in the cipher text). Not in a readable form, of course, but when you known where to look, the key will reveal itself. Although this method is prone to discovery it has in fact been used in the past.</p>
<p>A good example of this technique is the <a href="https://www.cryptomuseum.com/crypto/hagelin/cse280/index.htm"><span data-balloon-pos="up" aria-label="More about: Hagelin CSE-280 voice encryptor">Hagelin CSE-280 voice encryptor</span></a>, that was introduced by <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span> in the early 1970s. The product had been developed in cooperation with the German cipher authority <span class="short" aria-label="Centralstelle für das Chiffrierwesen (Germany)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/zfch/index.htm">ZfCh</a></span> (part of the <span class="short" aria-label="Bundesnachrichtendienst (Germany)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/bnd/index.htm">BND</a></span>), and used forward synchro­nisation, to allow <i>late entry sync</i>.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class=" wp-image-9593 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/5small.jpg" alt="" width="273" height="183" />The key was hidden in the preample that was inserted at the beginning of each transmission. If one knew where to look, the entire key could be reconstructed. A few years after the device had been introduced, <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span>&#8216;s chief developer Peter Frutiger suddenly realised how it was done.</p>
<p>&nbsp;</p>
<p>It was only a matter of time before customers would discover it too. In 1976, the Syrians became aware of the (badly hidden) key in the preamble, and notified <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span>, where Frutiger provided them with a fix that made it instantly unbreakable. <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> was furious and Frutiger got fired for this.</p>
<div data-balloon-pos="up" aria-label="CSE-280 in metal frame"></div>
<p><img loading="lazy" decoding="async" class=" wp-image-9592 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/5mall.jpg" alt="" width="372" height="250" />The exploit was based on redundancy in the enciphered message preamble. It caused a bias which was an unnecessary shortcoming by design. It involved solving a set of binary equasions, an exponentially large number of times, for which the <i>special purpose device</i> was developed.More bout Aroflex<br />
Rigging the manualIn some cases, the cipher can be weakened by manipulating the manual. This was done for example with the manuals of the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: Hagelin CX-52 machine">Hagelin CX-52 machine</span></a>. Although the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: CX-52">CX-52</span></a> was in theory a virtually unbreakable machine, it could be set up accidentally in such a way, that it produced a short cycle (period), which was easy to break.By manipulating the manual, guidelines were given for &#8216;proper&#8217; use of the machine, but in reality the user was instructed to configure the machine in such a way that it generated a short cycle, which was easy to break by the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>.</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">Another example of hiding hints in the output stream, is the <a href="https://www.cryptomuseum.com/crypto/philips/aroflex/index.htm"><span data-balloon-pos="up" aria-label="More about: T-1000/CA">T-1000/CA</span></a>, internally known as <i>Beroflex</i>, that was the civil version of the NATO-approved <a href="https://www.cryptomuseum.com/crypto/philips/aroflex/index.htm"><span data-balloon-pos="up" aria-label="More about: Aroflex">Aroflex</span></a>, a joint development of <a href="https://www.cryptomuseum.com/crypto/philips/index.htm"><span data-balloon-pos="up" aria-label="More about: Philips">Philips</span></a> and <a href="https://www.cryptomuseum.com/crypto/siemens/index.htm"><span data-balloon-pos="up" aria-label="More about: Siemens">Siemens</span></a>. It was based on a <a href="https://www.cryptomuseum.com/telex/siemens/t1000/index.htm"><span data-balloon-pos="up" aria-label="More about: T-1000 telex">T-1000 telex</span></a>.</span></p>
<p>Whilst the Aroflex was highly secure, Beroflex (T-1000/CA) was not. With the right means and the right knowledge, it could be broken. This was not a trivial task however, and required the use of a <i>special purpose device</i> – a super chip – that had been co-developed by experts at the codebreaking division of the Royal Dutch Navy.</p>
<p>Key generator with predictive outputMany encryption systems, old and new alike, make use of KEY-generators – commonly <i>pseudo random number generators</i>, or PRNGs – for example for the generation of unique message keys, for generating private and public keys, and for generating the key stream in a stream cipher.By manipulating the key generator, it is theoretically possible to generate predictable keys, weak keys or predicatable cycles. Examples are the mechanical key generator of the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: Hagelin CX-52M">Hagelin CX-52M</span></a>, but also the software-based random number generators (RNGs) in modern software algorithms.Creating this kind of weaknesses is neither simple nor trivial, as the weakened key generator has to withstand a variety of existing entropy tests, including the ones published by the US National Institute of Standards and Technology (NIST). Nevertheless, various (potential) backdoors based on weakened PRNGs have been reported in the press, some of which are attributed to the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>.In December 2013, Reuters reported that documents released by <a href="https://www.cryptomuseum.com/people/snowden/index.htm"><span data-balloon-pos="up" aria-label="More about: Edward Snowden">Edward Snowden</span></a> indicated that <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> had payed RSA Security US$ 10 million to make Dual Elliptic Curve Deterministic Random Bit Generator (Dual_EC_DRBG) the default in their encryption software. It had already been proven in 2007, that constants could be constructed in such a way as to create a kleptographic backdoor in the NIST-recommended Dual_EC_DRBG <a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#ref_3">[3]</a>. It had been deliberately inserted by NSA as part of its BULLRUN decryption program. NIST promptly withdrew Dual_EC_DRBG from its draft guidance <a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#ref_4">[4]</a>.<span style="color: #e7e;">➤</span> <a href="https://en.wikipedia.org/wiki/Random_number_generator_attack" target="_blank" rel="noopener">Wikipedia: Random number generator attack</a><br />
<span style="color: #e7e;">➤</span> <a href="https://en.wikipedia.org/wiki/Dual_EC_DRBG" target="_blank" rel="noopener">Wikipedia: Dual_EC_DRBG</a><br />
It is often thought by the general public, that intelligence agencies have something like a magic password, or master key, that gives them instant access to secure communications of a subject. Although in most cases the backdoor mechanism is far more complex, it is technically possible.An example of a possible master key, is the so-called_NSAKEY<span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;"> that was found in a Microsoft operating system in 1999. The variable contained a 1024-bit public key, that was similar to the cryptographic keys that are used for encryption and authentication. Although Microsoft firmly denied it, it was widely speculated that the key was there to give the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> access to the system.</span>There are however a few other possible explanations for the presence of this key — including a backup key, a key for installing <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> proprietary crypto suites, and incompetence on the part of Microsoft, <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> or both — all of which seem plausible. In addition, Dr. Nicko van Someren found a third – far more obscure – key in Windows 2000, which he doubted had a legitimate purpose <a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#ref_5">[5]</a>.<span style="color: #e7e;">➤</span> <a href="https://en.wikipedia.org/wiki/_NSAKEY" target="_blank" rel="noopener">Wikipedia: _NSAKEY</a><br />
A good example of KEY ESCROW is the so-called <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm"><span data-balloon-pos="up" aria-label="More about: Clipper Chip">Clipper Chip</span></a>, that was introduced by the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> in the early 1990s, in an attempt to control the use of strong encryption by the general public.It was the intention to use this chip in all civil encryption products, such as computers, secure telephones, etc., so that everyone would be able to use strong encryption. By forcing people to surrender their keys to the (US) government, law enforcement agencies had the ability to decrypt the communication, should that prove to be necessary during the course of an investigation.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-9597 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/small-2.jpg" alt="" width="298" height="200" />Encryption systems are often attacked by adversaries, by exploiting information that is hidden in the so-called side channels. This is known as a <i>side channel attack</i>. In most cases, side channels are unintended, but they may have been inserted deliberately to give an eavesdropper a way in.Side channels are often unwanted emanations – such as radio frequency (RF) signals that are emitted by the equipment, or sound generated by a printer or a keyboard – but may also take the form of variations in power consumption (current) that occur when the device is in use (power analysis). In military jargon, unwanted emanations are commonly known as TEMPEST.An early example of a cryptographic device that exhibited exploitable TEMPEST problems, is the <a href="https://www.cryptomuseum.com/crypto/philips/img/300037/000/small.jpg"><span data-balloon-pos="up" aria-label="More about: Philips Ecolex IV mixer">Philips Ecolex IV mixer</span></a> shown in the image on the right, which was approved for use by NATO.As it was based on the <a href="https://www.cryptomuseum.com/crypto/ott.htm"><span data-balloon-pos="up" aria-label="More about: One-Time Tape (OTT)">One-Time Tape (OTT)</span></a> principle, it was theoretically safe. However, in the mid-1960s, the Dutch national physics laboratory TNO, proved that minute glitches in the electric signals on the teleprinter data line, could be exploited to reconstruct the original plaintext. The problem was eventually soved by adding filters between the device and the teleprinter line.<span style="color: #e7e;">➤</span> <a href="https://en.wikipedia.org/wiki/Side-channel_attack" target="_blank" rel="noopener">Wikipedia: Side-channel attack</a> &lt;<span style="color: #f52e00; font-family: Lucida Grande,Arial,Verdana,sans-serif;">Unintended weaknesses</span>Backdoors can also be based on unintentional weaknesses in the design of an encryption device. For example, the <a href="https://www.cryptomuseum.com/crypto/enigma/index.htm"><span data-balloon-pos="up" aria-label="More about: Enigma machine">Enigma machine</span></a> – used during WWII by the German Army – can not encode a This and other weaknesses greatly helped the codebreakers at <a href="https://www.cryptomuseum.com/bp/index.htm"><span data-balloon-pos="up" aria-label="More about: Bletchley Park">Bletchley Park</span></a>, and allowed the cipher to be broken throughout World War II.Unintended weaknesses were also present in the early mechanical cipher machines of <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span> (Hagelin), such as the <a href="https://www.cryptomuseum.com/crypto/hagelin/c36/index.htm"><span data-balloon-pos="up" aria-label="More about: C-36">C-36</span></a>, <a href="https://www.cryptomuseum.com/crypto/hagelin/m209/index.htm"><span data-balloon-pos="up" aria-label="More about: M-209">M-209</span></a>, <a href="https://www.cryptomuseum.com/crypto/hagelin/c446/index.htm"><span data-balloon-pos="up" aria-label="More about: C-446">C-446</span></a> and <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: CX-52">CX-52</span></a>. Although they were theoretically strong, they could accidentally be setup in such a way that they produced a short cycle, which could be broken much more easily. Similar properties can be found in the first generations of electronic crypto devices that are based on shift-registers.</p>
<div data-balloon-pos="up" aria-label="Close-up of the Clipper Chip inside the TSD-3600"><img loading="lazy" decoding="async" class="size-full wp-image-9598 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/small-3.jpg" alt="" width="298" height="200" /></div>
<p>It had to be assumed that the (US) government could be trusted under all circumstances, and that sufficient mechanisms were in place to avoid unwarranted tapping and other abuse, which was heavily disputed by the Electronic Frontier Foundation (EFF) and other privacy organisations.</p>
<p>The device – which used the <a href="https://www.cryptomuseum.com/crypto/usa/skipjack.htm"><span data-balloon-pos="up" aria-label="More about: Skipjack algorithm">Skipjack algorithm</span></a> – was not embraced by the public. In addition, it contained a serious flaw. In 1994, shortly after its introduction, (then) AT&amp;T researcher Matt Blaze discovered the possibility to tamper the device in such a way that it offered strong encryption whilst disabling the escrow capability. And that was not what the US Government had in mind.</p>
<p><b>Cryptographic Key Escrow</b></p>
<p>The Clipper Chip was a cryptographic chipset developed and promoted by the US Government. It was intended for implementation in <a href="https://www.cryptomuseum.com/crypto/voice.htm"><span data-balloon-pos="up" aria-label="More about: secure voice equipment">secure voice equipment</span></a>, such as <a href="https://www.cryptomuseum.com/crypto/phone.htm"><span data-balloon-pos="up" aria-label="More about: crypto phones">crypto phones</span></a>, and required its users to surrender their cryptographic keys in escrow to the government. This would allow law enforcement agencies (<a href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: CIA">CIA</span></a>, FBI), to decrypt any traffic for surveillance and intelligence  purposes. The controversial Clipper Chip was announced in 1993 and was already defunct by 1996 <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref_1">[1]</a>.</p>
<p>The physical chip was designed by <a href="https://www.cryptomuseum.com/crypto/usa/kiv7/index.htm#manuf"><span data-balloon-pos="up" aria-label="More about: Mykotronx">Mykotronx</span></a> (USA) and manufactured by VLSI Technology Inc. (USA). The initial cost for an unprogrammed chip was $16 and a programmed one costed $26.</p>
<p>The image on the right shows the Mykotronx <b>MYK78T</b> chip as it is present inside the AT&amp;T&#8217;s <a href="https://www.cryptomuseum.com/crypto/att/tsd3600/index.htm"><span data-balloon-pos="up" aria-label="More about: TSD-3600-E telephone encryptor">TSD-3600-E telephone encryptor</span></a>. The chip is soldered directly to the board (i.e. not socketed) and was thought to be tamper-proof (<a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#weakness"><span data-balloon-pos="up" aria-label="Jump to: see below">see below</span></a>). The <a href="https://www.cryptomuseum.com/crypto/att/tsd3600/index.htm"><span data-balloon-pos="up" aria-label="More about: AT&amp;T TSD-3600 telephone encryptor">AT&amp;T TSD-3600 telephone encryptor</span></a> was the first and only product that featured the ill-fated Clipper Chip before it was withdrawn.</p>
<p>in order to provide a level of protection against misuse of the key by law enforcement agencies, it was agreed that the Unit Key of each device with a clipper chip, would be held in escrow jointly by two federal agencies. This means that the actual Unit Key was split in two parts, each of which was given to one of the agencies. In order to reconstruct the actual Unit Key, the database of both agencies had to be accessed and the two half-Unit Keys had to be combined by bitwise XOR <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref_3">[3]</a>.</p>
<p><b>Skipjack Algorithm</b><br />
The Clipper Chip used the <a href="https://www.cryptomuseum.com/crypto/usa/skipjack.htm"><span data-balloon-pos="up" aria-label="More about: Skipjack encryption algorithm">Skipjack encryption algorithm</span></a> for the transmission of information, and the Diffie-Hellman key exchange algorithm for the distribution of the cryptographic session keys between peers. Both algorithms are believed to provide good security.</p>
<p>The Skipjack algorithm was developed by the <a href="https://www.cryptomuseum.com/crypto/usa/nsa.htm"><span data-balloon-pos="up" aria-label="More about: NSA">NSA</span></a> and was classed an NSA <a href="https://www.cryptomuseum.com/crypto/usa/nsa.htm#types"><span data-balloon-pos="up" aria-label="More about: Type 2 encryption product">Type 2 encryption product</span></a>. The algorithm was initially classified as SECRET, so that it could not be examined in the usual manner by the encryption research community. After much debate, the Skipjack algorithm was finally declassified and published by the <a href="https://www.cryptomuseum.com/crypto/usa/nsa.htm"><span data-balloon-pos="up" aria-label="More about: NSA">NSA</span></a> on 24 June 1998 <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref_2">[2]</a>. It uses an 80-bit key and a symmetric cipher algorithm, similar to DES.</p>
<p><b>Key Escrow</b><br />
The heart of the concept was <b>Key Escrow</b>. Any device with a Clipper Chip inside (e.g. a <a href="https://www.cryptomuseum.com/crypto/att/tsd3600/index.htm"><span data-balloon-pos="up" aria-label="More about: crypto phone">crypto phone</span></a>) would be assigned a <b>cryptographic key</b>, which would be given to the government in escrow. The user would then assume the government to be the so-called <b>trusted third party</b>. If government agencies &#8220;established their authority&#8221; to intercept a particular communication, the key would be given to that agency, so that all data transmitted by the subject could be decrypted.</p>
<p>The concept of Key Escrow raised much debate and became heavily disputed. The Electronic Frontier Foundation (EFF), established in 1990, preferred the term <i>Key Surrender</i> to stress what, according to them, was actually happening. Together with other public interest organizations, such as the Electronic Privacy Information Center, the EFF challenged the Clipper Chip proposal, saying that it would be illegal and also ineffective, as criminals wouldn&#8217;t use it anyway.</p>
<p>In response to the Clipper Chip initiative by the US Government, a number of very strong <i>public</i> encryption packages were released, such as Nautilus, PGP and PGPfone. It was thought that, if strong cryptography was widely available to the public, the government would be unable to stop its use. This approach appeared to be effective, causing the premature &#8216;death&#8217; of the Clipper Chip, and with it the death of Key Escrow in general.</p>
<p>In 1993, AT&amp;T Bell produced the first and only telephone encryptor based on the Clipper Chip: the <a href="https://www.cryptomuseum.com/crypto/att/tsd3600/index.htm"><span data-balloon-pos="up" aria-label="More about: TSD-3600">TSD-3600</span></a>. A year later, in 1994, Matt Blaze, a researcher at AT&amp;T, published a major design flaw in the Escrowed Encryption System (EES). A malicious party could tamper the software and use the Clipper Chip as an encryption device, whilst disabling the key escrow capability.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-9600 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/ees_leaf.png" alt="" width="560" height="276" srcset="https://goodshepherdmedia.net/wp-content/uploads/2021/11/ees_leaf.png 560w, https://goodshepherdmedia.net/wp-content/uploads/2021/11/ees_leaf-300x148.png 300w" sizes="(max-width: 560px) 100vw, 560px" /></p>
<p>When establishing a connection, the Clipper Chip transmits a 128-bit Law Enforcement Access Field (LEAF). The above diagram shows how the LEAF was established. The LEAF contained information needed by the intercepting agency to establish the encryption key.</p>
<p>To prevent the software from tampering with the LEAF, a 16-bit hash code was included. If the hash didn&#8217;t match, the Clipper Chip would not decrypt any messages. The 16-bit hash however, was too short to be safe, and a brute force attack would easily produce the same hash for a fake session key, thus not revealing the actual keys <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref">[3]</a> . If a malicious user would tamper the device&#8217;s software in this way, law enforcement agencies would not be able to reproduce the actual session key. As a result, they would not be able to decrypt the traffic.</p>
<p><b>Interior</b><img loading="lazy" decoding="async" src="https://www.cryptomuseum.com/img/blank.gif" width="1" height="1" /><img loading="lazy" decoding="async" src="https://www.cryptomuseum.com/img/blank.gif" width="1" height="4" /></p>
<p>Since the Clipper-project has failed, we think it is safe to show you the contents of the chip. Although this is something we would not normally do, this one is too good to be missed. Below, Travis Goodspeed shows us how easy it is to open the package and reverse-engineer a chip <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref_4">[4]</a>. Luckily, according to Kerckhoff&#8217;s principle, the secret is in the key and not in the device <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref_5">[5]</a>.</p>
<div data-balloon-pos="up" aria-label="Interior of the ill-fated MYK-78 Clipper Chip"><img loading="lazy" decoding="async" class="size-large wp-image-9601 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/myk78_large-1024x969.jpg" alt="" width="640" height="606" srcset="https://goodshepherdmedia.net/wp-content/uploads/2021/11/myk78_large-1024x969.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2021/11/myk78_large-300x284.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2021/11/myk78_large-768x726.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2021/11/myk78_large.jpg 1200w" sizes="(max-width: 640px) 100vw, 640px" /></div>
<p>&nbsp;</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;"><br />
The black dots along the four edges are the connection pads of the chip. The image was publised on <a href="http://www.flickr.com/photos/travisgoodspeed/3471087563/"><span data-balloon-pos="up" aria-label="www.flickr.com (off-site)">Travis&#8217; photostream on Flickr</span></a> and is reproduced here with his kind permission. Click the image for a <a href="https://www.cryptomuseum.com/crypto/usa/img/myk78_large.jpg"><span data-balloon-pos="up" aria-label="More about: hi-res version">hi-res version</span></a>. Note that this is a large file (18MB) which may take some time to download.</span></p>
<p><img loading="lazy" decoding="async" class=" wp-image-9596 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/small-1.jpg" alt="" width="286" height="192" />In some cases, the safety doctrine that is intended to make the device more secure, actually makes the cipher weaker. For example: during WWII, the German cipher authority dictated that a particular cipher wheel should not be used in the same position on two successive days. Whilst this may seem like a good idea, it effectively reduces the maximum number of possible settings.</p>
<p>By far the most common of the unintended weaknesses is operator error, such as choosing a simple or easy to guess password, sending multiple messages on the same key, sending the same message on two different keys, etc. Here are some examples of unintended weaknesses</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class=" wp-image-9595 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/small.jpg" alt="" width="344" height="231" /><br />
With a special key combination, the key logger can be turned in a USB memory stick, from which the logged data can be recovered by a malicious party. A more sophisticated example of covert hardware, is the addition of a (miniature) chip on the printed circuit board of an existing device. As many companies today have outsourced the production of their electronics, there is always a possibility that it might be maliciously modified by a foreign party. This is particularly the case with critical infrastructure like routers, switches and telecommunications backbone equipment. This problem is enhanced by the increasing complexity of modern computers, as a result of which virtually no one knows exactly how it works. A good example is the tiny computer that is hidden inside Intel&#8217;s AMT processors, and that has been actively exploited as a spying tool <a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#ref_6">[6]</a>.</p>
<ul>
<li><a href="https://www.cryptomuseum.com/intel/cia/rubicon.htm">Crypto Museum, <i>Operation RUBICON</i></a><br />
February 2020.<a name="ref_2"></a></li>
<li><a href="https://en.wikipedia.org/wiki/Backdoor_(computing)" target="_blank" rel="noopener">Wikipedia, <i>Backdoor (computing)</i></a><br />
Retrieved February 2020<a name="ref_3"></a></li>
<li><a href="https://en.wikipedia.org/wiki/Random_number_generator_attack" target="_blank" rel="noopener">Wikipedia, <i>Random number generator attack</i></a><br />
Retrieved February 2020<a name="ref_4"></a></li>
<li><a href="https://en.wikipedia.org/wiki/Dual_EC_DRBG" target="_blank" rel="noopener">Wikipedia, <i>Dual_EC_DRBG</i></a><br />
Retrieved February 2020<a name="ref_5"></a></li>
<li><a href="https://en.wikipedia.org/wiki/_NSAKEY" target="_blank" rel="noopener">Wikipedia, <i>_NSAKEY</i></a><br />
Retrieved February 2020<a name="ref_6"></a></li>
<li><a href="https://en.wikipedia.org/wiki/Intel_Active_Management_Technology" target="_blank" rel="noopener">Wikipedia, <i>Intel_Active Management Technology</i></a><br />
Retrieved November 2020.</li>
<li>Adding a small chip to the board (can only be done during production process)</li>
<li>Adding a regular component with a built-in chip <span style="color: #e7e;">➤</span> <a href="https://www.cryptomuseum.com/covert/bugs/nsaant/firewalk/index.htm">e.g. NSA&#8217;s FIREWALK</a></li>
<li>Tiny computer inside a regular processor <span style="color: #e7e;">➤</span> <a href="https://en.wikipedia.org/wiki/Intel_Active_Management_Technology" target="_blank" rel="noopener">e.g. Intel AMT</a></li>
<li>External key logger (USB or PS2)</li>
<li>Key logger (spy) software</li>
<li>Computer viruses</li>
<li>Supply chain attack</li>
<li>Weak keys</li>
<li>A letter can not encode into itself (Enigma)</li>
<li>False security measures</li>
<li>Operator mistakes</li>
<li>Software bugs</li>
</ul>
<p><img loading="lazy" decoding="async" class="size-full wp-image-9594 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/intel_small.jpg" alt="" width="298" height="200" />Another way of getting surreptitious access to a computer system, such as a personal computer, is by covertly installing additional hardware or software that gives an adversary direct or indirect access to the system and its data. Spyware can be visible, but can also be completely invisible.</p>
<p>An example of a hidden-in-plain-sight device is a so-called key logger that can be installed between keyboard and computer. The image on the right shows two variants: one for USB (left) and one for the old PS-2 keyboard interface.</p>
<p>Items like these can easily be installed in an office – for example by the cleaning lady – and are hardly noticed in the tangle of wires below your desk. It registers every key stroke, complete with time/date stamp, including your passwords. If the cleaning lady removes it a few days later, you will never find out that it was ever installed.</p>
<p>Manipulated hardware can be used to eavesdrop on your data, but can also be used as part of a Distributed Denial of Service attack (DDoS), or to disrupt the critical infrastructure of a company or even an entire country. In many cases, such attacks are carried out by (foreign) state actors. <span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">Manipulation of hardware is also possible by adding a secret chip to a regular inconspicuous component. A good example is the <span data-balloon-pos="up" aria-label="More about: FIREWALK implant">FIREWALK implant</span> of the US National Security Agency (NSA) that is hidden inside a regular RJ45 Ethernet socket of a computer. It is used by the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> to spy behind firewalls and was disclosed by former <span class="short" aria-label="Central Intelligence Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">CIA</a> </span>/ <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span>-contractor <a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: Edward Snowden">Edward Snowden</span></a> in 2013.</span></p>
<p>This device is particularly dangerous as it can not be found with a visual inspection. Further­more, it transmits the intercepted data via radio waves and effectively bypasses all security.</p>
<div data-balloon-pos="up" aria-label="NSA's FIREWALK network implant. Copyright Crypto Museum. Click for more details." data-balloon-length="large"><img decoding="async" src="https://www.cryptomuseum.com/covert/bugs/nsaant/firewalk/svg/firewalk_bare.svg" alt="NSA's FIREWALK network implant. Copyright Crypto Museum. Click for more details." width="298px" align="left" border="0" vspace="4" /></div>
<p>Is this problem restricted to high-end (computing) devices? Certainly not. Most modern domestic appliances, such as smart thermomenters, smart meters, domotica and in particular devices for the Internet of Things (IoT), are badly built, contain badly written software and are rarely properly protected, as a result of which they are extremely vulnerable to manipulation (hacking).</p>
<p><a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<ul>
<li><a href="https://www.cryptomuseum.com/intel/nsa/index.htm#inter" target="_blank" rel="noopener">NSA-backdoored equipment info found OFF this website</a></li>
<li><a href="https://goodshepherdmedia.net/u-s-government-catalogue-of-cellphone-surveillance-devices-used-by-the-military-and-by-cia-nsa-fbi-and-other-intelligence-agencies/" target="_blank" rel="noopener">U.S. Government Catalogue of Cellphone Surveillance Devices</a></li>
<li><a href="https://en.wikipedia.org/wiki/Backdoor_(computing)" target="_blank" rel="noopener">Backdoors on Wikipedia</a></li>
<li><a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">National Security Agency</a></li>
<li><a href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">Central Intelligence Agency</a></li>
<li><a href="https://nsa.gov1.info/dni/index.html" target="_blank" rel="noopener">NSA EXTRACTED INFO</a></li>
<li><a href="https://www.cryptomuseum.com/" target="_blank" rel="noopener">CRYPTO MUSEUM</a></li>
<li><a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener">Edward Snowden</a></li>
<li><a href="https://goodshepherdmedia.net/can-cops-secretly-listen-to-my-phone-how-cops-can-secretly-track-your-phone/" target="_blank" rel="noopener">Stingray</a></li>
<li><a href="https://goodshepherdmedia.net/fbi-vows-not-to-use-pegasus-spyware-after-grilling-from-capitol-hill/" target="_blank" rel="noopener">Pegasus Spyware</a></li>
<li><a href="https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/" target="_blank" rel="noopener">X-Keyscore</a></li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>China launches investigation into suspected spy balloon flying over US, ministry says</title>
		<link>https://goodshepherdmedia.net/china-launches-investigation-into-suspected-spy-balloon-flying-over-us-ministry-says/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Fri, 03 Feb 2023 11:59:38 +0000</pubDate>
				<category><![CDATA[Canada]]></category>
		<category><![CDATA[China 🇨🇳]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[United States 🇺🇸]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[China launches investigation]]></category>
		<category><![CDATA[Investigation]]></category>
		<category><![CDATA[Military]]></category>
		<category><![CDATA[space spy]]></category>
		<category><![CDATA[spy]]></category>
		<category><![CDATA[spy balloon]]></category>
		<category><![CDATA[spy balloon flying over US]]></category>
		<category><![CDATA[suspected spy balloon flying over US]]></category>
		<category><![CDATA[the stratosphere]]></category>
		<category><![CDATA[the stratosphere spy balloon]]></category>
		<category><![CDATA[US]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=10996</guid>

					<description><![CDATA[China launches investigation into suspected spy balloon flying over US, ministry says Mao urged the US and China to proceed &#8216;calmly and carefully&#8217; amid the suspected spy balloon investigation Watch the latest video at foxnews.com China has announced its government is looking into reports that a suspected Chinese spy balloon was discovered flying in U.S. airspace over [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="headline" style="text-align: center;">China launches investigation into suspected spy balloon flying over US, ministry says</h1>
<h2 class="sub-headline speakable" style="text-align: center;">Mao urged the US and China to proceed &#8216;calmly and carefully&#8217; amid the suspected spy balloon investigation</h2>
<p><script type="text/javascript" src="https://video.foxnews.com/v/embed.js?id=6319704693112&#038;w=466&#038;h=263"></script><noscript>Watch the latest video at <a href="https://www.foxnews.com">foxnews.com</a></noscript></p>
<p class="speakable">China has announced its government is looking into reports that a suspected Chinese spy balloon was discovered flying in U.S. airspace over Montana.</p>
<p class="speakable">&#8220;China is a responsible country and has always strictly abided by international laws, and China has no intention to violate the territory and airspace of any sovereign countries,&#8221; said Foreign Ministry spokesperson Mao Ning during a daily briefing on Friday.</p>
<p><iframe title="200X zoom on the Balloon &#x1f602;" width="640" height="360" src="https://www.youtube.com/embed/AAVKuQ2TQMg?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>She also urged U.S. officials and Chinese authorities to proceed &#8220;calmly and carefully&#8221; amid the investigation.</p>
<div class="ad-container desktop ad-h-50 ad-w-300">
<div id="desktop_desk-art-world-lb2" class="ad gam" data-iu="lb2" data-ad-size="728x90,300x250,320x50,300x50,1x1,fluid" data-ad-lz="1" data-hot-unit="" data-ad-init="1" data-ad-slot-rendered="1" data-rendered-size="1x1" data-google-query-id="CODXp-6k-fwCFXbIwgQd7JUKTg">
<div id="google_ads_iframe_/4145/fnc/desk/art/world/lb2_0__container__">&#8220;As for the balloon, as I’ve mentioned just now, we are looking into and verifying the situation and hope that both sides can handle this together calmly and carefully,&#8221; Mao added.</div>
</div>
</div>
<p>&nbsp;</p>
<div class="image-ct inline">
<div class="m"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-10998" src="https://goodshepherdmedia.net/wp-content/uploads/2023/02/GettyImages-1245319671-1024x576.webp" alt="" width="640" height="360" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/02/GettyImages-1245319671-1024x576.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/GettyImages-1245319671-300x169.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/GettyImages-1245319671-768x432.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/GettyImages-1245319671.webp 1344w" sizes="(max-width: 640px) 100vw, 640px" /></div>
<div class="caption">
<p>The Ministry of Foreign Affairs headquarters in Beijing, capital of China, Dec. 1, 2022.  <span class="copyright">(Ju Huanzong/Xinhua via Getty Images)</span></p>
</div>
</div>
<p>The foreign minister said judgment should be withheld &#8220;before we have a clear understanding of the facts.&#8221;</p>
<p>U.S. Secretary of State Antony Blinken was scheduled to visit China on Friday, becoming the highest-ranking U.S. official to visit the country since the start of the COVID-19 pandemic.</p>
<div class="image-ct inline">
<div class="m"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-10999" src="https://goodshepherdmedia.net/wp-content/uploads/2023/02/AP23033841588042-1024x576.webp" alt="" width="640" height="360" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/02/AP23033841588042-1024x576.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/AP23033841588042-300x169.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/AP23033841588042-768x432.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/AP23033841588042.webp 1344w" sizes="(max-width: 640px) 100vw, 640px" /></div>
<div class="caption">
<p>A high altitude balloon floats over Billings, Mont., on Wednesday, Feb. 1, 2023.  <span class="copyright">(Larry Mayer/The Billings Gazette via AP)</span></p>
</div>
</div>
<p>His visit comes amid months of tense relations between Beijing and Washington over trade, Taiwan, human rights issues and China’s territorial claims in the South China Sea.</p>
<p>&#8220;What I want to emphasize is that before we have a clear understanding of the facts, speculation and sensationalizing will be unhelpful to the proper handling of the issue. As for Blinken’s visit to China, I have no information,&#8221; Mao said.</p>
<div class="ad-container desktop ad-h-50 ad-w-300">
<div id="desktop_desk-art-world-lb3" class="ad gam" data-iu="lb3" data-ad-size="728x90,300x250,320x50,300x50,1x1,fluid" data-ad-lz="1" data-hot-unit="" data-ad-init="1">
<div id="google_ads_iframe_/4145/fnc/desk/art/world/lb3_0__container__">Senior U.S. defense officials said the government is closely monitoring the high-altitude surveillance balloon.</div>
</div>
</div>
<p>&#8220;The United States government has detected and is tracking a high-altitude surveillance balloon that is over the continental United States right now,&#8221; said Pentagon spokesperson Brig. Gen. Pat Ryder said during a briefing on Thursday afternoon.</p>
<div class="image-ct inline">
<div class="m"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-11000" src="https://goodshepherdmedia.net/wp-content/uploads/2023/02/AP23017687122082-1024x576.webp" alt="" width="640" height="360" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/02/AP23017687122082-1024x576.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/AP23017687122082-300x169.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/AP23017687122082-768x432.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/AP23017687122082.webp 1344w" sizes="(max-width: 640px) 100vw, 640px" /></div>
<div class="caption">
<p>Pentagon spokesman Air Force Brig. Gen. Patrick Ryder speaks during a briefing at the Pentagon in Washington, Tuesday, Jan. 17, 2023.  <span class="copyright">(AP Photo/Andrew Harnik)</span></p>
</div>
</div>
<p>He added: &#8220;The U.S. government, including NORAD, continues to track and monitor it closely. The balloon is currently traveling at an altitude well above commercial air traffic and does not present a military or physical threat to people on the ground. Instances of this kind of balloon activity have been observed previously over the past several years. Once the balloon was detected, the U.S. government acted immediately to protect against the collection of sensitive information.&#8221;</p>
<p>The U.S. government is &#8220;confident&#8221; the surveillance balloon belongs to the People&#8217;s Republic of China, a defense official told Fox News. It is also considering bringing it down using military assets.</p>
<p>It is not immediately clear how long the balloon has been in U.S. airspace. The senior defense official said the government has been tracking it for &#8220;some time&#8221; and that it entered U.S. airspace a &#8220;couple of days ago.&#8221;</p>
<p><i>The Associated Press contributed to this report. </i>By <a href="https://www.foxnews.com/person/r/lawrence-richard">Lawrence Richard</a> <span class="article-source"><a href="https://www.foxnews.com/world/china-launches-investigation-suspected-spy-balloon-flying-us-ministry-says" target="_blank" rel="noopener">| Fox News</a></span></p>
<hr />
<h1 class="headline">US government monitoring suspected Chinese spy balloon over northern states</h1>
<h2 class="sub-headline speakable">Senior U.S. defense official said government closely monitoring suspected Chinese spy balloon</h2>
<p><script type="text/javascript" src="https://video.foxnews.com/v/embed.js?id=6319557523112&#038;w=466&#038;h=263"></script><noscript>Watch the latest video at <a href="https://www.foxnews.com">foxnews.com</a></noscript></p>
<h4 class="title" data-v-a7f268cc=""></h4>
<p class="speakable">The U.S. government is monitoring a suspected Chinese surveillance balloon that has been moving over northern states over the past several days.</p>
<p class="speakable">Pentagon spokesperson Brig. Gen. Pat Ryder said during a briefing on Thursday afternoon that the U.S. government has detected a high-altitude surveillance balloon over the continental U.S.</p>
<p><i>&#8220;</i>The United States government has detected and is tracking a high-altitude surveillance balloon that is over the continental United States right now. The U.S. government to include Norad, continues to track and monitor<i> </i>it closely. The balloon is currently traveling at an altitude well above commercial air traffic and does not present a military or physical threat to people on the ground. Instances of this kind of balloon activity have been observed previously over the past several years. Once the balloon was detected, the U.S. government acted immediately to protect against the collection of sensitive information,&#8221; Ryder said.</p>
<div class="ad-container desktop ad-h-50 ad-w-300">
<div id="desktop_desk-art-pol-lb2" class="ad gam" data-iu="lb2" data-ad-size="728x90,300x250,320x50,300x50,1x1,fluid" data-ad-lz="1" data-hot-unit="" data-ad-init="1" data-google-query-id="CMWMg7il-fwCFXQrrQYd2SsGWA" data-ad-slot-rendered="1" data-rendered-size="300x250"></div>
</div>
<div class="image-ct inline">
<div class="m"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-11003" src="https://goodshepherdmedia.net/wp-content/uploads/2023/02/Untitled-design-399-1024x576.webp" alt="" width="640" height="360" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/02/Untitled-design-399-1024x576.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/Untitled-design-399-300x169.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/Untitled-design-399-768x432.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/Untitled-design-399.webp 1440w" sizes="(max-width: 640px) 100vw, 640px" /></div>
<div class="caption">
<p>Red flags flutter in front of the Great Hall of the People before the annual two sessions in Beijing on March 4, 2022. <span class="copyright">(VCG / VCG via Getty Images)</span></p>
</div>
</div>
<p>A senior defense official said that the U.S. government is &#8220;confident&#8221; that the surveillance balloon belongs to the People&#8217;s Republic of China.</p>
<p>The defense official said that the balloon was recently over Montana and that officials were considering bringing it down with military assets, but they decided against doing so because of the risks associated, adding that President Joe Biden was briefed on the situation and asked for military options.</p>
<p>&#8220;You did see reports yesterday of a ground stop at Billings Airport and the mobilization of a number of assets, including F-22. The context for that was that we put some things on station in the event that a decision was made to bring this down while it was over Montana. So, we wanted to make sure we were coordinating with civil authorities to empty out the airspace around that potential area. But even with those protective measures taken, it was the judgment of our military commanders that we didn&#8217;t drive the risk down low enough. So, we didn&#8217;t take the shot,&#8221; the official said.</p>
<div class="image-ct inline">
<div class="m"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-11001" src="https://goodshepherdmedia.net/wp-content/uploads/2023/02/7618d7d8-AP23033154886683-e1675348090994-1024x576.webp" alt="" width="640" height="360" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/02/7618d7d8-AP23033154886683-e1675348090994-1024x576.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/7618d7d8-AP23033154886683-e1675348090994-300x169.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/7618d7d8-AP23033154886683-e1675348090994-768x432.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/7618d7d8-AP23033154886683-e1675348090994.webp 1440w" sizes="(max-width: 640px) 100vw, 640px" /></div>
<div class="caption">
<p>U.S. Defense Secretary Lloyd Austin, center, walks past military guards during his arrival at the Department of National Defense in Camp Aguinaldo military camp in Quezon City, Metro Manila, Philippines, on Thursday. <span class="copyright">(Rolex Dela Pena / Pool Photo via AP)</span></p>
</div>
</div>
<p>A well-placed senior U.S. official told Fox News that the government is still considering a variety of options with how to deal with the Chinese spy balloon, saying that the options presented to Biden and his national security team included concerns that if the military did shoot down the balloon, there could be civilian casualties the ground.</p>
<p>The White House hasn&#8217;t ruled out shooting the balloon down if it were deemed safe to do so, according to the source.</p>
<div class="ad-container desktop ad-h-50 ad-w-300">
<div id="desktop_desk-art-pol-lb3" class="ad gam" data-iu="lb3" data-ad-size="728x90,300x250,320x50,300x50,1x1,fluid" data-ad-lz="1" data-hot-unit="" data-ad-init="1" data-google-query-id="CIrg17ql-fwCFUQZ5wodLIwKZQ" data-ad-slot-rendered="1" data-rendered-size="1x1">
<div id="google_ads_iframe_/4145/fnc/desk/art/pol/lb3_0__container__"></div>
</div>
</div>
<p>According to the source, there&#8217;s more than just a balloon, and heavy equipment would come crashing to the ground if it were to be shot down, creating a large debris field.</p>
<p>Secretary of Defense Lloyd Austin convened a meeting with senior Department of Defense leadership Wednesday to discuss the balloon, and it was decided not to take military action due to &#8220;the risk to safety and security of people on the ground from the possible debris field,&#8221; the official said. At the time, Austin was visiting Camp Navarro in the Philippines, which is around 2,000 miles from China.</p>
<p>The balloon&#8217;s discovery also comes as the U.S. and Philippines agreed to increase its military presence within the islands amid escalating tensions between China and Taiwan.</p>
<div class="image-ct inline">
<div class="m"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-11002" src="https://goodshepherdmedia.net/wp-content/uploads/2023/02/taiwan-us-flag-1024x576.webp" alt="" width="640" height="360" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/02/taiwan-us-flag-1024x576.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/taiwan-us-flag-300x169.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/taiwan-us-flag-768x432.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/taiwan-us-flag.webp 1440w" sizes="(max-width: 640px) 100vw, 640px" /></div>
<div class="caption">
<p>Flags of Taiwan and U.S. are placed for a meeting in Taipei, Taiwan, on March 27, 2018. <span class="copyright">(Reuters / Tyrone Siu)</span></p>
</div>
</div>
<p>The senior defense official said that the government has been tracking the balloon for &#8220;some time&#8221; and said it entered U.S. airspace a &#8220;couple of days ago.&#8221;</p>
<p>While maintaining that the balloon doesn&#8217;t present a military threat to the U.S., the official said that it likely isn&#8217;t gathering any information of significant value to the <a href="https://www.foxnews.com/world" target="_blank" rel="noopener">People&#8217;s Republic of China</a>.</p>
<p>&#8220;They&#8217;re trying to fly this balloon over sensitive sites, one of which was just mentioned to collect information,&#8221; the official said, adding that it&#8217;s not the first time that a balloon &#8220;of this nature&#8221; has been over the U.S.</p>
<p><script type="text/javascript" src="https://video.foxnews.com/v/embed.js?id=6319557523112&#038;w=466&#038;h=263"></script><noscript>Watch the latest video at <a href="https://www.foxnews.com">foxnews.com</a></noscript></p>
<div class="m"><img loading="lazy" decoding="async" class="alignleft" src="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2021/10/340/340/23004538_10210746000863057_8699735736880323065_o.jpg?ve=1&amp;tl=1" alt="Adam Sabes" width="47" height="47" /></div>
<p>By <a href="https://www.foxnews.com/person/s/adam-sabes">Adam Sabes</a> , <a href="https://www.foxnews.com/person/f/liz-friden">Liz Friden</a> , <a href="https://www.foxnews.com/person/g/jennifer-griffin">Jennifer Griffin</a> <span class="article-source"><a href="https://www.foxnews.com/politics/us-government-monitoring-suspected-chinese-spy-balloon-northern-states" target="_blank" rel="noopener">| Fox News</a></span></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p style="text-align: center;">updated 2/3/2023 below with videos</p>
<p><iframe title="Jesse Watters: Why are we letting China get away with this?" width="640" height="360" src="https://www.youtube.com/embed/KqLe2JqW1tc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="This May Be The Real Reason Why China Is Flying Spy Balloon Over US: Gordon Chang | Forbes Exclusive" width="640" height="360" src="https://www.youtube.com/embed/lq6QJMZIdkI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="Tucker Carlson: This is insultingly ridiculous" width="640" height="360" src="https://www.youtube.com/embed/A__QKcIkQRM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="Hannity: Why haven&#039;t we shot this balloon out of the sky?" width="640" height="360" src="https://www.youtube.com/embed/qdDpZ5B4d9g?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p><iframe title="Chinese Spy Balloon Flies Over The United States, Pentagon Says | Chineses Spy Balloon Live Updates" width="640" height="360" src="https://www.youtube.com/embed/QOWyxbEPqEw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p style="text-align: center;">
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
