skip to main |
skip to sidebar
What information exactly does the NSA (and its Five Eyes partners) have access to? At least as much as noted below. How long is the information stored? Maybe that is a function of the storage available, which we know is increasing rapidly. From The Intercept:
One of the National Security Agency’s most powerful tools of mass
surveillance makes tracking someone’s Internet usage as easy as entering
an email address, and provides no built-in technology to prevent
abuse. Today, The Intercept is publishing 48 top-secret and
other classified documents about XKEYSCORE dated up to 2013, which shed
new light on the breadth, depth and functionality of this critical spy
system — one of the largest releases yet of documents provided by NSA
whistleblower Edward Snowden...
These newly published documents demonstrate that collected
communications not only include emails, chats and web-browsing traffic,
but also pictures, documents, voice calls, webcam photos, web searches,
advertising analytics traffic, social media traffic, botnet traffic,
logged keystrokes, computer network exploitation (CNE) targeting,
intercepted username and password pairs, file uploads to online
services, Skype sessions and more...
No comments:
Post a Comment