Google translate http://daserste.ndr.de/panorama/archiv/2014/Quellcode-ent...
"Based on a secret source code of the NSA WDR and NDR were able to identify victims of the NSA surveillance, especially in Germany. One of them is the Erlangen Student Sebastian Hahn, who in his spare time engaged in encryption technology. He is by Angela Merkel, the first known victim of the NSA.
Basis of the research is a part of the source code of the monitoring program XKEYSCORE, NDR and WDR exclusively present. The source code is the foundation of software.
For the first time the public insight gets so into the closely guarded operation of the NSA software developer and in how monitoring victims are attacked specifically.
Erlanger student targeted by the NSA
Sebastian Hahn devotes his free time with encryption technology, he runs a server for the Anonymierungsnetzwerk goal. That's what has made him the target of the NSA.
Sebastian Hahn is advised because of his hobbies in the crosshairs of the Americans. He runs a server for the Tor anonymizing network, the users try their mark on the Internet to blur. In particular, human rights in countries like Iran are dependent on this program.
The IP address of a server operated by Hahn is precisely defined in the source code of Xkeyscore than to be monitored object. The Target: All users, every day hundreds of thousands who access the TOR server provided by Hahn are specially marked by the NSA, their connections saved. The NSA filters out so that everyone who uses the anonymizing network. This land, according to research from NDR and WDR then in a special NSA database. Sebastian Hahn finds the spying "shocking". Because he wanted to do something good, he random "in the focus of the intelligence services. This is a huge invasion of my privacy."
In addition to the IP address of Sebastian Hahn there is yet another German IP address, that of the Chaos Computer Club.
Whether Sebastian Hahn was spied from German soil, present from the NDR and WDR source code, however, can not be read.
Thomas Stadler, lawyer specializing in IT law, sees a "suspicion of intelligence agents work". The lawyer specializing in IT law, Thomas Stadler, sees a "suspicion of intelligence agents work". The Attorney General expressed only in general: it was examining all instructions.
The XKeyscore source code also shows how easy it is to fall into the pattern of the NSA. Because not only permanent user of this encryption software become the target of the secret service. Anyone who wants to visit the official Torwebseite and merely inform is highlighted. In the case of other encryption providers already forwards the request to a search engine to act suspicious for the NSA.
With the source code can be proven beyond reasonable doubt for the first time, that the NSA is not only so-called metadata, ie data connection reads. Be used emails to connect to the Tor network, then according to the programming command, including the contents of the so-called E-body are evaluated and stored. The relevant quote from the source code is:
The source code contains both technical instructions and comments of the developers that provide an insight into the mind of the NSA. Thus, all users of such programs with "extremists" equated.
On request, the NSA shares with only general, you keep strictly to the law and the "privacy and civil liberties always be considered in the computer monitor."
It is worth noting that this application Tor network is an original idea of the U.S. Navy and is funded until today, with around 800,000 dollars a year from the U.S. government.
Months ago, the "Guardian" had already reported on attempts by the NSA to spy on users of the Tor network, but without knowledge of the source code."