Home » Article » Tech Article » How the NSA spies on us

How the NSA spies on us

how-NSA-Spying-on-you How the NSA spies on us

NSA’s collection of eavesdropping resources enables it to tap global web communication. The instruments for targeted tapping of individual web surfers are even more powerful. There is no useful solution to avoid /protect them against this – except for turning off the PC.

Internet

  • Web Communication, Tapping of Internet nodes and submarine cables.
  • Router, Routing data traffic to the NSA server through backdoors
  • IT company networks, Monitoring transfers between data centres
  • Encryption, Creating or using loopholes in crypto-standards
  • Contacts, Demanding customer data from providers
  • Video chat, Spying out Skype connections
  • Web storage, Accessing Cloud contents via secret court orders

Software

  • Operating system, Finding unknown loopholes, breaking in through WLAN
  • Browser, Installing Trojans via manipulated websites
  • Cookies, Requesting and analysing PREF cookies of Google
  • Programmes, Making use of exploits, manipulating downloads

Hardware

  • BIOS, Spying on all system activities using a rootkit
  • Hard disk, Monitoring data transfer of the internal memory
  • Monitor, Recording monitor contents
  • Webcam, Turning it on and taking a photo of the user
  • Keyboard, Recording keyboard movements
  • USB port, Spying on data traffic

How well web service providers protect us

The NSA also eavesdrops on IT giants. They fight back with encryption mechanisms and data transfers – between data centres and with the user. Almost everyone can provide optional HTTPS support, but the strict HSTS is offered only by a few. Stronger protection for HTTPS (PFS, STARTTLS) has only just started emerging.

How-the-NSA-spies-on-us How the NSA spies on us

 

Encryption is becoming a trend

Cryptography is still not a standard but is emerging slowing. The use of encrypted services and anonymisation technologies has shown a steady rise between July and November 2013 alone. However, the majority of surfers are still not interested in encryption.

WEB USERS USE THE FOLLOWING ENCRYPTED SERVICES

WEB-USERS-USE-THE-FOLLOWING-ENCRYPTED-SERVICES How the NSA spies on us

Leave a Reply

Your email address will not be published. Required fields are marked *

Name *
Email *
Website