{"id":24600,"date":"2014-07-08T02:41:25","date_gmt":"2014-07-08T06:41:25","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24600"},"modified":"2014-07-08T02:41:25","modified_gmt":"2014-07-08T06:41:25","slug":"secret-code-indicates-nsa-tracks-users-of-privacy-tools-report-says","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/secret-code-indicates-nsa-tracks-users-of-privacy-tools-report-says.php","title":{"rendered":"Secret code indicates NSA tracks users of privacy tools, report says"},"content":{"rendered":"<p><p>    A NSA spying tool is configured to snoop on an array of privacy    programs used by journalists and dissidents, according to an    analysis of never-before-seen code leaked by an unknown source.  <\/p>\n<p>    The code, published as part of investigation by two German broadcasters    last week, contains tracking specifications for XKeyScore, a    powerful NSA program that collects and sorts intercepted data.  <\/p>\n<p>    [ It's time to rethink security. Two former CIOs show    you     how to rethink your security strategy for today's world.    Bonus: Available in PDF and e-book versions. | Stay up to date    on the latest security developments with InfoWorld's     Security Central newsletter. ]  <\/p>\n<p>    XKeyScore came to light in documents leaked    by former NSA contractor Edward Snowden, but some observers    believe the latest information -- which adds greater detail on    how the agency monitors people trying to protect their privacy    online -- may have not come from the documents he passed to    journalists.  <\/p>\n<p>    The broadcasters, Norddeutscher Rundfunk and Westdeutscher    Rundfunk, did not reveal their source for the code but claimed    in a report that former NSA employees and experts \"are    convinced that the same code or similar code is still in use    today,\"  <\/p>\n<p>    The report describes how the code enables XKeyScore to track    users connected to The Onion Router, known as TOR, a network    that encrypts data traffic through random servers in order to    obscure identification of a web surfer.  <\/p>\n<p>    TOR, a project initially started by the U.S. Navy, is    considered a critical privacy enhancing tool and one that has    hampered NSA surveillance in the past.  <\/p>\n<p>    The report contends the NSA is monitoring two TOR servers in    Germany. One is run by Sebastian Hahn, a 28-year-old computer    science student at the University of Erlangen. The server,    known as a Directory Authority, a critical part of TOR's    infrastructure, supplies a list of relays in the network to    computers connecting to the network.  <\/p>\n<p>    The NSA's collection of metadata about people connecting to the    server puts those people at risk, the report quoted Hahn as    saying.  <\/p>\n<p>    The NSA also tracks the use of non-public TOR relays, which are    supplied to users upon request in countries known to actively    block TOR relays, such as in China and Iran, the report said.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.infoworld.com\/d\/security\/secret-code-indicates-nsa-tracks-users-of-privacy-tools-report-says-245601\/RK=0\/RS=398oa18zcAQw07J7qHSR7LV6RxE-\" title=\"Secret code indicates NSA tracks users of privacy tools, report says\">Secret code indicates NSA tracks users of privacy tools, report says<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A NSA spying tool is configured to snoop on an array of privacy programs used by journalists and dissidents, according to an analysis of never-before-seen code leaked by an unknown source. The code, published as part of investigation by two German broadcasters last week, contains tracking specifications for XKeyScore, a powerful NSA program that collects and sorts intercepted data. [ It's time to rethink security. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-24600","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24600"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24600"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24600\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}