{"id":197731,"date":"2015-04-01T16:07:22","date_gmt":"2015-04-01T20:07:22","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/13-ways-the-nsa-has-spied-on-us.php"},"modified":"2015-04-01T16:07:22","modified_gmt":"2015-04-01T20:07:22","slug":"13-ways-the-nsa-has-spied-on-us","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/13-ways-the-nsa-has-spied-on-us.php","title":{"rendered":"13 ways the NSA has spied on us"},"content":{"rendered":"<p><p>          Getty    Images Commuters on a train to London looking at their    mobile phones and iPad texting and playing    games<\/p>\n<p>      Over the last couple of years, through the revelations of Ed      Snowden and independent reporting by others, we've learned      more and more about the National Security Agency's spying      programs. Indeed, there have now been so many revelations      that it can be hard to keep them straight. So here's a handy      guide to the most significant ways the NSA spies on people in      the United States and around the world.    <\/p>\n<p>      This was one of the first programs revealed by Snowden and it      continues to be one of the most controversial. The Patriot      Act allows the NSA to obtain business records that are      relevant to terrorist investigations. The government claims      that this gives it the power to obtain records  phone number      dialed, time and duration of call  aboutevery      domestic phone call in the United States. Last year the      Obama administrationproposed      changes to require judicial oversight of access to the      database.    <\/p>\n<p>      A slide disclosed by Snowden lists 9 major internet companies       Microsoft, Yahoo, Google, Facebook, PalTalk, YouTube,      Skype, AOL, and Apple  as participating in thePRISM      program. The program allows the NSA to get private      information such as emails, Facebook messages, and stored      documents. It's not known how carefully these information      requests are scrutinized.    <\/p>\n<p>            Tailored Access Operations is the NSA's elite hacking      unit. While some other NSA programs collect information in      bulk, TAO engages in targeted attacks on high-value targets.      It is believed that the NSA has a large library of exploits,      allowing it to hack into a wide variety of consumer gadgets      and business IT systems.    <\/p>\n<p>      The NSAworks      with countries around the world to tap into underseas      fiber optic cables carrying vast quantities of fiber optic      data. There's also evidence that the NSA has      beentapping      into fiber optic cables in the United States.    <\/p>\n<p>      When you log into GMail, you'll see a \"lock\" icon indicating      that communications between your computer and Google's server      is protected by encryption. But until recently, Google didn't      employ encryption when it moved data between its own servers.      The NSA tapped into these connections and harvested large      quantities of user data. Yahoo was also targeted.    <\/p>\n<p>      Documents released by Snowden suggest that at least 35 world      leadershave      been targeted by the NSA, includingBrazilian      president Dilma Rousseff and Mexican president Enrique Pea      Nieto. There were also allegations last year that the NSA      spied on Germanchancellor Angela Merkel, though a      subsequent investigation       cast doubt on that claim.    <\/p>\n<p>      The NSA tapped into communications systems in       Brazil andGermany       and likely other countries as well  to collect information      about ordinary peoples' phone calls and emails.    <\/p>\n<p>      The NSA has spied on cell phone networks around the world,      collecting5      billion records per day about the locations of users'      cell phones. The agency isn't allowed to deliberately target      cell phone users in the United States, but some American cell      phone records have been collected \"incidentally.\"    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.msn.com\/en-us\/news\/us\/13-ways-the-nsa-has-spied-on-us\/ar-AAagKCL?srcref=rss\/RK=0\/RS=pwikVr3jwlAk4edo.wU4Vs235rQ-\" title=\"13 ways the NSA has spied on us\">13 ways the NSA has spied on us<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Getty Images Commuters on a train to London looking at their mobile phones and iPad texting and playing games Over the last couple of years, through the revelations of Ed Snowden and independent reporting by others, we've learned more and more about the National Security Agency's spying programs. Indeed, there have now been so many revelations that it can be hard to keep them straight.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/13-ways-the-nsa-has-spied-on-us.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-197731","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/197731"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=197731"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/197731\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=197731"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=197731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=197731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}