lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 1 Aug 2013 16:48:53 -0400
From: Jeffrey Walton <>
To: Gary Baribault <>
Subject: Re: XKeyscore sees 'nearly EVERYTHING you do

On Thu, Aug 1, 2013 at 2:56 PM, Gary Baribault <> wrote:
> Optically tapping ALL of the submarine cable going into and out of the U.S.
> would still not give them ALL of the claimed data. They have to be tapping
> all of the major traffic exchange sites in the U.S. to get this kind of
> data.
The US does that.

In 'The Spy Factory' ( from
2009, the producers interviewed the AT&T technicians who worked at the
COs where the taps occur. They also interviewed a US Army analyst who
listen in on the calls.

Since the video, there's been a number of documents circulating about
the practice. See, for example,


>  On 08/01/2013 11:31 AM, XF wrote:
>> Did you understood how they collect data ? This is not clear for me...ISP
>> backdoor ? Optical tap on sub marine wire ?
>> Le 1 août 2013 à 16:26, Georgi Guninski <> a écrit :
>>> it will be interesting to me what will remain of the nsa
>>> when the chinese comrades stop giving fresh money to the usa.
>>> Detroit news are not very pink.
>>> On Thu, Aug 01, 2013 at 11:20:27PM +1200, Hugh Davenport wrote:
>>>> meanwhile, in new zealand, prime minister suggests that we aren't
>>>> the slaves for nsa...
>>>> On 2013-08-01 19:23, Georgi Guninski wrote:
>>>>> XKeyscore sees 'nearly EVERYTHING you do online
>>>>> New NSA tool exposed: XKeyscore sees 'nearly EVERYTHING you do online'
>>>>> From the presentation:
>>>>> * Show me all the exploitable machines in country X
>>>>> * How do I find a cell of terrorust that has no
>>>>> connection to known strong-selectors
>>>>> **Anomalous events
>>>>> ***Someone who is using encryption

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists