The NSA has access to all of your information. There's no such thing as privacy thanks to the NSA.
The NSA has a blanket order to collect private phone information such as the numbers of the parties involved, as well as location, duration and time of the call. The data is then centered in massive storage centers, like the one above
Using radio and wireless technology, the NSA can plant spyware on offline computers
Because online gaming is an effective portal for international communication, the NSA has appropriated it as a surveillance tool. It has already infiltrated popular games such as World of Warcraft and Second Life to collect data and even recruit informants
A Windows crash report contains data on a user's computer and sends it to Microsoft engineers so they can improve user experience. But in the hands of the NSA, crash reports show system vulnerabilities that can be exploited by the agency
The NSA can and has branded people "Terrorist" based off of Facebook Posts
International payments, banking and credit card transactions are flagged and monitored by the NSA. It has specifically targeted big credit card companies like VISA
Even if you're taking the extra step of encrypting private calls and messages, if it's over public airwaves, the NSA can decode it with its sophisticated decryption programs
The NSA program XKeyscore allows the agency to trawl through vast databases that contain private online history of millions of users
All the major smartphones (iPhones, Androids, Blackberry’s) can be hacked by the NSA with little to no trouble. Depending on the situation a legal blanket can be used to justify tapping into anyone remotely related to the “person of Interest.”
For instance, if you try to log onto the Yahoo servers, the NSA can intercept your request and direct you to a mirror site, from where it can monitor and record your activity. Similarly, if you try to visit certain religious or terrorist sites, it can automatically misdirect you and inject malware onto your PC
Not only can the NSA pull information from your social media profiles (Facebook, Twitter, etc.), it can combine it with other private data (GPS location, frequent contacts) to build complex profiles of where you are and who you're with
Over 200 million text messages per day are saved in the super computers at the NSA headquarters
The NSA has a blanket order to collect private phone information such as the numbers of the parties involved, as well as location, duration and time of the call. The data is then centered in massive storage centers, like the one above
Using radio and wireless technology, the NSA can plant spyware on offline computers
Because online gaming is an effective portal for international communication, the NSA has appropriated it as a surveillance tool. It has already infiltrated popular games such as World of Warcraft and Second Life to collect data and even recruit informants
A Windows crash report contains data on a user's computer and sends it to Microsoft engineers so they can improve user experience. But in the hands of the NSA, crash reports show system vulnerabilities that can be exploited by the agency
The NSA can and has branded people "Terrorist" based off of Facebook Posts
International payments, banking and credit card transactions are flagged and monitored by the NSA. It has specifically targeted big credit card companies like VISA
Even if you're taking the extra step of encrypting private calls and messages, if it's over public airwaves, the NSA can decode it with its sophisticated decryption programs
The NSA program XKeyscore allows the agency to trawl through vast databases that contain private online history of millions of users
All the major smartphones (iPhones, Androids, Blackberry’s) can be hacked by the NSA with little to no trouble. Depending on the situation a legal blanket can be used to justify tapping into anyone remotely related to the “person of Interest.”
For instance, if you try to log onto the Yahoo servers, the NSA can intercept your request and direct you to a mirror site, from where it can monitor and record your activity. Similarly, if you try to visit certain religious or terrorist sites, it can automatically misdirect you and inject malware onto your PC
Not only can the NSA pull information from your social media profiles (Facebook, Twitter, etc.), it can combine it with other private data (GPS location, frequent contacts) to build complex profiles of where you are and who you're with
Over 200 million text messages per day are saved in the super computers at the NSA headquarters
No comments:
Write comments