I was having dinner last night while I saw a book. At that instant, I saw towards the front cameras of my cellphone and laptop and gave a little smile. Now three types of questions arise in your mind:
- Which book he saw?
- Why he saw towards the mobile and laptop front cameras?
- Why he gave a smile?
It's general that when you see such a statement question arises. Let me clear all these: confusions and queries.
The book's name is Permanent Record. It's the autobiography of Edward Snowden. I read it few days ago. The majority of people know about him. However, let me give you his little introduction. He is a technologist by profession. He worked under the two best Intelligence Agencies of the world: the NSA and the CIA. In 2013, he revealed all the secrets. It included how these agencies secretly collect every single phone call, text message, and email, that all were done with the help of a government. In the book few programs were discussed used for monitoring people. I want to share all of these programs with all of you.
PSP (Presidents Surveillance Program)
PSP was an executive order essentially a set of instructions set down by the American president. The PSP empowered the NSA to collect telephone and internet communications between the (United States) and abroad. Notably, the PSP allowed the NSA to do this without having to obtain a special warrant from Foreign Intelligence Surveillance Court. FISC is a secret federal court established in 1978. Later on, In 2005, PSP had been disclosed by the New York Times.
PRISM
Prism enabled the NSA to routinely collect data from Microsoft, Google, Facebook, Paltock, YouTube, Skye, AOL, and Ale. Including emails, photos, videos, audio chats, web-browsing content, search engine queries, and all other data stored on their clouds.
TURBULENCE, TURMOIL and TURBINE
Suppose you have to do some work online or search for something. You open the browser and enter the URL in it. Before your requests gets to that server, it will have to pass through TURBULENCE, one of the NSA most powerful weapon.
Your request asses through a few blocks of servers, these servers contain two collective tools: TURMOIL and TURBINE. The TURMOIL handles passive collection makes a copy of the data coming through. The second, the TURBINE is in charge of active collection. Its actively tampering with users.
Seeing your request, TURMOIL checks its metadata for selectors. NSA chose the selectors. It depends on them whatever they find suspicious maybe a particular email address, credit card, phone number, and the geographic origin or destination of your internet activity or just certain keywords.
If TURMOIL flags your traffic suspicious, it tips it over to the turbine, which diverts your request to the NSA's servers. In the NSA server, algorithms decide which program will use against you. Then that chosen program is sent back to TURBINE, which injects them into the traffic channel and delivers them to you along with whatever website you requested. The result you get all the content you want, along with all the surveillance you don’t want, and it all happens in less than 686ms. Completely unbeknownst to you. Once the exploits are on your computer, the NSA can access not just your metadata as well your entire digital life now belongs to them.
OPTIC NERVE and PHOTON TORPEDO
OPTIC NERVE, a program that saved a snapshot every five minutes from the cameras of people. Video chatting on platforms like Yahoo Messenger. A PHOTONTOREDO, which grabbed the IP addresses of MSN Messenger users.
XKEYSCORE
Its widest-ranging tool is used to search nearly everything a user does on the internet. An interface that allows you to type in pretty much anyone's address, telephone number, or I address, and then basically go through the recent history of their online activity.
These all programs were exposed by Edward Snowden. I hope you read the whole program and understand them clearly and get your answers to your three questions. The last thing that Snowden mentioned in his book was that if you will search these programs you will maybe under their surveillance.
At the end I just recommend you to give a smile to the front camera of your mobile or laptop, maybe they are watching you right now!
Comments
Post a Comment
If you have any doubt then please let me know