Saturday 26 April 2014

Edward Snowden's NSA Revelation List

Edward Snowden
National Security Agency (NSA): leaked
Edward Snowden is a former CIA technical assistant and contractor who fled from Hawaii to Hong Kong to Russia after leaked loads of classified documents on surveillance in the U.S and around the world possessed originally by the National Security Agency (NSA).Through tactics he has yet to reveal he was able to gain access to information about government programs intended to monitor phone records and internet activity to establish patterns of behavior consistent with terrorism or other crime. Below are parts of the information that Edward Snowden leaked :

NSA Spying Programs


1) Prism Program
PRISM is the NSA effort to collect massive amounts of data from internet companies such as email content, search histories and file transfers tied to potential terrorism or espionage suspects. The PowerPoint presentation confirmed that the NSA is able to directly access the servers of "major US service providers,” describing collaboration with tech companies like YouTube, Skype, Google and Apple. Google, Apple, and others in the tech industry
(credit via globalpost)

2) Tap Smartphone Data
The NSA can access con­tacts lists, SMS, user loca­tion and more on the three most pop­u­lar mobile platforms.Spanish media reports that the NSA monitored 60 million phone calls in Spain in one month
(credit via spiegel )

3) XKeyscore System
Xkeyscore programs gave the government the ability to access nearly all digital communications.
(credit via globalpost,spiegel )

4) Boundless Infomant
Boundless Informant is a tool that allows the NSA to compile and track the “metadata” it collects around the world. In the month of March alone, nearly 3 billion pieces of information were collected from US networks and 97 billion pieces worldwide
(credit via globalpost)

5) Monitor International Financial Transactions
NSA surveillance program called “Follow the Money” designed to monitor international payments, banking and credit transactions. Snowden also alleged that the NSA monitored transaction of major credit card companies.
(credit via ibtimes)

6) NSA Disguised Itself As Google To Spy
A technique commonly used by hackers, a MITM attack involves using a fake security certificate to pose as a legitimate Web service, bypass browser security settings, and then intercept data that an unsuspecting person is sending to that service. Hackers could, for example, pose as a banking Web site and steal passwords.The hackers then use the password to log in to the real banking site and then serve as a "man in the middle," col­lect­ing all the data between the indi­vid­ual and the site.
(credit via cnet )

7) Defeat Internet Privacy and Security Encryption
Through a $250m-a-year US pro­gram, the NSA works covertly with tech com­pa­nies to insert secret vul­ner­a­bil­i­ties – known as back­doors or trap­doors – into com­mer­cial encryp­tion soft­ware, allow­ing them to unlock the encryp­tion when used to pro­tect emails, bank­ing and med­ical records. The NSA describes strong decryp­tion pro­grams as the “price of admis­sion for the US to main­tain unre­stricted access to and use of cyber­space”. Secu­rity experts say pro­grams ‘under­mine the fab­ric of the internet’.
(credit via guardian)

NSA's Headquarters

Who The NSA Spies On ?


1) Hacks China Networks To Spy
After fleeing to Hong Kong, Edward Snowden told the South China Morning Post that the NSA had led more than 61,000 hacking operations worldwide, including many in Hong Kong and mainland China.
He said targets in Hong Kong included the Chinese University, public officials and businesses.
(credit via bbc)


2) Secretly Monited Video at The U.N's Hq
The NSA decoded and secretly mon­i­tored the inter­nal video con­fer­enc­ing sys­tem at the U.N.‘s head­quar­ters in New York last year.
(credit via huffingtonpost)

3) Spying on Verizon Customer
The paper published the secret court order directing telecommunications company Verizon to hand over all its telephone data to the NSA on an "ongoing daily basis".
(credit via bbc)

4) Embassies 'under surveillance'
A total of 38 embassies and missions have been the "targets" of US spying operations, according to a secret file leaked to the Guardian. Countries targeted included France, Italy and Greece, as well as America's non-European allies such as Japan, South Korea and India
(credit via bbc)

5) Latin America 'monitored'
Revelations shows that NSA ran a continent-wide surveillance programme on Latin America ,NSA document showing that emails and phone calls of the presidents of Mexico and Brazil had been intercepted. Also, the US had been spying on Brazil's state-owned oil firm Petrobras.
(credit via bbc)

6) Hacking Al Jazeera Broadcasting
The NSA was able hack into Al Jazeera’s sys­tems to access and read the Arab news broadcaster’s communications.
(credit via cnet)

4 comments:

  1. baca boleh pecaye jangan 100%. btw i like to read conspiracy theories.

    ReplyDelete
  2. Hi salam perkenalan :) U have a great and nice blog. Do u mind to visit and follow my blog ? awksweetgitu.blogspot.com =) It always open for everybody. :D

    ReplyDelete
  3. Thank you very much really I like your post.

    ReplyDelete