Best Reviews logo
Best Reviews may receive compensation for its content through paid collaborations and/or affiliate links. Learn more about how we sustain our work and review products.
How Does the NSA Spy on Us?

How Does the NSA Spy on Us?

By Leo S.Leo S. Verified by Adam B.Adam B. Last updated: July 19, 2024 (0)

Since the major Edward Snowden scandal that shocked the world back in 2013, people are now aware of the fact that the NSA has a vast range of ways to spy not only on American citizens but on the rest of the world, too. In fact, the National Security Agency has eyes and ears in pretty much every corner of the earth thanks to some ingenious methods that not even the most infamous of spies would think of.

From hacking exploits and underwater cables across the ocean to massive data gathering programs and movement tracking, it’s clear the NSA is a resourceful agency that saves no expense in turning the world into a Big Brother state. And yes, they know you’re reading this article too.

PRISM and other techniques

First of all, it’s crucial to have the notion that every device connected to the internet is vulnerable– something experts have highlighted numerous times before. Among the various ways used by the NSA to spy on citizens, PRISM represents the largest of them all, accounting for roughly 91% of all data gathered by the agency.

PRISM is a program that collects internet communications from ISPs and other services like Facebook, Google, Apple and many more, which by itself covers pretty much every online step users might take. But this is just the tip of a colossal iceberg hiding beneath the ice-cold waters of the deep and dark ocean that is government spying.

And this is more than just a metaphor, too, since the NSA goes as far as attaching snooping devices to underwater fiber optical cables, which are responsible for keeping the internet up and running throughout the world. Without any proper agreements between the various intelligence agencies of other countries to install said exploits, the NSA can just take a submarine down to the cables and install the devices themselves.

Tapping into credit card networks and internet connected devices is also a common practice, meaning the agency knows exactly what people spend money on and what they say to each other on calls, through text messages and such. This is the responsibility of the Tailored Access Operations hacking division, whose set of bug exploits is extensive and allows for the easy breaking into of devices. This is, in fact, often facilitated by the vulnerabilities that the NSA forces manufacturers to install on their devices, too.

And that’s still not all. It is known that cell phone towers are used to pinpoint a device’s exact location within a city. In this regard, recent cases have shown that even without a SIM card inserted, Android devices are still able to send coordinates back to Google, which in turn is required by PRISM to hand over to the NSA.

International espionage

Contrary to what many may still believe, the intrusive NSA spying methods are not limited to America. Who doesn’t remember in 2015 when an infamous WikiLeaks document revealed that German ministries had been spied on since the 90s, which even included cellphone and email data of Chancellor Angela Merkel?

Likewise, the same source published more documents revealing NSA’s actions on the Brazilian government, disclosing phone numbers of nearly 30 ministers, also including Dilma Rousseff, president of the country at the time. In this case, the NSA went even further, with what WikiLeaks described as “an economic espionage campaign against Brazil” by spying on entities responsible for managing the country’s economy, including the head of its Central Bank.

Taking the most appropriate measures

All this is but a sample of the extent of what is achieved by the NSA behind closed doors at its headquarters in Fort Meade, Maryland. Yet nowadays, thanks to Edward Snowden, WikiLeaks and other such revelations, the world now has a better understanding that nothing is truly private and that our online behavior is more controlled than ever.

As such even doing something as trivial as a Google search is not safe, so it’s vital to keep in mind that a higher entity – not only NSA but any number of others as well – could be paying attention. There are measures you can take, however, like shielding your connection behind a trustworthy VPN, particularly the providers with transparent no-log policies and that are preferably headquartered in a country with more free data retention laws.

User Feedback

 Leave a reply

Your email address will not be published. Required fields are marked *


Latest Articles

How To Master English Fluency: 10 Effective Tips and Tricks
When it comes to language learning, we often come across the word ‘fluency’. But what does it mean exactly? Simply put, fluency is the ability to articulate a message ...
Read article
4 Reasons To Choose CRM Software With AI
With the competition increasing, maintaining lasting customer relationships is more crucial than ever. Customer relationship management (CRM) systems have long been the backbone of most businesses’ effective interaction management, helping them streamline processes, improve satisfaction, and boost sales
Read article
Empower Your Wedding With The Perfect Hashtag
Do you remember the time when # was a simple sign used only in phone menus? The mundane past of the hashtag is now gone, because Twitter came, saw, and turned this barely known sign into a global Internet craze. 
Read article

Best Reviews

Best Reviews may receive compensation for its content through paid collaborations and/or affiliate links. Learn more about how we sustain our work and review products.

©2012-2024 Best Reviews, a clovio brand – All rights reserved
Privacy policy · Cookie policy · Terms of use · Partnerships · Contact us