Friday, April 17, 2020

Your Data is Really Not Safe: Part 3 (Modern Surveillance Techniques, Terms, and Programs)

The NSA collects network traffic in two main ways. The first is through a broad category called upstream collection. This collection is through the major pathways that all traffic must go through, such as fiber optic cables in the ocean or cable switching stations in the United States. The NSA hosts a number of programs categorized under upstream collection, including FAIRVIEW, BLARNEY, STORMBREW, and OAKSTAR. The first three programs all target communications within the United States by partnering with companies such as AT&T and Verizon at major stations to intercept and collect traffic while routing. OAKSTAR is a collection of many other programs that focus on international information collection. RAMPART-A is an international collaboration that aims to collect information at every major fiber optic routing point. 
NSA Prism program taps in to user data of Apple, Google and others ...PRISM is the counterpart to the upstream collection. Instead of collecting traffic as it is routed between places, PRISM uses backdoors within different companies to collect information. Yahoo, Google, and Microsoft are all participants in the program.

Much of our communication is now encrypted, which (as far as we know) no one knows how to efficiently decrypt. BULLRUN is an example of many attempts to decrypt communications, including installing and exploiting backdoors, using mathematical techniques, and industry partnerships.  

Although PRISM information can only be used and collected with a FISA court order, there is still a huge chilling effect on the First Amendment with regards to sharing opinions and thoughts. Furthermore, some argue that the government monitoring people is inherently a violation of the Fourth Amendment and a reasonable expectation of privacy.

The culmination of all of this information comes through the program XKEYSCORE. XKEYSCORE is a computer system for searching and analyzing internet traffic. The system has been compared to google.com for private internet communications. The system has also been shared internationally, especially with the Five Eyes countries. 

These programs or similar ones are still going on, having been renewed in 2018 by Congress and Trump. There was little protest when the renewal occured, which signifies that Americans may have accepted the huge collection of data as inevitable or essential for the tracking of terrorists and other criminals. 

Perhaps you think you’re protected by using Tor, an anonymized browser that utilizes volunteer relays to send information. However, the NSA still has been able to monitor traffic from Tor. Furthermore, using the browser would put you as a larger target within the XKEYSCORE program. Just by searching these terms, you are put under higher suspicion within the program. 

Sources: 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.