What The NSA Can Do (That We Know)

January 17, 2014, by Ken Jorgustin

what-the-nsa-can-do

Here is a list of things we now know the NSA can do, based on media reports and other publicly available documents.

The list originates from Jody Avirgan, the associate producer of the Brian Lehrer Show of New York City’s public radio station WNYC. I’ve attached supporting links to the list.

No doubt that this is just the tip of the iceberg…


 
It can track numbers of both parties on a phone call, location, time and duration.

It can hack Chinese phones and text messages.

It can set up fake internet cafes.

It can spy on foreign leaders’ cell phones.

It can tap underwater fiber-optic cables.

It can track communication within media organizations.

It can hack into the UN video conferencing system.

It can track bank transactions.

It can monitor text messages.

It can access your email, chat, and web browsing history.

It can map your social networks.

It can access your smartphone app data.

It is trying to get into secret networks like Tor, diverting users to less secure channels.

It can go undercover within embassies to have closer access to foreign networks.

It can set up listening posts on the roofs of buildings to monitor communications in a city.

It can set up a fake LinkedIn.

It can track the reservations at hotels.

It can intercept the talking points for Ban Ki-moon’s meeting with Obama.

It can crack cellphone encryption codes.

It can hack computers that aren’t connected to the internet using radio waves.

It can intercept phone calls by setting up fake base stations.

It can remotely access a computer by setting up a fake wireless connection.

It can install fake SIM cards to then control a cell phone.

It can fake a USB thumb drive that’s actually a monitoring device.

It can crack all types of computer encryption and is building more of this capability.

It can go into online games and monitor communication.

It can intercept communications between aircraft and airports.

It can physically intercept deliveries, open packages, and make changes to devices.

It can tap into links between Google and Yahoo data centers to collect email and other.

 
Trials need to be held by those spying on us…