NSA Wiretapping and Snowden on the run

Strapped

Superstar
Joined
May 1, 2012
Messages
42,490
Reputation
1,435
Daps
52,025
Reppin
404
No law on the books will stop or deter the n. S. A. From doing what it wants. They operate like the c.I. A. , no fukks given
 

thernbroom

Superstar
Joined
May 4, 2012
Messages
16,864
Reputation
1,685
Daps
44,241
:wow:

NSA could 'spy on offline computers', says latest leak

Citing documents from whistleblower Edward Snowden, the New York Times said 100,000 machines were fitted with small devices that emitted radio waves.

Targets included the Chinese and Russian military as well as drug cartels, the newspaper claimed.

On Friday, the US President is expected to address concerns over NSA activity.

Quoting sources "briefed" on Barack Obama's plans, the Times reported that restrictions on the scope of collecting bulk telephone data will feature, and that a person will be appointed to represent the views of the public in secret intelligence meetings.

Furthermore, tighter controls on foreign surveillance will be implemented - an attempt, the paper suggests, to dampen the political fall-out from revelations the US had obtained data from the communication tools of world leaders without their knowledge.

Offline access
This latest leak details how the NSA accessed targets by inserting tiny circuit boards or USB cards into computers and using radio waves to transmit data without the need for the machine to be connected to a wider network.

It is a significant revelation in that it undermines what was seen to be one of the simplest but most effective methods of making a system secure: isolating it from the internet.

While the technology involved is not new, its apparent implementation by US security services was previously unknown.

In a statement made to the New York Times, an NSA spokeswoman said none of the targets were in the US, adding: "NSA's activities are focused and specifically deployed against - and only against - valid foreign intelligence targets in response to intelligence requirements.''

"We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of - or give intelligence we collect to - US companies to enhance their international competitiveness or increase
http://www.bbc.co.uk/news/technology-25743074
 

Poitier

My Words Law
Supporter
Joined
Jul 30, 2013
Messages
69,413
Reputation
15,429
Daps
246,346
I'm starting to think this whole thing was planned to discourage certain civilian behavior and give an illusion of control....
 

Crakface

...
Joined
May 4, 2012
Messages
18,500
Reputation
1,520
Daps
25,700
Reppin
L.A
:skip: Social media is the easiest target.

Essentially, the Government employs interns to write Python scripts that mine and collect social media data. Read Violent Python to learn more about the actual techniques, join a Government organization to actually perform said techniques.

You should be more worried about your browsing history and emails being monitored, stored, and mined to create an evolving profile on you. All of this individual data is aggregated and used to uniquely identify you, your history, connections, beliefs, preferences, purchasing habits, and so on.

:umad:
Ok so what. Worst case scenario they come put a bullet in your head. :russ: For alot of yall nikkas thats probably not a bad idea. (not sayin you bruh)
 
Top