Top 10 Ways On How NSA Spying On Everyday Americans

Advertisement

Advertisement

Advertisement

The Twin Towers terror attack that happened in the US during September 11th, 2011 exposed many security loopholes in the US security surveillance systems. Post that, the NSA (National Security Agency), under the leadership of then President, George W Bush, has been involved in a series of vigilance activities. These include maintaining a database of all civilians in the US and their connection (if any) with the terrorist group of Al Qaida or other like-minded agencies. What this means to a normal US citizen is that you don’t have the freedom to do what you wanted anymore. The NSA monitors all your actions like your internet browsing history, pictures, programmes that you watch on television, your phone calls, your emails, images from your personal webcams and almost every other personal detail of yours. It is quite alarming, isn’t it? Here are the top 10 ways in which NSA carries out it’s domestic spying activities.

1. From your car license plate

Did you ever know the NSA, in cooperation with various local authorities, scans every single car that passes through a signal or stops over? In the recent past, there have been many instances where car license plates are stolen/replaced, leading to unending investigations. This has provoked the NSA to maintain a huge database, wherein the license plates are scanned and sent to the regional transport authorities. These authorities, in turn, provide all your details (residence, personal information, etc.) to the NSA.

2. From your browsing history

In this piece of alarming information, it was discovered that the NSA had installed secret software on a whopping 100000 computers to track the browsing history of citizens and to check if they are involved in any suspicious exchange of emails/transactions. Yes, it does look like the NSA Is doing its job, but on the face of it, it looked like intruding into harmless Americans’ privacy. Details of NSA’s spying activities came to the light during 2005 only. Innocent citizens were baffled to know that their privacy an agency, none other than the US Government itself, intruded on their privacy.

Advertisement

Advertisement

Advertisement

3. From your phone records

It was only later that the US citizens realised that their phone calls were tapped and tracked by the NSA. For this operation, the NSA partnered with telecom giants like AT&T, Sprint, and MCI, to get details of hundreds of citizens’ phone calls, call records, duration of calls, address and other confidential data. However, getting access to citizens’ personal accounts without their permission was (and still is) considered to be an illegal process. Therefore, there was a huge uproar against the Bush administration for the unfair treatment meted out.

4. Personalized databases for each citizen

The NSA created a personalized database for each citizen in the US with the help of details like phone records, bank statements, insurance policies, browsing history, GPS location and other relevant information. It was reported that the NSA collected a 40 billion records per month to update in their database to track for suspicious movements (if any) of the citizens. On a daily basis, around 1.2million texts, call records and emails are collected by the NSA. Most of these details were collected without confirming to the federal laws of the country.

Advertisement

Advertisement

Advertisement

5. Webcam images

All those naughty images that you and your lover shared through your personal webcam are now in the possession of the NSA. It may sound creepy; but thanks to the special kind of software and fibre optic splitters that it installed, the NSA had access to close to 1.8million images per day. A majority of these images were quite sexual, creating huge embarrassment for the parties concerned. The very fact that all of these were conducted without the knowledge of innocent US citizens shook up the citizens’ faith in the country’s judiciary.

Best VPN Service

Click next below and be sure to check out #5 on the list, it will surprise you……..

Advertisement

Advertisement

Advertisement


Next →

Information technologist, IT security analyst, leader in hacker techniques and countermeasures, solid background in network security and risk management with experience at multiple multi-national firms, creative thinker with problem-solving skills, blogger, writer, privacy advocate,

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

*