Nothing Is a Secret to the NSA (12 pics)

Posted in INTERESTING       4 Jun 2015       7265       1 GALLERY VIEW

The NSA’s spying technology allows it to access to everyone’s information. Here are some things you should know about how it works.

 

The NSA has a blanket order to collect private phone information such as the numbers of the parties involved, as well as location, duration and time of the call. The data is then centered in massive storage centers, like the one above 
Using radio and wireless technology, the NSA can plant spyware on offline computers
Because online gaming is an effective portal for international communication, the NSA has appropriated it as a surveillance tool. It has already infiltrated popular games such as World of Warcraft and Second Life to collect data and even recruit informants 
A Windows crash report contains data on a user's computer and sends it to Microsoft engineers so they can improve user experience. But in the hands of the NSA, crash reports show system vulnerabilities that can be exploited by the agency 
The NSA can and has branded people "Terrorist" based off of Facebook Posts
International payments, banking and credit card transactions are flagged and monitored by the NSA. It has specifically targeted big credit card companies like VISA
Even if you're taking the extra step of encrypting private calls and messages, if it's over public airwaves, the NSA can decode it with its sophisticated decryption programs
The NSA program XKeyscore allows the agency to trawl through vast databases that contain private online history of millions of users
All the major smartphones (iPhones, Androids, Blackberry’s) can be hacked by the NSA with little to no trouble. Depending on the situation a legal blanket can be used to justify tapping into anyone remotely related to the “person of Interest.”
For instance, if you try to log onto the Yahoo servers, the NSA can intercept your request and direct you to a mirror site, from where it can monitor and record your activity. Similarly, if you try to visit certain religious or terrorist sites, it can automatically misdirect you and inject malware onto your PC
Not only can the NSA pull information from your social media profiles (Facebook, Twitter, etc.), it can combine it with other private data (GPS location, frequent contacts) to build complex profiles of where you are and who you're with
Over 200 million text messages per day are saved in the super computers at the NSA headquarters


Advertisement


Credits:  mic.com


1   Comment ?
1
1.
straanj 8 year s ago
1984 is a bit late but worse than expected
       
27353641acute
belayclappingdance3dashdirol
drinksfoolgirl_craygirl_devilgirl_witch
goodgreenheartJC-LOLJC_doubledown
JC_OMG_signkisslaughingman_in_lmocking
mr47_04musicokroflsarcastic
sm_80tonguevishenka_33vomitwassat
yahooshoot
How to Build a Crypto Portfolio That Dominates the Upcoming 2024/25 Bull Run


Advertisement






Advertisement
Advertisement

Archives

2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
0000
Advertisement

How to comment

•    Don't insult other visitors. Offensive comments will be deleted without warning.

•    Comments are accepted in English only.

•    No swearing words in comments, otherwise such comments will be censored.

•    Your nickname and avatar are randomly selected. If you don't post comments for 7 days, they both are reset.

•    To choose another avatar, click the ‘Random avatar’ link.

random_banner_2