I wanted to dedicate a topic regarding technology and privacy. The US government have been exposed spying, not only on Americans but the whole world with other government partners. So this thread is about what we can do to keep our email, phone calls, internet activity and data storage private. 

 

The US Constitution prohibits unreasonable searches and seizures and demands due process in criminal investigations but our politicians and the Supreme Court have worked together to spy on us despite our rights to privacy.

 

Our conversations on cell phone calls can be listen to in real time by cops these days. As a matter of fact you can buy devices that allows you to eavesdrop on anyone's cell phone calls, the companies do not advertise these devices but they are available to anyone. So this is a phone you might be interested in, its called the BlackPhone, kinda expensive 629 bucks. 

 

https://www.blackphone.ch/

 

 

 

 

 

 

 

Original Post

http://www.policestateusa.com/...a-spying-techniques/

  • The NSA can access personal email, chat, and web browsing history. (Source)
  • The NSA tracks the numbers of both parties on phone calls, their locations, as well as time and duration of the call. (Source)
  • The NSA can monitor text messages. (Source)
  • The NSA can monitor the data in smartphone applications. (Source)
  • The NSA can crack cellphone encryption codes. (Source)
  • The NSA can identify individuals’ friends, companions, and social networks. (Source)
  • The NSA monitors financial transactions. (Source)
  • The NSA monitors credit card purchases. (Source)
  • The NSA intercepts troves of personal webcam video from innocent people. (Source)
  • The NSA is working to crack all types of sophisticated computer encryption. (Source)
  • The NSA monitors communications between online gamers. (Source)
  • The NSA can set up fake Internet cafes to spy on unsuspecting users. (Source)
  • The NSA can remotely access computers by setting up a fake wireless connection. (Source)
  • The NSA can use radio waves to hack computers that aren’t connected to the internet. (Source)
  • The NSA can set up fake social networking profiles on LinkedIn for spying purposes. (Source)
  • The NSA undermines secure networks [Tor] by diverting users to non-secure channels. (Source)
  • The NSA can intercept phone calls by setting up fake mobile telephony base stations. (Source)
  • The NSA can install a fake SIM card in a cell phone to secretly control it. (Source)
  • The NSA can physically intercept packages, open them, and alter electronic devices. (Source)
  • The NSA makes a USB thumb drive that provides a wireless backdoor into the host computer. (Source)
  • The NSA can set up stations on rooftops to monitor local cell phone communications. (Source)
  • The NSA spies on text messages in China and can hack Chinese cell phones. (Source)
  • The NSA spies on foreign leaders’ cell phones. (Source)
  • The NSA intercepts meeting notes from foreign dignitaries. (Source)
  • The NSA has hacked into the United Nations’ video conferencing system. (Source)
  • The NSA can spy on ambassadors within embassies. (Source)
  • The NSA can track hotel reservations to monitor lodging arrangements. (Source)
  • The NSA can track communications within media organizations. (Source)
  • The NSA can tap transoceanic fiber-optic cables. (Source)
  • The NSA can intercept communications between aircraft and airports. (Source)

Book Review: Violent Python

In conclusion, Violent Python is an excellent resource that develops and enhances a diverse set of security-related Python skills. The book also serves as a great reference, where recipes could be quickly implemented to address specific issues as they arise. Readers who are actively working in an InfoSec position will likely be able to put their newly acquired skills to use immediately, and those looking to break into the field will acquire skills that differentiate themselves from others who are dependent on prebuilt tools. This title is highly recommended for anyone who wants to improve his or her Python skills within the InfoSec realm.

https://www.ethicalhacker.net/...eview-violent-python

 

Xum

Add Reply

Likes (0)
Post
×
×
×
×