to understand how and xkeyscore Prism, consider first that the Internet is a physical network, partly consisting of submarine cables. for the NSA, everything starts with the interception of data packets circulate in these facilities the code name for these programs if Fairview, Stormbrew, Blarney or oakstar. - varies by state and methods
the idea is to "take control of the Internet" said a former NSA expert, Thomas Drake, who was. prosecuted for his revelations on this subject.
US espionage connections on their own territory, but also created links abroad. The British security agency has a program similar to the NSA program called Tempora. UK may have received almost € 115 million of US funding, particularly to improve listening on transatlantic cables, has announced the Guardian. In exchange, the United Kingdom can also benefit from the exchange of data with its American ally. According to The Age, Australia also provides assistance, as well as Canada and New Zealand. This global gathering feeds on large databases that are then exploited by NSA analysts.
xkeyscore is actually one of the powerful systems to analyze the raw data of Internet traffic. In 2012, some disclosed documents, at least 41 billion records have been collected, stored and accessed via xkeyscore for 30 days.
The NSA, however, explains that xkeyscore allows U.S.to hand over the terrorists. The program collects data on Internet constantly, whether the content of emails or information on social networks. Private messages on Facebook, for example, are made visible by another xkeyscore tool called "DNI Presenter." In short, everything you do on the Web sources with this program. The program is based on over 700 servers across the world, even in China or Russia. The data is kept between three to five days, even if they are important, as metadata can be stored for thirty days. in fact, xkeyscore operates like a traditional search engine that indicates software: analysts may find browsing history, sites visited, user research, such as emails or people you have emailed
Prism acts to follow in detail . the activities of persons suspected targets. it focuses supervision on a list of suspects identified by the scale of intelligence with the collaboration of nine web groups, including Facebook and Google, it enables detailed control and time real specific Internet users and all data they exchange be stored up. If the range is narrower than xkeyscore, it can follow the history of the activity of a number of targets.
The best way to ensure that your personal data can not be stolen on the Internet is to use a VPN service. The VPN reduces your online movements by replacing your routing information by anonymous IP address. Secure DNS servers VPN keep secret requests that you make, so that nobody can see your browsing history. In addition, your Internet connection is encrypted with a very strong system that protects you against hackers and illegal ears trying to listen and obtain sensitive information about you. Your Internet connection is hidden behind the servers The number of VPN: when connected to the VPN, no one can access your computer or mobile device without using VPN protected servers
0 Komentar