The Online Habits That Trigger NSA Spying

Coverage Type: 

Worried about the National Security Agency monitoring you? If you take certain steps to mask your identity online, such as using the encryption service TOR, or even investigating an alternative to the buggy Windows operating system, you're all but asking for "deep" monitoring by the NSA. How does the NSA access the TORY encryption network? Through a computer system called XKeyscore, one of the various agency surveillance tools that NSA leaker Edward Snowden disclosed last summer. The revelations underscore the fact that in the post-Snowden environment, privacy is less of a give and more of a fast-paced cat-and-mouse game.


The Online Habits That Trigger NSA Spying