{"id":133316,"date":"2014-05-13T15:59:36","date_gmt":"2014-05-13T19:59:36","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nsa-routinely-tapped-in-flight-internet-intercepted-exported-routers.php"},"modified":"2014-05-13T15:59:36","modified_gmt":"2014-05-13T19:59:36","slug":"nsa-routinely-tapped-in-flight-internet-intercepted-exported-routers","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-routinely-tapped-in-flight-internet-intercepted-exported-routers.php","title":{"rendered":"NSA routinely tapped in-flight Internet, intercepted exported routers"},"content":{"rendered":"<p><p>NSA leaks  View all  <\/p>\n<p>    In his new book No Place to Hide, Glenn Greenwald    revealed a number of additional details onthe craft and    tools used by the NSA and its British counterpart, the GCHQ.    While many of the capabilities and activities Greenwald details    in the book were previously published in reports drawing from    Edward Snowdens vast haul of NSA documents, a number of new    pieces of information have come to lightincluding the NSAs    and GCHQs efforts to use airlines in-flight data service to    track and surveil targeted passengers in real time.  <\/p>\n<p>    The systemscodenamed    Homing Pigeon by the NSA and Thieving Magpie by the    GCHQallowed the agencies to track which aircraft individuals    under surveillance boarded based on their phone data.  <\/p>\n<p>    We can confirm that targets are on board specific flights in    near real time, enabling surveillance or arrest teams to be put    in place in advance, a GCHQ analyst wrote in a PowerPoint    slide presentation on the program. If they use data, we can    also recover email addresss [sic], Facebook IDs, Skype    addresses, etc.  <\/p>\n<p>    The technology allows the NSA and GCHQ to get a geographic fix    on surveilled aircraft once every two minutes in transit.  <\/p>\n<p>    Latest batch of documents leaked shows NSA's power to pwn.  <\/p>\n<p>    Greenwald asserts in his book that at the same time the US    intelligence community and legislators were warning that    Chinese networking vendors Huawei and ZTE were untrustworthy    because of connections to Chinas Peoples Liberation Army, the    NSA was routinely intercept[ing] routers, servers, and other    computer network devices being exported from the US before they    are delivered to the international customers.  <\/p>\n<p>    Greenwald cited a June 2010 report from the head of the NSAs    Access and Target Development department in which the official    wrote, In one recent case, after several months a beacon    implanted through supply-chain interdiction called back to the    NSA covert infrastructure. This call back provided us access to    further exploit the device and the network.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more from the original source: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/arstechnica.com\/tech-policy\/2014\/05\/nsa-routinely-tapped-in-flight-internet-intercepted-exported-routers\" title=\"NSA routinely tapped in-flight Internet, intercepted exported routers\">NSA routinely tapped in-flight Internet, intercepted exported routers<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> NSA leaks View all In his new book No Place to Hide, Glenn Greenwald revealed a number of additional details onthe craft and tools used by the NSA and its British counterpart, the GCHQ. While many of the capabilities and activities Greenwald details in the book were previously published in reports drawing from Edward Snowdens vast haul of NSA documents, a number of new pieces of information have come to lightincluding the NSAs and GCHQs efforts to use airlines in-flight data service to track and surveil targeted passengers in real time. The systemscodenamed Homing Pigeon by the NSA and Thieving Magpie by the GCHQallowed the agencies to track which aircraft individuals under surveillance boarded based on their phone data <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-routinely-tapped-in-flight-internet-intercepted-exported-routers.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-133316","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/133316"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=133316"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/133316\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=133316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=133316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=133316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}