iTnews

Snowden leaks more details on mass surveillance program

By Juha Saarinen on Aug 1, 2013 6:08AM
Snowden leaks more details on mass surveillance program

Australia key player in X-Keyscore.

Fugitive former United States National Security Agency employee Edward Snowden has leaked further documents on a mass surveillance program that he claims enables American analysts to wiretap anyone in the world.

Called X-Keyscore, the program is the widest reaching system to develop intelligence from computer networks, according to NSA training material slides given to the Guardian by Snowden.

A wide variety of information is available to analysts through X-Keyscore. This ranges from contents of emails to browser history and other online activity.

Real time activities such as Facebook chats can also be captured by X-Keyscore, the NSA documents purport. However, while X-Keyscore can be used to spy on unencrypted hypertext transport protocol (HTTP) internet traffic according to the slides, it is unclear if it can be used to intercept encrypted secure sockets layer (SSL or HTTPS) data as well.

X-Keyscore slide on Facebook chat interception. Source: The Guardian

X-Keyscore is thought to be run by the NSA and the Australian Defence Signals Directorate (DSD) as well as the New Zealand Government Communications Security Bureau (GCSB), with spy agencies from Canada and the United Kingdom also participating.

An earlier leak by Snowden indicates the program is run from bases in Australia and New Zealand with over 700 servers processing the data.

According to the NSA documents obtained by the Guardian, X-Keyscore intelligence led to 300 terrorists being captured by 2008.

A vast amount of data is accessible through X-Keyscore. By 2012, at least 41 billion records were collected and stored in X-Keyscore for a single 30-day period according to the NSA documents, with another one to two billion records being added every day.

X-Keyscore is used as part of the NSA's lawful foreign signals intelligence collection system, the NSA said in a statement. 

It said access to the data was only provided to personnel who required it for their assigned tasks.

"Allegations of widespread, unchecked analyst access to NSA collection data are simply not true." 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
australia dsd gscb infosec new zealand nsa security snowden spying xkeyscore
In Partnership With
By Juha Saarinen
Aug 1 2013
6:08AM
0 Comments

Related Articles

  • IBM criticises Australia's anti-encryption laws
  • NSA and GCHQ say Russian government hackers hijacked Iranian hackers
  • Senate pushes encryption fix for US CLOUD Act fracture
  • Australia, US negotiate CLOUD Act data swap pact
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

CBA slammed by RBA for stalling New Payments Platform

CBA slammed by RBA for stalling New Payments Platform

TPG 'contemplates' future of sub-$60 NBN plans

TPG 'contemplates' future of sub-$60 NBN plans

Google tries to smash smishing in Messages

Google tries to smash smishing in Messages

NBN Co challenges Australia's $60 broadband 'sweet spot'

NBN Co challenges Australia's $60 broadband 'sweet spot'

You must be a registered member of iTnews to post a comment.
Log In | Register

Whitepapers from our sponsors

Are you getting profitable outcomes from your IT?
Are you getting profitable outcomes from your IT?
Your Microsoft Security journey starts here
Your Microsoft Security journey starts here
Is your AWS framework well-architected?
Is your AWS framework well-architected?
Why you should  reassess your cybersecurity posture
Why you should reassess your cybersecurity posture
How will you manage the cloud data deluge?
How will you manage the cloud data deluge?

Events

  • Gartner Data & Analytics Summit
  • 3rd Intelligent Automation Sydney Summit
  • 2nd Data Governance & Management Summit Melbourne
  • Technology Risk Management Summit 2020
  • 7th University IT Service Strategy & Challenges
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.