|Recent Featured Videos and Articles||Eastern “Orthodoxy” Refuted||How To Avoid Sin||The Antichrist Identified!||What Fake Christians Get Wrong About Ephesians||Why So Many Can't Believe||“Magicians” Prove A Spiritual World Exists||Amazing Evidence For God||News Links|
|Vatican II “Catholic” Church Exposed||Steps To Convert||Outside The Church There Is No Salvation||E-Exchanges||The Holy Rosary||Padre Pio||Traditional Catholic Issues And Groups||Help Save Souls: Donate|
How the NSA & FBI made Facebook the perfect mass surveillance tool
The National Security Agency and the FBI teamed up in October 2010 to develop techniques for turning Facebook into a surveillance tool.
Documents released alongside security journalist Glenn Greenwald’s new book, “No Place To Hide,” reveal the NSA and FBI partnership, in which the two agencies developed techniques for exploiting Facebook chats, capturing private photos, collecting IP addresses, and gathering private profile data.
According to the slides below, the agencies’ goal for such collection was to capture “a very rich source of information on targets,” including “personal details, ‘pattern of life,’ connections to associates, [and] media.”
NSA documents make painfully clear how the agencies collected information “by exploiting inherent weaknesses in Facebook’s security model” through its use of the popular Akamai content delivery network. The NSA describes its methods as “assumed authentication,” and “security through obscurity.”
The slide below shows how the NSA and U.K. spy agency GCHQ also worked together to “obtain profile and album images.”
Two months ago, following a series of Facebook-related NSA spying leaks, Facebook chief Mark Zuckerberg stated in a blog post that he’s “confused and frustrated by the repeated reports of the behavior of the U.S. government.”
According to a report by The Intercept, the above slides do not reveal the NSA’s Facebook surveillance program in full. The report states that the NSA also “disguises itself as a fake Facebook server” to perform “man-in-the-middle” and “man-on-the-side” attacks and spread malware [below].
to read more: venturebeat.com
Sign up for our free e-mail list to see future vaticancatholic.com videos and articles.