NSA's XKeyscore Source Code Leaked! Shows Tor Users Classified As 'Extremists'

from the peeling-away-the-layers dept

We learnt about the NSA's XKeyscore program a year ago, and about its incredibly wide reach. But now the German TV stations NDR and WDR claim to have excerpts from its source code. We already knew that the NSA and GCHQ have been targeting Tor and its users, but the latest leak reveals some details about which Tor exit nodes were selected for surveillance -- including at least one in Germany, which is likely to increase public anger there. It also shows that Tor users are explicitly regarded as "extremists" (original in German, pointed out to us by @liese_mueller):

The source code contains both technical instructions and comments from the developers that provide an insight into the mind of the NSA. Thus, all users of such programs are equated with "extremists".
Such is the concern about Tor that even visitors to Tor sites -- whether or not they use the program -- have their details recorded:
not only long-term users of this encryption software become targets for the [US] secret service. Anyone who wants to visit the official Tor Web site simply for information is highlighted.
The source code also gives the lie to the oft-repeated claim that only metadata, not content, is gathered:
With the source code can be proven beyond reasonable doubt for the first time that the NSA is reading not only so-called metadata, that is, connection data. If emails are sent using the Tor network, then programming code shows that the contents -- the so-called email-body -- are evaluated and stored.
As well as all this interesting information, what's important here is that it suggests the source of this leak -- presumably Edward Snowden, although the German news report does not name him -- copied not just NSA documents, but source code too. As in the present case, that is likely to provide a level of detail that goes well beyond descriptive texts.

Follow me @glynmoody on Twitter or identi.ca, and +glynmoody on Google+

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: content, extremists, gchq, metadata, nsa, source code, surveillance, tor, xkeyscore


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • icon
    Ninja (profile), 3 Jul 2014 @ 6:34am

    O wow.. I'm an extremist O_O

    Who else here is an extremist?

    Does this make Techdirt a terrorist/extremist group? (NSA generalization says everybody here is now a potential target ;D)

    link to this | view in chronology ]

    • icon
      rw (profile), 3 Jul 2014 @ 7:15am

      Re:

      Count me in!

      link to this | view in chronology ]

    • identicon
      Anonymous Coward, 3 Jul 2014 @ 8:10am

      Re:

      I've used tor before, I guess that makes me an extremist. What's more I'm Palestinian (though I'm not Muslim) so that's two out of three.

      link to this | view in chronology ]

      • icon
        Anonsters (profile), 3 Jul 2014 @ 9:07am

        Re: Re:

        Oh, come on. You ought to know by now that being Palestinian means that you're a double-whammy worst-of-the-worst bad person. 'Murica!

        link to this | view in chronology ]

      • identicon
        Varsil, 3 Jul 2014 @ 9:40am

        Re: Re:

        I don't think the NSA believes in the existence of non-Muslim Palestinians. So don't worry, they're counting you as 3/3.

        link to this | view in chronology ]

        • identicon
          Anonymous Coward, 3 Jul 2014 @ 3:38pm

          Re: Re: Re:

          To be fair since you're responding to an extremist they will classify you as one too.

          link to this | view in chronology ]

    • identicon
      Anonymous Coward, 3 Jul 2014 @ 8:27am

      Re:

      Everyone here is an Extremist!

      All of their definitions are so damn broad that is the only classification left that applies. Including our elected officials.

      link to this | view in chronology ]

      • identicon
        Anonymous Coward, 3 Jul 2014 @ 8:39am

        Re: Re:

        There is an exemption for elected officials, at least the corrupt ones. Being an honest person is considered extreme while being a corrupt politician bought by corporations is considered normal.

        link to this | view in chronology ]

    • identicon
      Anonymous Coward, 3 Jul 2014 @ 8:42am

      Re: I've got you all beat

      Not only do I run a Tor relay, but I've written open source code that uses encryption and I've posted anonymous comments that make fun of the NSA. To add icing to the cake, one time, I had a missed call on my cell phone and it had a country code of Egypt on it.

      So I'm sure I'm now considered a valid selector by the NSA. And thanks to Obama's two hop rule, by downloading this comment you are now a valid target to have all your email downloaded, read, processed and saved for later use by the government as they see fit.

      link to this | view in chronology ]

    • icon
      Seegras (profile), 3 Jul 2014 @ 8:50am

      Re:

      > Who else here is an extremist?

      That I wouldn't know. But obviously those guys in the NSA are extremists.

      link to this | view in chronology ]

    • identicon
      Michael, 3 Jul 2014 @ 9:05am

      Re:

      The first rule of extremist club: don't talk about extremist club.

      link to this | view in chronology ]

    • identicon
      Anonymous Coward, 3 Jul 2014 @ 9:25am

      Re:

      Probably as according to Cory Doctorow just looking up anything about TOR makes you an extremist, so they probably consider Techdirt a hotbed of extremists, as it has discussed TOR etc.

      link to this | view in chronology ]

    • identicon
      PRMan, 3 Jul 2014 @ 10:19am

      Re:

      I went there once to see what it was. Guess I am extreme.

      link to this | view in chronology ]

      • identicon
        Anonymous Coward, 3 Jul 2014 @ 12:20pm

        Re: Re:

        I went there once to see what it was. Guess I am extreme.

        Ditto that. And I used my work computer, too.

        link to this | view in chronology ]

    • identicon
      Anonymous Coward, 3 Jul 2014 @ 10:08pm

      Re:

      Who else here is an extremist?

      At least TD readers are aware of the issues. But I do feel bad for people like Ty Pennington, snowboarders, anyone who eats Doritos...

      link to this | view in chronology ]

    • icon
      TtfnJohn (profile), 5 Jul 2014 @ 10:40am

      Re:

      I've been in rooms in church basements full, just packed, with extremists!! These are Alcoholics Anonymous where some newbies take the Anonymity clause to ridiculous extremes and so use Tor as their way of maintaining their anonymity while on line! Though they'll stay members pf Facebook! Which we all know is just packed with extremists!

      link to this | view in chronology ]

  • icon
    TheResidentSkeptic (profile), 3 Jul 2014 @ 7:12am

    I'm the oldest one!

    I'm a 61 yr old tor exit node operator! Now I have an FBI file and an NSA file!!! I'm SO proud!!!!

    Let's all run out to wally world, grab a cheap laptop, toss a tor exit node on it, and fire it up. Let's see how many we can get going here!

    link to this | view in chronology ]

    • icon
      Beta (profile), 3 Jul 2014 @ 8:30am

      Re: I'm the oldest one!

      You need a handle! How about Black Fire? Wax Man? Pink Oboe? Mister Six? The Cultural Reference?

      link to this | view in chronology ]

      • identicon
        Anonymous Coward, 3 Jul 2014 @ 8:44am

        Re: Re: I'm the oldest one!

        Ooh, Ooh, I call overweight white guy in the suburbs. Or OWIGITS for short.

        link to this | view in chronology ]

      • identicon
        Anonymous Coward, 3 Jul 2014 @ 8:47am

        Re: Re: I'm the oldest one!

        He needs the name WANG FIRE! Because nothing is epic without WANG FIRE!

        link to this | view in chronology ]

      • identicon
        Anonymous Coward, 3 Jul 2014 @ 10:32am

        Re: Re: I'm the oldest one!

        Cemetery Wind has a nice right to it!

        link to this | view in chronology ]

  • identicon
    Anonymous Coward, 3 Jul 2014 @ 7:46am

    Please people, keep using Tor and claiming it's secure...

    link to this | view in chronology ]

    • identicon
      Jack, 3 Jul 2014 @ 8:05am

      Re:

      Well, if they are just targeting exit nodes and don't have both your entry and exit nodes compromised, as long as you aren't using any personally identifying information (obvious ones like name and address, and non-obvious ones like user-agent, headers, and cookies) you are still fine and anonymous. They can see what you are doing, but not who you are.

      As long as you are careful about how you are using TOR, it is still safe. That is until the NSA has all 3 of your nodes compromised...

      A big caveat for the NSA though - while they may be able to compromise a few nodes here and there or set up a bunch of fake nodes, it is such a big network that it would be very unlikely to have both your entry and exit node at the same time. Plus, you can simply change your route through the TOR network with a single click, which should be done often anyway. 5 or 10 years from now, who knows...

      Always treat TOR like you are being monitored and are already compromised. Switch routes frequently, never use the same user-agent, always rotate through names/accounts, never allow JS and always make sure cookies are cleared out and sessions are closed after every single use.

      Plus, you can always use proxy-chains and go through a VPN before entering TOR - it doesn't slow you down at all since TOR is always slower than a VPN.

      link to this | view in chronology ]

    • identicon
      Ruben, 3 Jul 2014 @ 9:16am

      Re:

      Tor all by itself doesn't really help that much from a security standpoint.

      Tor on windows borders on futile. You can be exploited so many other ways.

      The only way to approach security(if you really care) is holistically. Start with a secure OS from a trusted source, and build up from there. The tails project is a good way to achieve this without too much effort.

      link to this | view in chronology ]

  • identicon
    Anonymous Coward, 3 Jul 2014 @ 7:54am

    GitHub, anyone?

    I'd be interested in seeing the source code put in a git repository in order to comb it over for potential flaws

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 3 Jul 2014 @ 10:28am

      Re: GitHub, anyone?

      Here is the core routine:

      bool isExtermest(std::string name) {
      if (name != "John Smith") {
      return true; // Not an american.
      }

      if (name == "John Smith") {
      return true; // Obviously hiding something.
      }

      // Lots of irrelevant code.

      return false;
      }

      link to this | view in chronology ]

      • identicon
        Anonymous Coward, 3 Jul 2014 @ 10:38am

        Re: Re: GitHub, anyone?

        I fixed that inefficient code for you, this will do what you want.. (*)

        bool isExtremist(std::string name) {

        return true;
        }

        (* efficiency is important here after all, we can't waste processor cycles when we're processing everyone on the darned planet and in orbit around it, and we have built in capability for processing non-earth aliens by not using human characteristics as determinants)

        link to this | view in chronology ]

  • identicon
    Michael, 3 Jul 2014 @ 7:55am

    Snowden really Tor them a new a**hole with this leak.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 3 Jul 2014 @ 8:32am

      Re:

      That was Toriffic!

      link to this | view in chronology ]

    • identicon
      Anonymous Coward, 3 Jul 2014 @ 9:31am

      Re:

      Nowhere does it say that this leak came from Snowden. It's possible. But it's just as likely that someone else has stepped up and leaked this in the wake of all that has happened. Still we can expect to see Roger's shooting his mouth off with all kinds of unsubstantiated allegations this weekend.

      link to this | view in chronology ]

      • identicon
        Michael, 3 Jul 2014 @ 9:47am

        Re: Re:

        First, the likelihood of another NSA employee or contractor leaking something like this right now? Snowden is very likely the source.

        Second - are you really trying to start up a real conversation on my bad "tor" pun thread?

        link to this | view in chronology ]

        • identicon
          Anonymous Coward, 3 Jul 2014 @ 10:48am

          Re: Re: Re:

          1. I don't think it's much of a stretch to that someone else might leak information right now considering... 1. Anyone choosing to leak now knows that there are plenty of people out there that will support and try to protect them and 2. the public is paying attention these sorts of things and 3. they have practically been given a road map with step by step instructions for doing it successfully.

          2. I didn't really mean to divert your pun torrent either.

          link to this | view in chronology ]

        • identicon
          Ruben, 3 Jul 2014 @ 11:38am

          Re: Re: Re:

          This doesn't fit with previous content leaked from the Snowden cache. I believe there's a second leaker involved in this. Every article I've seen which cited a Snowden leak was conspicuously labeled as such. Why wouldn't that be the case here?

          link to this | view in chronology ]

        • icon
          Eldakka (profile), 3 Jul 2014 @ 6:36pm

          Re: Re: Re:

          Actually I think it's easier to leak stuff right now, as Snowden will get the blame no-matter who the leaker is.

          link to this | view in chronology ]

      • identicon
        Anonymous Coward, 3 Jul 2014 @ 12:31pm

        Re: Re:

        Whoever it is - this could be the start of something huge. I wonder what other pieces of source code they may have absconded. Encryption/decryption routines? Exploits created in-house?

        link to this | view in chronology ]

    • icon
      Josh in CharlotteNC (profile), 3 Jul 2014 @ 12:56pm

      Re:

      The idea of a second leaker is getting some traction. Bruce Schneier and Cory Doctorow both think this did not come from the Snowden docs.

      link to this | view in chronology ]

  • identicon
    alternatives(), 3 Jul 2014 @ 7:56am

    if BRL-CAD is free because it is a public work

    why isn't xkeyscore?

    link to this | view in chronology ]

    • identicon
      Michael, 3 Jul 2014 @ 7:58am

      Re: if BRL-CAD is free because it is a public work

      because TERRORISTS!!!!!

      link to this | view in chronology ]

      • identicon
        DogBreath, 3 Jul 2014 @ 10:27am

        Re: Re: if BRL-CAD is free because it is a public work

        I thought it was : "because TorRORISTS!!!!!"

        link to this | view in chronology ]

  • icon
    orbitalinsertion (profile), 3 Jul 2014 @ 8:23am

    If Tor users are extremists,

    what does that make the NSA?

    link to this | view in chronology ]

    • identicon
      Michael, 3 Jul 2014 @ 8:47am

      Re: If Tor users are extremists,

      freedom fighters

      link to this | view in chronology ]

      • icon
        art guerrilla (profile), 3 Jul 2014 @ 8:49am

        Re: Re: If Tor users are extremists,

        fighting *against* freedom, you mean ? ? ?
        you got that right...

        link to this | view in chronology ]

      • identicon
        mcinsand, 3 Jul 2014 @ 8:58am

        freedom fighters

        I have to agree. Within the US, NSA does work hard to fight against freedom.

        link to this | view in chronology ]

        • identicon
          Anonymous Coward, 3 Jul 2014 @ 9:01am

          Re: freedom fighters

          I was going to replace "US" with "world", but then I realized those are basically the same thing to the USG

          link to this | view in chronology ]

      • identicon
        Anonymous Coward, 3 Jul 2014 @ 9:33am

        Re: Re: If Tor users are extremists,

        You mean like how fire fighters fight fire right?

        link to this | view in chronology ]

  • identicon
    Keyboard-Rider, 3 Jul 2014 @ 8:30am

    Suggestion for a secure PC & Internet in times of surveillance scandal

    • Operating system: https://tails.boum.org/ (used by Snowden; free software, which tunnels all internet traffic automatically through the TOR network, and which surface can look like the surface of Windows 8 or XP)
    • + https://freenetproject.org (most secure anonymous filesharing software, which exists so far)

    Regarding software the most important thing is to use a secure operation system; it's the fundament for everything, which you do with a PC regarding software. So it's a weakness, if on the one hand one relies on programs like the freenet project or TOR, but on the other hand does so on foundation of windows, which has a direct wire to the NSA.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 3 Jul 2014 @ 1:08pm

      Re: Suggestion for a secure PC & Internet in times of surveillance scandal

      Heads up. There hasn't been a version of Tails yet that doesn't phone home in some manner. In the beginning, their justification for the behavior was to "count" Tails users. Now, many versions down the line, it's automatically "checking for updates". You cannot defeat this with any setting, although you could certainly hex-edit the executable, and burn a new iso (recommended).

      This inexorable connection to boum.org, *in and of itself*, is a red-flag pointing to Tails usage.

      link to this | view in chronology ]

  • identicon
    mcinsand, 3 Jul 2014 @ 8:33am

    given their behavior

    If a Tor user is an extremist, I have no doubt that they would call the Bill of Rights authors full blown terrorists.

    link to this | view in chronology ]

    • icon
      Seegras (profile), 3 Jul 2014 @ 8:53am

      Re: given their behavior

      > I have no doubt that they would call the Bill of Rights
      > authors full blown terrorists.

      Totally so. If George Washington and Thomas Jefferson were alive today, the US government would have a revolutionary war going against it.

      link to this | view in chronology ]

      • icon
        That One Guy (profile), 3 Jul 2014 @ 1:04pm

        Re: Re: given their behavior

        Oh nothing so large-scale I'm sure, as soon as they started to look like they were trouble-makers, they'd have been scooped up, black bagged, and disappeared in a cell somewhere.

        link to this | view in chronology ]

    • identicon
      Anonymous Coward, 3 Jul 2014 @ 8:53am

      Re: given their behavior

      Apparently they were extremists as well. ...at least according to the DoD.

      0_o

      link to this | view in chronology ]

  • identicon
    Anonymous Coward, 3 Jul 2014 @ 8:37am

    Next thing you know

    New NSA leak, anyone associated with Techdirt is an extremist.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 3 Jul 2014 @ 8:41am

    mmm

    I not only use Tor but develop a version of it that is in wide distribution.

    God only knows now what they have no me.

    link to this | view in chronology ]

    • icon
      Lars (profile), 3 Jul 2014 @ 10:36am

      Re: mmm

      Literally everything.

      Ever seen the contents of a full background check? Now add in everything you've ever posted online, posted near you online, or referred to anything you've ever even viewed online.

      link to this | view in chronology ]

  • icon
    BentFranklin (profile), 3 Jul 2014 @ 8:55am

    The extremists are the ones who say "anything is permissible" in the fight against what ever it is they are fighting. that is probably the number one hallmark of extremism. So on that basis I put NSA and Al Qaeda in the same bin.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 3 Jul 2014 @ 9:01am

    Whatever is an extremist

    Hey whatever how does it fell knowing that you are classified as an extremist by those you support?

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 3 Jul 2014 @ 5:36pm

      Re: Whatever is an extremist

      Was going to post this, but someone beat me to the punch.

      Obviously Whatever is fine with it, because all copyright/NSA fanboys are masochists by nature. How else could they loudly and proudly claim more copyright extensions and surveillance betters culture and society, while still keeping a poker face?

      link to this | view in chronology ]

    • identicon
      Anonymous Coward, 4 Jul 2014 @ 7:29pm

      Re: Whatever is an extremist

      Agreed. Couldn't have happened to a nicer asshole.

      link to this | view in chronology ]

  • icon
    sorrykb (profile), 3 Jul 2014 @ 9:22am

    At this point...

    ...if you're not being classified as an extremist by the NSA, you're doing something wrong.

    link to this | view in chronology ]

  • identicon
    tomczerniawski, 3 Jul 2014 @ 9:25am

    Well, since we're already extremists...

    It's high time we all started learning how to make bombs.

    I mean, you never know when that kind of thing will be handy, as an extremist.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 3 Jul 2014 @ 9:33am

    I am an extremist

    time to behave like one!


    Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 3 Jul 2014 @ 9:37am

    So wait

    If I post the link to the Tor homepage, am I giving material aid to terrrrrists? Also, would the NSA classify Googlebot as a person of interest when it follows said link?

    link to this | view in chronology ]

  • identicon
    Digitari, 3 Jul 2014 @ 10:12am

    Oldie, but a Goody

    Tora, Tora, Tora!!

    (will this put the MPAA on the extremist list?)

    http://www.imdb.com/title/tt0066473/

    link to this | view in chronology ]

  • icon
    Jeff (profile), 3 Jul 2014 @ 10:13am

    Kafka called...

    The unbelievable irony of the NSA calling Tor users 'extremists' - the USG provides 80% of the funding for Tor(1)... so does that make the rest of the Gov't extremists too?

    -------------
    Fowler, Geoffrey A. (17 December 2012). Tor: An Anonymous, And Controversial, Way to Web-Surf. Wall Street Journal. Retrieved 3 July 2014

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 3 Jul 2014 @ 1:14pm

      Re: Kafka called...

      No. In their view, they're providing you rope in the hopes you will hang yourself (so to speak).

      link to this | view in chronology ]

    • icon
      T (profile), 3 Jul 2014 @ 11:49pm

      Re: Kafka called...

      I'd say it makes them a state sponsor of Torrorism.

      Next they'll be arguing in court that because it's so government-funded, users have no expectation of privacy!

      link to this | view in chronology ]

  • identicon
    Gaming_Geek, 3 Jul 2014 @ 10:49am

    We're all extremists! The more the merrier I guess!

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 3 Jul 2014 @ 1:24pm

    I didn't realize I was an extremist. I guess now I have to breed terriers and start listening to Abba.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 3 Jul 2014 @ 2:23pm

    even visitors to Tor sites -- whether or not they use the program -- have their details recorded


    So curiosity suicide-bombed the cat then?

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 3 Jul 2014 @ 3:07pm

    The source code comments left by these NSA spying extremists, provides us with a clear picture into the culture and mindset of radical NSA spying fanatics.

    link to this | view in chronology ]

  • icon
    Padpaw (profile), 3 Jul 2014 @ 3:53pm

    Under the enemy expatriation act ( H.R. 3166 and S. 1698)the US government can strip a US citizen of their citizenship and their rights if they are classified as a terrorist.

    So what makes a citizen a terrorist, anything and everything these days.

    If you visit sites that preach dissent against any form of government misconduct congrats your a terrorist. If you protest anything peaceful or violent, your a terrorist. If you question your government over anything again your labelled a terrorist.

    Just look at the NDA to see extreme examples of how "national security" trumps the constitution.

    link to this | view in chronology ]

  • icon
    Coyne Tibbets (profile), 3 Jul 2014 @ 10:13pm

    Extremely extremist sensitive

    I would be interested to know if there is even one single person in the whole wide world, that NSA would not list as an extremist. (Assuming there are any it hasn't already listed.)

    link to this | view in chronology ]

    • icon
      T (profile), 3 Jul 2014 @ 11:57pm

      Re: Extremely extremist sensitive

      The President at the time. Him/her ever be an extremist or violate the law? Un-possible!

      link to this | view in chronology ]

  • identicon
    Benny Adama, 4 Jul 2014 @ 5:25am

    From now on I will make TOR my landing site, and TAILS my Main O/S

    In defiance, I am not using anonymous name:
    From now on I will make TOR my landing site, and TAILS my Main Linux O/S.
    Now Good luck NSA be my daily guest!

    link to this | view in chronology ]

  • identicon
    Peter, 4 Jul 2014 @ 5:37am

    jokers.....

    common,

    this is not the xkeyscore code. everyone who works with this kind of data knows, this is only a selector for something but nothing more.

    do you realy believe the sourcecode for xkeyscore is somewhere on the table ? even, this short piece of code is never ever "The xkeyscore sourcecode".

    .....
    over and out

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 4 Jul 2014 @ 1:00pm

    I am an extreme terrorist!

    link to this | view in chronology ]

  • icon
    Coyne Tibbets (profile), 5 Jul 2014 @ 3:18am

    Not just interested in encryption...

    So let's see...the news articles claim the NSA is interested in people who are interested in encryption or Tor.

    Well, according to the code snippet at NSA Targets the Privacy-Conscious for Surveillance, it goes just a bit beyond that...

    In fact, NSA captures every web search containing one of these words: "linux", "USB", "CD", "IRC" (Internet Relay Chat). They also capture anyone who goes to any article whatsoever that begins with "http://linuxjournal.com/content/linux". Does that sound like "interested in encryption" to you?

    This fits right in with my ideas of the NSA: When they claim they want x, they just capture everything and keep it all. If challenged, they say something like, "No, really, we were only interested in 'x'."

    Should we believe that? When, in this case, they capture every web search that contains the words above, whether it involves encryption or not?

    link to this | view in chronology ]

    • icon
      Coyne Tibbets (profile), 5 Jul 2014 @ 3:35am

      Re: Not just interested in encryption...

      Sigh. I read the code wrong, with respect to the words list. The words must appear in combination with either the word "tails" or term "Amnesiac Incognito Live System". So it's not quite as sensitive to the words as I believed.

      It is sensitive to all the linuxjournal.com articles matching the lead-in, though.

      link to this | view in chronology ]

  • identicon
    abbadabba, 5 Jul 2014 @ 6:13am

    hay

    HAY! I never used this tor before. My bro says it's for downloading stuff without paying for it. So I bet the bums in corporatism are behind this. Imagine how many people they will send to jail for just being cheap bastards who can't wait for it to come out on Netflix.

    Isn't Germany where NewsCorp found someone to make code to help folks download card codes for their competitors' TV satellite services? So that's sort of like tor, passing around the pirated shite, but hoping it kills the competition at the same time.

    Did you catch that criminal activity, NSA? Have you redeployed it?

    link to this | view in chronology ]

  • identicon
    abbadabba, 5 Jul 2014 @ 6:21am

    Germany is perfectly placed to pie face the Five Eyes.

    David Cameron's email in Rebekah Brooks' BlackBerry was reported to the Leveson court to have lost its content after spending three weeks in police custody. The other email had text, so my bet is that's David's Tempora file well passed it's sellbuy date, gone meta after 30 days. Who's the Rose Mary Woods this time? Home Secretary. GCHQ, you silly beans.

    Give Cameron what he deserves, a big BlackBerry Pie in the facebook, Germany! Your pastry is vastly superior to his.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 5 Jul 2014 @ 10:19pm

    All this nonsense about Torrorists, is a bunch of bullsqueeze. Can't we all just be extreme friends?

    link to this | view in chronology ]

  • identicon
    Ali, 7 Jul 2014 @ 8:02am

    boss

    so lets see, I use tor alot, I use linux, I have tails on usb,
    I am a security enthusiastic and most importantly I AM A MUSLIM.

    move along kids Boss is here ;)

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 19 Mar 2015 @ 5:18pm

    Hi,I am a extreemeist looking to Tor the Constitution to pieces and blow up the white house

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 19 Mar 2015 @ 5:19pm

    Hi,I am a extremist looking to Tor the Constitution to pieces and blow up the white house

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 19 Mar 2015 @ 5:19pm

    Hi,I am a extremist looking to Tor the Constitution to pieces and blow up the white house

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 19 Mar 2015 @ 5:19pm

    Hi,I am a extremist looking to Tor the Constitution to pieces and blow up the white house

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 19 Mar 2015 @ 5:19pm

    Hi,I am a extremist looking to Tor the Constitution to pieces and blow up the white house

    link to this | view in chronology ]

  • identicon
    steve, 26 Jan 2016 @ 4:54am

    No wonder SkyNet is already here only what is missing is some artificial intelligence on some quantum supercomputer (or it is already running???)! Notorious Pathological Crazy Americans - the whole god damn world is terrorist then ! They are in desperate need for some Aliens otherwise we are screwed up !

    link to this | view in chronology ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.