9/6/2023 0 Comments Xkeyscore search data![]() ![]() “At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours,” the paper quoted one document as saying. So much content was being collected, the newspaper said, that it could be stored only for short periods of time - generally just a few days. The Guardian quoted another slide as saying that nearly 42 billion records had been captured by the system during a one-month period in 2012. One slide said XKeyscore was supported by 700 servers and 150 sites across the globe, and the volume of data available to analysts through XKeyscore appears to be vast. “It’s hard to tell what this is without some context,” said security researcher Ashkan Soltani, who has been following the NSA revelations.īut hints as to the program’s size and scope are scattered across the documents. How and from where the program harvests its information isn’t completely clear, nor is it obvious how XKeyscore fits in with other recently revealed NSA activities, such as the PRISM program, which draws data from Silicon Valley firms. and allied troops abroad,” the statement said. “These types of programs allow us to collect the information that enables us to perform our missions successfully - to defend the nation and to protect U.S. In a statement, the NSA said that figure only included captures up to the year 2008, and pushed back against any suggestion of illegal or arbitrary collection of data. In an indication of the program’s importance, one slide says that XKeyscore has led to the capture of more than 300 terrorists. The answer: Look for “anomalous events,” which the NSA defines as “someone whose language is out of place for the region they are in” or, rather more vaguely, “someone searching the web for suspicious stuff.” ![]() One question-and-answer slide asks what to do if a terror cell isn’t associated with any particular search term. Some of the slides appear to carry screenshots showing what analysts would see as they trawled the intercepted conversations and include sample search queries such as “Show me all encrypted word documents from Iran” or “Show me all the word documents that reference Osama Bin Laden.” ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |