XKeyscore: Global NSA Query Interface (Revealed July 2013)
Introduction
In July 2013, the Guardian published NSA training documents provided by Edward Snowden describing a system called XKeyscore. The documents described XKeyscore as the NSA's ''widest-reaching'' signals intelligence analytic tool — a query interface that allowed NSA analysts to search across enormous repositories of collected internet content and metadata by specifying a selector such as an email address, phone number, IP address, or keyword.
XKeyscore was not itself a collection programme; it was a query and analysis layer sitting atop data collected by the NSA's various upstream and downstream collection capabilities, including taps on international fibre-optic cables and collection from internet exchange points.
What XKeyscore Does
XKeyscore operates as a distributed database and query system. Analysts enter a selector — an identifier associated with a target — and XKeyscore searches across indexed repositories of intercepted data to return matching content and metadata. The repositories hold data for rolling time windows: full content of internet sessions for up to a few days, and metadata for longer periods.
The scope of what XKeyscore indexes is extensive. NSA training slides published by the Guardian included descriptions of the system covering email content and headers, web browsing history, search queries, social media activity, online chat logs, metadata showing communication patterns, and file transfers. Analysts could use XKeyscore to track a target across multiple communications channels, reconstruct browsing activity, and identify previously unknown associates through pattern analysis.
The ''No Warrant Required'' Problem
A significant aspect of the XKeyscore disclosure was the training documents' description of the query process. Analysts could run searches on their own authority for the purpose of intelligence collection on foreign targets. While NSA policy required analysts to document their basis for queries and oversight systems were described as monitoring for abuse, the system allowed real-time access to collected content without requiring the analyst to obtain a court order for each individual search.
This was the feature Glenn Greenwald emphasised in the original Guardian reporting and that Snowden referenced in interviews: an analyst could, in his description, ''sit at a terminal and listen to anyone.'' The NSA disputed characterisations of XKeyscore as permitting unconstrained domestic surveillance, arguing that legal authorities and technical controls limited collection to foreign targets. Subsequent reporting and legal analysis suggested the technical controls were imperfect and that US person communications were captured incidentally.
Global Reach
Training documents indicated that XKeyscore drew on collection from over 150 field sites worldwide. The system was described as covering ''nearly everything a typical user does on the internet.'' Partner intelligence agencies in the Five Eyes alliance — Australia, Canada, New Zealand, and the UK — had access to XKeyscore under bilateral intelligence-sharing arrangements.
Confirmation and Official Response
The NSA confirmed XKeyscore's existence in a statement responding to the Guardian's story, describing it as a tool used for ''valid foreign intelligence purposes'' subject to ''extensive oversight.'' The Office of the Director of National Intelligence subsequently declassified additional information about the programme in 2013 and 2014 in response to public and congressional pressure following the Snowden disclosures.
Multiple independent security researchers and legal analysts have analysed the published XKeyscore slides and assessed them as credible and consistent with known NSA technical architecture.
Verdict
Confirmed. XKeyscore's existence is confirmed by NSA training documents published by the Guardian in July 2013, the NSA's own public acknowledgement, and subsequent government declassifications. The system gives NSA analysts query access to billions of intercepted records across global collection sites, covering email, web browsing, search queries, and chat, with analyst-initiated searches not requiring individual court orders.
Evidence Filters12
NSA training slides published by Guardian confirm system
SupportingStrongThe Guardian published NSA training slides for XKeyscore in July 2013. The slides describe the system's architecture, query capabilities, data types, and geographic coverage across more than 150 field sites. The publication is primary-source documentary evidence.
NSA publicly acknowledged XKeyscore in response to reporting
SupportingStrongThe NSA issued a statement acknowledging XKeyscore's existence while defending its use as subject to 'extensive oversight' and limited to 'valid foreign intelligence purposes.' The public acknowledgement is itself confirmation.
Described as the 'widest-reaching' NSA SIGINT analytic tool
SupportingStrongNSA training documents characterised XKeyscore as the agency's 'widest-reaching' signals intelligence analytic system. The claim is consistent with the described global scope (150+ sites) and data types (email, web, chat, search).
Analysts could query content without per-search court orders
SupportingStrongTraining materials described analysts initiating searches on their own authority without obtaining individual court orders for each query, relying instead on the pre-existing collection authorities and internal policy controls for query justification.
ODNI subsequently declassified additional XKeyscore details
SupportingStrongThe Office of the Director of National Intelligence, responding to post-Snowden political pressure, declassified additional information about XKeyscore and related programmes in 2013 and 2014, confirming aspects of the Guardian's reporting.
NSA disputed 'listen to anyone' characterisation
DebunkingThe NSA and administration officials disputed Snowden's description that an analyst could 'sit at a terminal and listen to anyone,' arguing that legal authorities, minimisation procedures, and technical controls limited collection to foreign targets and prevented domestic abuse.
Rebuttal
The NSA's dispute concerns the scope and limits of XKeyscore use, not its existence. The system's existence and broad query capabilities are confirmed. The legal and policy constraints on its use are separately disputed and under ongoing litigation.
Five Eyes partners had access under intelligence-sharing arrangements
SupportingTraining documents indicated that partner intelligence agencies in the Five Eyes alliance — Australia, Canada, New Zealand, and the UK — had access to XKeyscore under bilateral intelligence-sharing agreements, extending the system's effective reach beyond US collection alone.
Independent security researchers assessed slides as technically credible
SupportingCryptographers and network security researchers who reviewed the published XKeyscore slides assessed them as technically credible and consistent with the described architecture for indexing and querying large-scale intercepted internet data.
XKeyscore Is a Query Interface, Not an Independent Collection Programme
NeutralXKeyscore functions as a federated search tool across data already collected by upstream programmes (PRISM, MUSCULAR, RAMPART-A, cable taps). It does not itself collect data; it indexes and retrieves content within NSA's distributed infrastructure. Snowden's slide deck describing XKeyscore's capabilities therefore reflects the aggregate collection of multiple authorised programmes, not a standalone system with independent collection authority. This distinction matters because legal constraints, oversight mechanisms, and accountability frameworks apply to the upstream collection programmes, not to XKeyscore as a retrieval interface.
XKeyscore Is a Search Interface Dependent on Prior Collection Authority
NeutralXKeyscore is a database query and analysis tool, not itself a collection program. Its capabilities are bounded by what data underlying collection programs — PRISM, MUSCULAR, upstream collection — have already gathered under their respective legal authorities. An analyst querying XKeyscore cannot access data that hasn't been collected and indexed by these prior programs. This matters because the most alarming descriptions of XKeyscore — implying an analyst can query "everything on the internet" — conflate the search interface with the underlying collection infrastructure. The scope of accessible data depends on collection authorities, FISA-court-approved selectors, and data-retention policies, not solely on XKeyscore's query capabilities.
Show 2 more evidence points
FISA Court-Approved Selectors Formally Constrain Analyst Queries
DebunkingNSA's minimisation procedures, reviewed annually by the FISA Court, require that queries of raw collection databases use court-approved "selectors" (identifiers like email addresses or phone numbers) tied to foreign intelligence purposes. NSA Inspector General reports (partially declassified 2013–2014) document instances of non-compliance and the resulting disciplinary processes. While these constraints are imperfect and self-reported, they demonstrate that XKeyscore access is not the unrestricted "wiretap anyone" capability that Snowden's presentation slides, read without operational context, might suggest.
Documented Minimization Procedures Constrain Casual Analyst Access
DebunkingNSA minimization procedures, partially declassified following Snowden and subsequent FOIA litigation, require analysts to document justification for queries involving US-person identifiers and prohibit "about" queries on US persons without specific legal authorization. NSA Inspector General reports document compliance violations — suggesting oversight existed and caught some violations — rather than a system with no controls. FISA Court opinions (some declassified) imposed additional restrictions on how query results involving US persons could be used. These constraints are imperfect and have been violated, but their existence limits the "any analyst can spy on anyone" characterization that XKeyscore presentations, taken out of context, can imply.
Evidence Cited by Believers7
NSA training slides published by Guardian confirm system
SupportingStrongThe Guardian published NSA training slides for XKeyscore in July 2013. The slides describe the system's architecture, query capabilities, data types, and geographic coverage across more than 150 field sites. The publication is primary-source documentary evidence.
NSA publicly acknowledged XKeyscore in response to reporting
SupportingStrongThe NSA issued a statement acknowledging XKeyscore's existence while defending its use as subject to 'extensive oversight' and limited to 'valid foreign intelligence purposes.' The public acknowledgement is itself confirmation.
Described as the 'widest-reaching' NSA SIGINT analytic tool
SupportingStrongNSA training documents characterised XKeyscore as the agency's 'widest-reaching' signals intelligence analytic system. The claim is consistent with the described global scope (150+ sites) and data types (email, web, chat, search).
Analysts could query content without per-search court orders
SupportingStrongTraining materials described analysts initiating searches on their own authority without obtaining individual court orders for each query, relying instead on the pre-existing collection authorities and internal policy controls for query justification.
ODNI subsequently declassified additional XKeyscore details
SupportingStrongThe Office of the Director of National Intelligence, responding to post-Snowden political pressure, declassified additional information about XKeyscore and related programmes in 2013 and 2014, confirming aspects of the Guardian's reporting.
Five Eyes partners had access under intelligence-sharing arrangements
SupportingTraining documents indicated that partner intelligence agencies in the Five Eyes alliance — Australia, Canada, New Zealand, and the UK — had access to XKeyscore under bilateral intelligence-sharing agreements, extending the system's effective reach beyond US collection alone.
Independent security researchers assessed slides as technically credible
SupportingCryptographers and network security researchers who reviewed the published XKeyscore slides assessed them as technically credible and consistent with the described architecture for indexing and querying large-scale intercepted internet data.
Counter-Evidence3
NSA disputed 'listen to anyone' characterisation
DebunkingThe NSA and administration officials disputed Snowden's description that an analyst could 'sit at a terminal and listen to anyone,' arguing that legal authorities, minimisation procedures, and technical controls limited collection to foreign targets and prevented domestic abuse.
Rebuttal
The NSA's dispute concerns the scope and limits of XKeyscore use, not its existence. The system's existence and broad query capabilities are confirmed. The legal and policy constraints on its use are separately disputed and under ongoing litigation.
FISA Court-Approved Selectors Formally Constrain Analyst Queries
DebunkingNSA's minimisation procedures, reviewed annually by the FISA Court, require that queries of raw collection databases use court-approved "selectors" (identifiers like email addresses or phone numbers) tied to foreign intelligence purposes. NSA Inspector General reports (partially declassified 2013–2014) document instances of non-compliance and the resulting disciplinary processes. While these constraints are imperfect and self-reported, they demonstrate that XKeyscore access is not the unrestricted "wiretap anyone" capability that Snowden's presentation slides, read without operational context, might suggest.
Documented Minimization Procedures Constrain Casual Analyst Access
DebunkingNSA minimization procedures, partially declassified following Snowden and subsequent FOIA litigation, require analysts to document justification for queries involving US-person identifiers and prohibit "about" queries on US persons without specific legal authorization. NSA Inspector General reports document compliance violations — suggesting oversight existed and caught some violations — rather than a system with no controls. FISA Court opinions (some declassified) imposed additional restrictions on how query results involving US persons could be used. These constraints are imperfect and have been violated, but their existence limits the "any analyst can spy on anyone" characterization that XKeyscore presentations, taken out of context, can imply.
Neutral / Ambiguous2
XKeyscore Is a Query Interface, Not an Independent Collection Programme
NeutralXKeyscore functions as a federated search tool across data already collected by upstream programmes (PRISM, MUSCULAR, RAMPART-A, cable taps). It does not itself collect data; it indexes and retrieves content within NSA's distributed infrastructure. Snowden's slide deck describing XKeyscore's capabilities therefore reflects the aggregate collection of multiple authorised programmes, not a standalone system with independent collection authority. This distinction matters because legal constraints, oversight mechanisms, and accountability frameworks apply to the upstream collection programmes, not to XKeyscore as a retrieval interface.
XKeyscore Is a Search Interface Dependent on Prior Collection Authority
NeutralXKeyscore is a database query and analysis tool, not itself a collection program. Its capabilities are bounded by what data underlying collection programs — PRISM, MUSCULAR, upstream collection — have already gathered under their respective legal authorities. An analyst querying XKeyscore cannot access data that hasn't been collected and indexed by these prior programs. This matters because the most alarming descriptions of XKeyscore — implying an analyst can query "everything on the internet" — conflate the search interface with the underlying collection infrastructure. The scope of accessible data depends on collection authorities, FISA-court-approved selectors, and data-retention policies, not solely on XKeyscore's query capabilities.
Timeline
XKeyscore reaches operational maturity
According to NSA training materials, XKeyscore reaches operational maturity as the agency's primary query interface over collected internet data, integrating feeds from collection points at over 150 field sites globally into a searchable indexed system.
Snowden publicly identifies himself as the source
Edward Snowden, a former NSA contractor working through Booz Allen Hamilton, publicly identifies himself as the source of the NSA documents published by the Guardian and Washington Post. He describes his access to systems including XKeyscore in subsequent interviews.
Guardian publishes XKeyscore training slides
The Guardian publishes NSA training slides for XKeyscore, including descriptions of the system's query capabilities, data types, and global site coverage. The NSA issues a statement the same day acknowledging the programme.
Source →ODNI releases additional XKeyscore declassifications
The Office of the Director of National Intelligence releases additional declassified information about XKeyscore and related programmes as part of an administration transparency initiative following sustained congressional and public pressure from the Snowden disclosures.
Verdict
Confirmed by NSA training documents published by the Guardian in July 2013 and by the NSA's own public statement acknowledging the programme. XKeyscore allows analysts to query billions of intercepted internet records — email, browsing, search, chat — across 150+ global collection sites by selector, without obtaining individual court orders for each search. The ODNI subsequently declassified additional details.
Frequently Asked Questions
What can an NSA analyst do with XKeyscore?
According to NSA training slides published by the Guardian, an analyst can query XKeyscore by entering a selector (email address, phone number, IP address, or keyword) to search across billions of indexed records covering email content, web browsing history, search queries, chat logs, and file transfers. The system returns matching content and metadata from rolling repositories maintained at over 150 global field sites.
Did XKeyscore require a court order for each search?
Training documents described analysts initiating searches on their own authority without obtaining individual court orders for each query. Analysts were required to document their basis for queries, and oversight systems were described as monitoring for abuse. The NSA disputed characterisations of XKeyscore as permitting unconstrained domestic surveillance, arguing legal authorities and technical controls limited collection to foreign targets.
Did the NSA confirm XKeyscore exists?
Yes. The NSA issued a public statement on 31 July 2013 — the same day the Guardian published the training slides — acknowledging XKeyscore's existence while defending its use as subject to 'extensive oversight' and limited to 'valid foreign intelligence purposes.' The ODNI subsequently declassified additional details about the programme.
What data types does XKeyscore index?
NSA training materials describe XKeyscore as indexing email content and headers, web browsing history, search queries, social media activity, online chat logs, file transfers, and metadata showing communication patterns. The system covers content collected from internet sessions (retained for shorter rolling windows) and metadata (retained longer).
Sources
Show 3 more sources
Further Reading
- bookPermanent Record — Edward Snowden (2019)
- articleXKeyscore: NSA tool collects nearly everything a user does on the internet (Guardian) — Glenn Greenwald (2013)
- documentaryCitizenfour (documentary) — Laura Poitras (2014)