Secret code indicates NSA tracks privacy tool users
Although unverified, the code indicates a broad effort to monitor those interested in protecting their online activities
IDG News Service - A NSA spying tool is configured to snoop on an array of privacy programs used by journalists and dissidents, according to an analysis of never-before-seen code leaked by an unknown source.
XKeyScore came to light in documents leaked by former NSA contractor Edward Snowden, but some observers believe the latest information -- which adds greater detail on how the agency monitors people trying to protect their privacy online -- may have not come from the documents he passed to journalists.
The broadcasters, Norddeutscher Rundfunk and Westdeutscher Rundfunk, did not reveal their source for the code but claimed in a report that former NSA employees and experts "are convinced that the same code or similar code is still in use today,"
The report describes how the code enables XKeyScore to track users connected to The Onion Router, known as TOR, a network that encrypts data traffic through random servers in order to obscure identification of a web surfer.
TOR, a project initially started by the U.S. Navy, is considered a critical privacy enhancing tool and one that has hampered NSA surveillance in the past.
The report contends the NSA is monitoring two TOR servers in Germany. One is run by Sebastian Hahn, a 28-year-old computer science student at the University of Erlangen. The server, known as a Directory Authority, a critical part of TOR's infrastructure, supplies a list of relays in the network to computers connecting to the network.
The NSA's collection of metadata about people connecting to the server puts those people at risk, the report quoted Hahn as saying.
The NSA also tracks the use of non-public TOR relays, which are supplied to users upon request in countries known to actively block TOR relays, such as in China and Iran, the report said.
Other rules in the code indicate the agency is tracking people who visit public websites for privacy-related projects including the TOR Project; Tails, a privacy-focused portable operating system; and the Linux Journal website, the report alleged.
A note within the code appeared to cast a disparaging view of Tails, a respected privacy project, describing it as "a comsec mechanism advocated by extremists on extremist forums".
"In actuality, the software is used by journalists, human rights activists, and hundreds of thousands of ordinary people who merely wish to protect their privacy," the report contends.
It noted that the rule for monitoring the TOR Project's website was crafted to avoid collecting data on people believed to be in Australia, Canada, New Zealand, the U.K. and the U.S., the so-called "Five Eyes" states that collaborate on signals intelligence.
- The Business Value of Continuous Delivery Download this whitepaper to learn more about the business value of Continuous Delivery and see why it could be a game changer for...
- Ten Factors Shaping the Future of Application Delivery Download this research report conducted by Enterprise Management Associates (EMA) to learn how those that are seeking to accelerate application delivery are leveraging...
- Software Asset Management: Ensuring Today's Assets Today's trends like BYOD and SaaS are new and exciting in terms of how they will help make our jobs more productive but...
- Trends Shaping Software Management: 2014 Most IT executives recognize the relationship between mobile computing and worker productivity, and have long issued notebook computers and other mobile devices to...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!