WAJsal
SENIOR MODERATOR
- Joined
- Aug 31, 2014
- Messages
- 7,879
- Reaction score
- 212
- Country
- Location
Top 10 Ways how NSA Spies
There are many other things that are taking place which are not directly aimed towards potential targets, but in fact to millions of American people who have never been suspected of crime. They are as follows:
10. The NSA information collection process from its suspects
The NSA information collection process for its suspects
Degree one comprised of taking into account the suspect’s phone records and the phone records of those people who had been called by the suspect. Degree two held the selection of those calls which were suspicious. Degree three further checked who these people had called. This needed the approval of major telecommunication companies, including AT&T, Sprint and MCI, convinced by the United States government to forward client’s call-records details. This gave them access to the client’s name, home address, and other information. In addition, the government also received details about further calls made by these clients.
9. Telephone companies helped NSA giving access to information
Telephone companies help NSA giving access to information
Telecommunication companies assisted and helped NSA, providing them with the database of the suspect. The information like the talks exchanged are not legal to be passed on but information like date and time of call can be legally passed on with prior permission of the authorities. Telephone companies provided NSA with the information.
8. The NSA asked for information that companies were already having
The NSA asks for information companies already have
One of the major Ways NSA Spied was its spying program for information available online, PRISM, was revealed recently by former NSA constructor Edward Snowden. This program is a giant interface for all the information that has been already collected through online services like the social media. PRISM is a government code name for SIGAD US-984XN which is a data collection effort. This collects stored information through companies such as Apple and Google. It is indicated that PRISM is “the number one source of raw intelligence used for NSA analytic reports”. It also makes up for 91% of the NSA’s Internet traffic acquire.
7. The NSA shifted through everything that crossed the border
The NSA sifts through everything that crosses the border
NSA screened the electronic mails of the suspects which helped to provide them with the information of any electronic mails exchanged which were unusual or doubtful.
6. Another one of the Ways NSA Spied on You was that it monitored online activity real-time
Another one of the Ways NSA Spies on You is that it can monitor online activity real-time
The online information of the suspects went to two places which were the recipient server of the United States and to the government. This helped NSA to extract out the information much easily and with base.
5. The NSA assumed suspect to be a foreigner until it was proven otherwise
The NSA assumes you’re a foreigner until it is proven otherwise
NSA tried to determine through different strategies about any foreign links of the suspects. NSA treated the suspect as a foreigner until it was proven and the authorities interfere in case of excessive degrees of strictness by NSA. There were several secret rooms, where all the receiving and sifting through information was carried out.
4. Google Cloud Exploitation
Google Cloud Exploitation
By getting into the communication links between Google’s information centers, “MUSCULAR” the NSA program did let them carry out large amounts of information. This was also not within the Foreign Intelligence Surveillance Court jurisdiction but due to the authorities’ pressure, Google was made to provide NSA with the information demanded.
3. Cell phone Tracking
Cell phone Tracking
Even after temporary relief given to the suspect, NSA continued to track the phone of the suspect in order to get the conformation of the activities the suspect was into.
There are many other things that are taking place which are not directly aimed towards potential targets, but in fact to millions of American people who have never been suspected of crime. They are as follows:
10. The NSA information collection process from its suspects
The NSA information collection process for its suspects
Degree one comprised of taking into account the suspect’s phone records and the phone records of those people who had been called by the suspect. Degree two held the selection of those calls which were suspicious. Degree three further checked who these people had called. This needed the approval of major telecommunication companies, including AT&T, Sprint and MCI, convinced by the United States government to forward client’s call-records details. This gave them access to the client’s name, home address, and other information. In addition, the government also received details about further calls made by these clients.
9. Telephone companies helped NSA giving access to information
Telephone companies help NSA giving access to information
Telecommunication companies assisted and helped NSA, providing them with the database of the suspect. The information like the talks exchanged are not legal to be passed on but information like date and time of call can be legally passed on with prior permission of the authorities. Telephone companies provided NSA with the information.
8. The NSA asked for information that companies were already having
The NSA asks for information companies already have
One of the major Ways NSA Spied was its spying program for information available online, PRISM, was revealed recently by former NSA constructor Edward Snowden. This program is a giant interface for all the information that has been already collected through online services like the social media. PRISM is a government code name for SIGAD US-984XN which is a data collection effort. This collects stored information through companies such as Apple and Google. It is indicated that PRISM is “the number one source of raw intelligence used for NSA analytic reports”. It also makes up for 91% of the NSA’s Internet traffic acquire.
7. The NSA shifted through everything that crossed the border
The NSA sifts through everything that crosses the border
NSA screened the electronic mails of the suspects which helped to provide them with the information of any electronic mails exchanged which were unusual or doubtful.
6. Another one of the Ways NSA Spied on You was that it monitored online activity real-time
Another one of the Ways NSA Spies on You is that it can monitor online activity real-time
The online information of the suspects went to two places which were the recipient server of the United States and to the government. This helped NSA to extract out the information much easily and with base.
5. The NSA assumed suspect to be a foreigner until it was proven otherwise
The NSA assumes you’re a foreigner until it is proven otherwise
NSA tried to determine through different strategies about any foreign links of the suspects. NSA treated the suspect as a foreigner until it was proven and the authorities interfere in case of excessive degrees of strictness by NSA. There were several secret rooms, where all the receiving and sifting through information was carried out.
4. Google Cloud Exploitation
Google Cloud Exploitation
By getting into the communication links between Google’s information centers, “MUSCULAR” the NSA program did let them carry out large amounts of information. This was also not within the Foreign Intelligence Surveillance Court jurisdiction but due to the authorities’ pressure, Google was made to provide NSA with the information demanded.
3. Cell phone Tracking
Cell phone Tracking
Even after temporary relief given to the suspect, NSA continued to track the phone of the suspect in order to get the conformation of the activities the suspect was into.