GCHQ's Karma Police: Tracking And Profiling Every Web User, Every Website
#1
One of the very first revelations from the Snowden leaks was a GCHQ program modestly entitled "Mastering the Internet." It was actually quite a good name, since it involved spying on vast swathes of the world's online activity by tapping into the many fiber optic cables carrying Internet traffic that entered and left the UK. The scale of the operation was colossal: the original Guardian article spoke of a theoretical intake of 21 petabytes every day. As the Guardian put it:

Quote:For the 2 billion users of the world wide web, Tempora represents a window on to their everyday lives, sucking up every form of communication from the fibre-optic cables that ring the world.


But the big question was: what exactly did GCHQ do with that huge amount of information? Two years later, we finally know, thanks to a new article in The Intercept, which provides details of another major GCHQ program called "Karma Police" -- the name of a song by Radiohead, with the repeated line "This is what you'll get, when you mess with us". A GCHQ document obtained by Snowden indicates that Karma Police goes back some years -- at least to 2008. It provides the following summary of the project's aims:

Quote:KARMA POLICE aims to correlate every user visible to passive SIGINT [signals intelligence] with every website they visit, hence providing either (a) a web browsing profile for every visible user on the internet, or (b) a user profile for every visible website on the internet.


Profiling every (visible) user, and every (visible) website seems insanely ambitious, especially back in 2008 when computer speeds and storage capacities were far lower than today. But the information that emerges from the new documents published by The Intercept suggests GCHQ really meant it -- and probably achieved it.

Quote:As of 2012, GCHQ was storing about 50 billion metadata records about online communications and Web browsing activity every day, with plans in place to boost capacity to 100 billion daily by the end of that year. The agency, under cover of secrecy, was working to create what it said would soon be the biggest government surveillance system anywhere in the world.


That's around 36 trillion metadata records gathered in 2012 alone -- and it's probably even higher now. As Techdirt has covered previously, intelligence agencies like to say this is "just" metadata -- skating over the fact that metadata is actually much more revealing than traditional content because it is much easier to combine and analyze. An important document released by The Intercept with this story tells us exactly what GCHQ considers to be metadata, and what it says is content. It's called the "Content-Metadata Matrix," and reveals that as far as GCHQ is concerned, "authentication data to a communcations service: login ID, userid, password" are all considered to be metadata, which means GCHQ believes it can legally swipe and store them. Of course, intercepting your login credentials is a good example of why GCHQ's line that it's "only metadata" is ridiculous: doing so gives them access to everything you have and do on that service.

[Image: bK9wGbz.png]
Login ID, userid and password all considered to be "metadata"

The trillions of metadata records are stored in a huge repository called "Black Hole." In August 2009, 41 percent of Black Hole's holdings concerned web browsing histories. The rest included a wide range of other online services: email, instant messenger records, search engine queries, social media, and data about the use of tools providing anonymity online. GCHQ has developed software to analyze these other kinds of metadata in various ways:

Quote:SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums.


In order to connect these different kinds of Internet activity with individuals, GCHQ makes great use of information stored in cookies:

Quote:A top-secret GCHQ document from March 2009 reveals the agency has targeted a range of popular websites as part of an effort to covertly collect cookies on a massive scale. It shows a sample search in which the agency was extracting data from cookies containing information about people's visits to the adult website YouPorn, search engines Yahoo and Google, and the Reuters news website.

Other websites listed as "sources" of cookies in the 2009 document are Hotmail, YouTube, Facebook, Reddit, WordPress, Amazon, and sites operated by the broadcasters CNN, BBC, and the U.K.'s Channel 4.


Clearly the above activities allow incredibly-detailed pictures of an individual's online activities to be built up, not least their porn-viewing habits. One tool designed to "provide a near real-time diarisation of any IP address" is called, rather appropriately, Samuel Pepys, after the famous 17th-century English diarist.

The extraordinary scale of GCHQ's spying on "every visible user" raises key questions about its legality. According to The Intercept story:

Quote:In 2010, GCHQ noted that what amounted to "25 percent of all Internet traffic" was transiting the U.K. through some 1,600 different cables. The agency said that it could "survey the majority of the 1,600" and "select the most valuable to switch into our processing systems."


Much of that traffic will be from UK citizens when they access global services like Google or Facebook, which GCHQ has admitted it defines as "external platforms," and which is thus completely stripped of what few safeguards UK law offers against this kind of intrusive surveillance by GCHQ.

This means that it is certain that many -- perhaps millions -- of UK citizens have been profiled by GCHQ using these newly-revealed programs, without any kind of warrant or authorization being given or even sought. The information stored in the Black Hole respository, and analyzed with tools like Samuel Pepys, provides unprecedented insights into the minutiae of their daily lives -- which websites they visit, which search terms they enter, who they contact by email or message on social networks. Within that material, there is likely to be a host of intimate facts that could prove highly damaging to the individual's career or relationships if revealed -- perfect blackmail material, in other words. Thanks to other Snowden documents, we know that the NSA had plans to use this kind of information in precisely this way. It would be naive to think it would never be used domestically, too.

It's frustrating that it has taken over two years for these latest GCHQ documents to be published, since they reveal that the scale of British online surveillance and analysis is even worse than the first Snowden documents indicated, bad as they were. They prove that the current calls for additional spying powers in the Snooper's Charter are even more outrageous than we thought, since the UK authorities already track and store British citizens' online moves in great detail.

When Edward Snowden handed over his amazing trove of documents to journalists to release as they thought best, he also placed a huge responsibility on their shoulders to do so as expeditiously as possible. If, as seems likely, there are yet more important revelations about the scale of US and UK spying to come, it is imperative that they are published as soon as possible to help the fight against those countries' continuing attempts to bolster mass surveillance and weaken our freedoms.

source
Reply
#2

(Oct 02, 2015, 10:48 am)b2ux Wrote: while we all know this is illegal i can say 100% that it is the users fault ... huh how can i say that 2 reasons you allow it would be one let me explain....
when you connect to something you allow everything you own to be accessed not very many people are computer savoy nor do they do anything to monitor whats connecting to there computer. example:  is your remote access on or off is it blocked and do you know how to get rid of it totally do you use programs to allow access like bomgar as a example if your answer is no to any of this your exposed. Do you monitor your connections and are you encrypted no again your fault and your allowing it. A little known law that goverments dont want you to know is if something trys to connect to your computer it is called a attack weather it is passive or hardened it is still a form of a attack and you by law are allowed to retaliate in turn. The best way to protect yourself less proxies is x-netstat check it out it monitors everything, you can see whats trying to connect and kill any connection you dont want. Use it in turn with ethereal which shows you the packets they are sending to you you can take advantage of them if you can understand what there doing and blast there server without recourse nor the need of a proxy as you are defending your computer from a unprovoked attack. Been there done this a thousand times over. If you know how to retaliate you already know a good ddos tool, nuker and a good sql injector is all ya need to fry a server also i would recommend checking the server for speed as you need to be faster then theres which in case 99% of you are on about the same as they are just upgrade and poof they go ....... I do not condone attacking random people or servers as this is just as bad as they are and I would think most of you are above this type of behavior.
Hope this helps ya'll in some way .......
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Australian Police Ran A Dark Web Child Porn Site For Eleven Months Mike 5 32,471 Jun 16, 2024, 03:15 am
Last Post: stts2
  Ferguson vs. Police Mike 30 56,858 Jun 06, 2024, 19:14 pm
Last Post: stts2
  US: Leaked documents outline DHS’s plans to police disinformation Resurgence 0 5,993 Nov 04, 2022, 11:56 am
Last Post: Resurgence
  Brazil: Indigenous community warns of massacre as police force them off land Resurgence 0 7,448 Jun 30, 2022, 02:17 am
Last Post: Resurgence
  Fully vaccinated account for 4 in every 5 Covid deaths since February in Canada Resurgence 0 6,447 Jun 22, 2022, 01:09 am
Last Post: Resurgence



Users browsing this thread: 1 Guest(s)