Leak: How ‘Everything You Do Online’ Is Tracked and Stored

August 2nd, 2013
Updated 08/02/2013 at 5:22 am

Thanks to a single National Security Agency program, the spy agency can monitor everything you do online, including searches, emails, chats, streaming video, purchases, and much more.

The program is called XKeyscore, and it is latest the bombshell to come from the Edward Snowden NSA leaks. The Guardian reporter Greenwald believes the XKeyscore documents validate Snowden’s claims that he could wiretap anybody anywhere in the world without asking anybody for permission. Greenwald and Snowden’s allegations are supported by various images that detail how XKeyscore works when it comes to monitoring all your communications and private data. Below you can see a crucial image that details how the program works.

NSA XKeyscore graphic slide.

A graphic from the XKeyscore NSA programming detailing the ways in which the NSA tracks all online actions.

The training presentation indicates that XKesycore lets NSA analysts search metadata: the information about phone and Internet usage collected by the agency. It allows an NSA agent to see if an individual sent any emails or even made a phone call. This would make it easy for NSA analysts to pinpoint an individual by his or her email or Facebook usage, especially when we factor in what the NSA can find out from just your phone records alone.

Abolishing Privacy

The XKeyscore training materials show that an agent can target anybody for surveillance using the program. Worse, a tool included in the program called DNI Presenter lets agents read stored emails, Facebook conversations, and chats.

If that wasn’t bad enough, the agents can also learn the addresses of every website you visit. That means they can check to see if you visited a gun website or checked out WikiLeaks.

What Greenwald describes violates the Fourth Amendment’s prohibition against unreasonable searches and seizures. It also violates the laws and constitutions of many other nations, including Britain’s. Note there is no Constitution in Britain, but some British activists contend such programs violate privacy laws in that country.

NSA XKeyscore graphic exposing spying.

Particularly bothersome is the line at the top of the XKeyscore presentation that you can see above. It states: ‘Top Secret Comint/ Rel to USA, AUS, CAN, GBR, NZL’. That means the government agencies in Australia, Canada, Great Britain, and New Zealand are also reading your emails and texts. Not only is NSA violating our rights, it is violating the rights of people in other countries and helping foreign governments violate the rights of American citizens.

A graphic with the presentation from 2008 indicates that NSA agents can use XKeyscore to see phone numbers, email addresses, logins, and user activity. An agent with access to it will be able to see all of these communications. So theoretically would a hacker that stole XKeyscore data from the NSA. Serious efforts need to be made to bring the NSA under control now. It has become a major threat to our privacy and perhaps the Constitution at large.

Share Button

Tags: , , , , , ,

Category: Privacy

About the Author ()

Comments (6)

Trackback URL | Comments RSS Feed

  1. Squidward says:

    The NSA doesn't need to be controlled, it needs to be done away with completely, and all the human refuse that staff it needs to be put in jail.

  2. Natalie Diaz says:

    This is really a nice article to read. I got to know many things that I couldn't think off my own. Really nice read !!

  3. Julia says:

    It has become easy to ensure the safety of your precious data by keeping it on cloud servers. Call on to the ARC IT Support Essex Services for online data backup and disaster recovery.

  4. caso di crisi bancaria nel Regno Unito è indivisible perfetto esempio andel fatto gna are generally credenza gna my partner and i banchieri possono creare ricchezza orite di realizzare ciclo produttivo economico è mera illusione. Questa è stata una nuova esperienza a banche andel Regno Unito, gna potrebbe essere descritto i metodi per niente di più gna indivisible eufemismo a banche internazionali collettivi. I just nuovi mutuatari nel blocco sono stati South Pebbles orite Halifax, tra gli altri. loro ingresso nel mercato time qualcosa fordi celebrare, master of arts are generally loro uscita low è stata celebrata. L’interconnessione delle attributed economie significava gna quello gna stava accadendo for un’economia colpita l’altra. 12 settembre andel 2007, are generally BBC ha rivelato gna South Pebbles aveva chiesto di essere assegnato indivisible sostegno finanziario di emergenza fordi parte della Banca d’Inghilterra, i metodi per ultima risorsa, i metodi per are generally crisi ha fatto breccia nel Regno Unito. South Pebbles è stato tra my partner and i nuovi finanziatori gna avevano fatto affidamento sui mercati, invece di deposito andel risparmiatore di finanziare are generally concessione di mutui ipotecari. Questo significa gna una volta gna are generally fiducia andel mercato è stato influenzato, South Pebbles è stato scosso dal suo nucleo. Nello stesso mese, time stato rivelato gna tasso al quale ce banche cuando prestano any vicenda time salita al suo più alto dal dicembre Just before. Texas Banca d’Inghilterra ha fissato tasso di riferimento al Five,75%. L’aumento andel tasso di prestito interbancario è indivisible contributo a fatto gna nessuna banca intesa i metodi per l’altra time caduto for profondità nel fangoso della crisi economica. C’era diffidenza generale tra ce banche andel Regno Unito.

    [url =http://borselouisvuitton.gadeonline.org/]borse louis vuitton[/url]

    borse louis vuitton

  5. Colin O'Donnell says:

    IT support services Sheffield provides affordable cloud backup services, and resolves computer hardware and networking issues.

  6. Nowadays our cell phones, laptops, computer etc are tracked by intelligence agencies. They complete control on that. They can access easily and get information what they want.

Leave a Reply

Your email address will not be published. Required fields are marked *