{"id":33153,"date":"2014-01-18T19:09:03","date_gmt":"2014-01-18T19:09:03","guid":{"rendered":"http:\/\/rafaelfajardo.com\/portfolio\/a-running-list-of-things-we-know-the-nsa-can-do\/"},"modified":"2014-01-18T19:09:03","modified_gmt":"2014-01-18T19:09:03","slug":"a-running-list-of-things-we-know-the-nsa-can-do","status":"publish","type":"post","link":"https:\/\/rafaelfajardo.com\/portfolio\/a-running-list-of-things-we-know-the-nsa-can-do\/","title":{"rendered":"A Running List of Things We Know the NSA Can Do. So Far."},"content":{"rendered":"<p><a class=\"tumblr_blog\" href=\"http:\/\/wilwheaton.tumblr.com\/post\/73640958592\/a-running-list-of-things-we-know-the-nsa-can-do-so\">wilwheaton<\/a>:<\/p>\n<blockquote>\n<p><a class=\"tumblr_blog\" href=\"http:\/\/wnyc.tumblr.com\/post\/73627617013\/a-running-list-of-things-we-know-the-nsa-can-do-so\">wnyc<\/a>:<\/p>\n<blockquote>\n<p><strong>Full list on <a href=\"http:\/\/www.wnyc.org\/story\/running-list-what-we-know-nsa-can-do-so-far\/\">the Brian Lehrer Show blog<\/a>.<\/strong><\/p>\n<ul>\n<li class=\"first\">It can track the\u00a0numbers of both parties on a phone call, as well location, time and duration. (<a class=\"external-link\" href=\"http:\/\/www.theguardian.com\/world\/2013\/jun\/06\/nsa-phone-records-verizon-court-order\">More<\/a>)<\/li>\n<li>It can hack Chinese phones and text messages. (<a class=\"external-link\" href=\"http:\/\/www.scmp.com\/news\/china\/article\/1266821\/us-hacks-chinese-mobile-phone-companies-steals-sms-data-edward-snowden\">More<\/a>)<\/li>\n<li>It can set up fake internet cafes. (<a class=\"external-link\" href=\"http:\/\/www.theguardian.com\/uk\/2013\/jun\/16\/gchq-intercepted-communications-g20-summits\">More<\/a>)<\/li>\n<li>It can spy on foreign leaders\u2019 cell phones. (<a class=\"external-link\" href=\"http:\/\/www.theguardian.com\/world\/2013\/oct\/24\/nsa-surveillance-world-leaders-calls\">More<\/a>)<\/li>\n<li>It can tap underwater\u00a0fiber-optic cables. (<a class=\"external-link\" href=\"http:\/\/www.theguardian.com\/uk\/2013\/jun\/21\/gchq-cables-secret-world-communications-nsa\">More<\/a>)<\/li>\n<li>It\u00a0can track communication within media organizations like Al-Jazeera. (<a class=\"external-link\" href=\"http:\/\/www.spiegel.de\/international\/world\/nsa-spied-on-al-jazeera-communications-snowden-document-a-919681.html\">More<\/a>)<\/li>\n<li>It can hack into the UN video conferencing system. (<a class=\"external-link\" href=\"http:\/\/www.reuters.com\/article\/2013\/08\/25\/us-usa-security-nsa-un-idUSBRE97O0DD20130825\">More<\/a>)<\/li>\n<li>It\u00a0can track bank transactions. (<a class=\"external-link\" href=\"http:\/\/www.spiegel.de\/international\/world\/spiegel-exclusive-nsa-spies-on-international-bank-transactions-a-922276.html\">More<\/a>)<\/li>\n<li>It can monitor text messages. (<a class=\"external-link\" href=\"http:\/\/www.bbc.co.uk\/news\/world-us-canada-25770313\">More<\/a>)<\/li>\n<li>It\u00a0can access your email, chat, and web browsing history. (<a class=\"external-link\" href=\"http:\/\/www.theguardian.com\/world\/2013\/jul\/31\/nsa-top-secret-program-online-data\">More<\/a>)<\/li>\n<li>It\u00a0can map your social networks. (<a class=\"external-link\" href=\"http:\/\/www.nytimes.com\/2013\/09\/29\/us\/nsa-examines-social-networks-of-us-citizens.html?_r=0&amp;pagewanted=all\">More<\/a>)<\/li>\n<li>It\u00a0can access your smartphone app data. (<a class=\"external-link\" href=\"http:\/\/www.spiegel.de\/international\/world\/how-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.html\">More<\/a>)<\/li>\n<li>It is trying to get into secret networks like Tor, diverting users to less secure channels. (<a class=\"external-link\" href=\"http:\/\/www.theguardian.com\/world\/interactive\/2013\/oct\/04\/tor-high-secure-internet-anonymity\">More<\/a>)<\/li>\n<li>It can go undercover within embassies to have closer access to foreign networks. (<a class=\"external-link\" href=\"http:\/\/www.spiegel.de\/fotostrecke\/photo-gallery-spies-in-the-embassy-fotostrecke-103079.html\">More<\/a>)<\/li>\n<li>It\u00a0can set up listening posts on the roofs of buildings to monitor communications in a city. (<a class=\"external-link\" href=\"http:\/\/www.spiegel.de\/international\/germany\/cover-story-how-nsa-spied-on-merkel-cell-phone-from-berlin-embassy-a-930205.html\">More<\/a>)<\/li>\n<li>It\u00a0can set up a fake Linkedin. (<a class=\"external-link\" href=\"http:\/\/www.independent.co.uk\/news\/uk\/home-news\/gchq-used-quantum-insert-technique-to-set-up-fake-linkedin-pagesand-spy-on-mobile-phone-giants-8931528.html\">More<\/a>)<\/li>\n<li>It can track the reservations at upscale hotels. (<a class=\"external-link\" href=\"http:\/\/www.spiegel.de\/international\/europe\/gchq-monitors-hotel-reservations-to-track-diplomats-a-933914.html\">More<\/a>)<\/li>\n<li>It can intercept the talking points for Ban Ki-moon\u2019s meeting with Obama. (<a class=\"external-link\" href=\"http:\/\/www.nytimes.com\/2013\/11\/03\/world\/no-morsel-too-minuscule-for-all-consuming-nsa.html\">More<\/a>)<\/li>\n<li>It can crack cellphone encryption codes. (<a class=\"external-link\" href=\"http:\/\/www.washingtonpost.com\/business\/technology\/by-cracking-cellphone-code-nsa-has-capacity-for-decoding-private-conversations\/2013\/12\/13\/e119b598-612f-11e3-bf45-61f69f54fc5f_story.html\">More<\/a>)<\/li>\n<li>It can hack computers that aren\u2019t connected to the internet using radio waves. (<a class=\"external-link\" href=\"http:\/\/www.nytimes.com\/2014\/01\/15\/us\/nsa-effort-pries-open-computers-not-connected-to-internet.html?hp\">More<\/a>)<\/li>\n<li>It can intercept phone calls by setting up fake base stations. (<a class=\"external-link\" href=\"http:\/\/www.dailymail.co.uk\/news\/article-2530859\/NSAs-elite-hacking-unit-intercepted-computers-ordered-online-installed-Spyware-steal-data-toughest-targets.html\">More<\/a>)<\/li>\n<li>It can remotely access a computer by setting up a fake wireless connection. (<a class=\"external-link\" href=\"http:\/\/arstechnica.com\/information-technology\/2013\/12\/inside-the-nsas-leaked-catalog-of-surveillance-magic\/\">More<\/a>)<\/li>\n<li>It can install fake SIM cards to then control a cell phone. (<a class=\"external-link\" href=\"http:\/\/www.gizmodo.com.au\/2014\/01\/a-peek-inside-the-nsas-spy-gear-catalog\/\">More<\/a>)<\/li>\n<li>It can fake a USB thumb drive that\u2019s actually a monitoring device. (<a class=\"external-link\" href=\"http:\/\/www.gizmodo.com.au\/2014\/01\/a-peek-inside-the-nsas-spy-gear-catalog\/\">More<\/a>)<\/li>\n<li>It can crack all types of sophisticated computer encryption. (Update: It is\u00a0<em>trying<\/em>\u00a0to build this capability.) (<a class=\"external-link\" href=\"http:\/\/www.usatoday.com\/story\/news\/nation\/2014\/01\/02\/nsa-computer-break-encryption\/4294871\/\">More<\/a>)<\/li>\n<li>It can go into online games and monitor communication. (<a class=\"external-link\" href=\"http:\/\/www.nytimes.com\/2013\/12\/10\/world\/spies-dragnet-reaches-a-playing-field-of-elves-and-trolls.html\">More<\/a>)<\/li>\n<li class=\"last\">It can intercept communications between aircraft and airports. (<a class=\"external-link\" href=\"http:\/\/www.webcitation.org\/query?url=http%3A%2F%2Fwww.nytimes.com%2F2013%2F11%2F03%2Fworld%2Fno-morsel-too-minuscule-for-all-consuming-nsa.html%3Fpagewanted%3D7%26_r%3D2%26pagewanted%3Dall&amp;date=2013-11-25\">More<\/a>)<\/li>\n<\/ul>\n<p>-Jody, BL Show-<\/p>\n<\/blockquote>\n<p><a href=\"http:\/\/imgur.com\/PvXfIUG\"><img decoding=\"async\" alt=\"image\" src=\"http:\/\/i.imgur.com\/PvXfIUG.png\" title=\"Hosted by imgur.com\" \/><\/a><\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>wilwheaton: wnyc: Full list on the Brian Lehrer Show blog. It can track the\u00a0numbers of both parties on a phone call, as well location, time and duration. (More) It can hack Chinese phones and text messages. (More) It can set up fake internet cafes. (More) It can spy on foreign leaders\u2019 cell phones. (More) It [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[],"tags":[1539],"class_list":["post-33153","post","type-post","status-publish","format-standard","hentry","tag-emergent-digital-practices"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p6PWot-8CJ","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/posts\/33153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/comments?post=33153"}],"version-history":[{"count":0,"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/posts\/33153\/revisions"}],"wp:attachment":[{"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/media?parent=33153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/categories?post=33153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rafaelfajardo.com\/portfolio\/wp-json\/wp\/v2\/tags?post=33153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}