The NSA regularly intercepts laptop shipments to implant malware, report says

page: 2
33
<< 1   >>

log in

join

posted on Dec, 31 2013 @ 09:20 AM
link   

azrael36

ausername

There is no such thing as privacy in the advanced digital age. NONE, ZERO, NADA... No reasonable expectation of privacy when using any form of digital communications of ANY kind, encrypted or not.

Anyone who assumes they can achieve complete anonymity and privacy are making a dangerous assumption. That said, unless you are an important person, or someone engaging in illegal or suspicious activity or otherwise have a need for secrecy and privacy you really have nothing to fear. They are not monitoring everyone and everything all the time, they can't and don't need to...


That is the attitude that allows this mess to continue unabated... It's apathetic, the loss of privacy is but just one more step in the non stop chipping away of freedoms and liberties...


It's not an attitude as much as it is an expression of the reality as it exists. It isn't going to change, they are not going to stop, no amount of oversight and transparency is going to change that reality.

At some point you can either accept that reality, or choose to remain ignorant of it, and/or willfully oblivious to it.




posted on Dec, 31 2013 @ 02:14 PM
link   

fossilera
reply to post by Ghost147
 



In short - I think the NSA has better time than to install these devices in laptops going to an average citizen. -fossilera


I would have agreed with that comment last year but no longer since I've learned they have been data mining those boring average citizen's emails, chats, phonecalls etc. since at lease 2010. That's a lot of chit chat and boring calls to grandma they must be interested in.



posted on Dec, 31 2013 @ 02:23 PM
link   
I don't know why anyone is worried?

Look, the NSA can tell the type of screw on the wing of a Boeing 747 from orbit. Even with that capability, it still took our government over 10 years to find a 6'7" Arab man dying of kidney failure.

I bet they intercept to much information for it to usually be of any real value. It's one thing to have information, but it's another to be able to make sense out of it.

Besides, as I said in another thread; for years now I as a civilian could buy and app that would let me spy on someone. All you have to do is get access to someone's phone and install it. The person will never know the app is on their phone at all. Once you've installed it, you can turn on the mic and camera, view their photos, read their texts, track them via GPS and listen in on calls. You can even read their emails.

If I have the ability to do that, why is it any surprise that the NSA has had this?

But still...10 years to find OBL with all this data collection/gathering the NSA has? I'm not to worried.



posted on Dec, 31 2013 @ 02:48 PM
link   

MystikMushroom
I don't know why anyone is worried?

Look, the NSA can tell the type of screw on the wing of a Boeing 747 from orbit. Even with that capability, it still took our government over 10 years to find a 6'7" Arab man dying of kidney failure.


That is a good point, but anyone involved in global surveillance would admit that a long time ago Al Qaeda and other terrorist groups and affiliates have all learned well how to avoid the NSA and other agencies, especially how to evade detection and tracking via electronic communications etc.

Why are we spending hundreds of BILLIONS in more, and more advanced data collection and processing centers while expanding these capabilities on every level of technology?

Could it be that domestic, public, government and corporate surveillance is the real objective?




posted on Dec, 31 2013 @ 08:34 PM
link   
reply to post by Ghost147
 


This is just a dose of misinformation trying to throw you off of the real story. They don't need to intercept laptops to install anything because they got the operating system manufacturer (Microsoft) to embed hidden backdoors for them long long ago. This is slight of hand at it's most devious.



posted on Dec, 31 2013 @ 08:56 PM
link   
As a person in the tech field yes bugs can be quite tiny.
I assure you that isn't the smallest. I held one smaller than that probably a 1/4 of that size back in the 80's and could transmit sound up to 3 miles. Micro electronic technology gets better and smaller. So there are spy cams, sound, GPS tracking now all packaged into a tiny little unit that would fit on Roosevelt's head on a dime.

Many laptops have GPS and TPM chips built in. It's enabled in the bios. Dell laptops come to mind as they have more security. If you do lots of travel anywhere use a Dell or a laptop that has that security feature. With the GPS and TPM chip enabled, combined with full disk encryption on the drive is about as secure as you can get physically with that laptop. It's funny how the authorities trash laptops and order people about to give up access to their stuff. Guys, you don't need a laptop, or a USB stick anymore. Welcome to the world of cloud computing and cloud storage HAHAHA
edit on 31-12-2013 by sean because: (no reason given)
edit on 31-12-2013 by sean because: (no reason given)



posted on Dec, 31 2013 @ 09:18 PM
link   
reply to post by sean
 


sean, for some reason your video isn't working. could you re-link? I would greatly like to see!



posted on Jan, 2 2014 @ 02:21 AM
link   
1997, I have access to a cool software from Israel, it does not tap into the computer, it tap into the switch, and it can display ALL coming into and out from your computer - realtime.

It also can replay back, modify and simulate, everything you do (network communication) to the internet. It decode stuff on the fly (require quite a feat at that time - 256MB RAM !). Imagine, letter by letter the password come out!

I remembered, I watch the porn pic before the user screen even display it.
Hahaha, later, we just walk by the user and watch him struggling wahahahaha

Then later, they develop SSH, passwords not available anymore to me. It was fun but I have lots more other work than to read love letters.
..
and that is 1997 people folks.

No, I do not need to install anything on the target pc. Plug and play (word at that time) at its best.
edit on 2-1-2014 by NullVoid because: (no reason given)



posted on Jan, 2 2014 @ 03:27 AM
link   
A physical device (however tiny) is unlikely to be used by Govt security services on ordinary people.

If anyone can prove this statement incorrect; lets see the devices.

This device (if it existed) would be of enormous interest to everybody and , if found, would jeopardize every other device out there so it is very unlikely unless the purchaser of the laptop is somehow involved in something that directly attracts the security services attention.

As others have stated, the mess that is Microsoft OS's and it's implicit lack of security provides a variety of options to cease control of device using software that is freely available to anyone...



posted on Jan, 2 2014 @ 07:24 AM
link   

Jukiodone
A physical device (however tiny) is unlikely to be used by Govt security services on ordinary people.

If anyone can prove this statement incorrect; lets see the devices.

This device (if it existed) would be of enormous interest to everybody and , if found, would jeopardize every other device out there so it is very unlikely unless the purchaser of the laptop is somehow involved in something that directly attracts the security services attention.

As others have stated, the mess that is Microsoft OS's and it's implicit lack of security provides a variety of options to cease control of device using software that is freely available to anyone...



Yes, the device usually for targeted entity, for the mass, software can do far better than hardware, in fact NSA going "software" years ago already, big time investment.



posted on Jan, 2 2014 @ 09:34 AM
link   
reply to post by Ghost147
 


no strange hardware, my camera came on by itself and i double checked my video conversation apps and they were all off, i noticed the camera light flashing and the sound that skype makes when it dials but i was logged out of skype



posted on Jan, 2 2014 @ 09:14 PM
link   
reply to post by Bassago
 

This is common practice with a despotic data-information cartel running the nsa now.

-Microscopic GPS Beacon can be put on your car,house,laptop,clothes,cheeseburger,hat,cat...
-Silent sound technology(very old)
-micro-drones
-cell signal intercepts(old)
-RATs(old)
-embedded spyware IC(like the ones on intel sandy bridge aka amt)
-backdoors built into hardware(chinese hackers exploit a flaw on chinese manufactured cisco routers to gain access to important info)
-backdoors built into software(some brands of win8 pcs and the nsa)
www.theregister.co.uk...
-microscopic listening devices
-implanted listening devices(old)
-real-time satellite photographs from multiple angles(googlemaps on steriods/HGH) straight from army core of engineers.(old)
-hard taps on internet transmissions(old and recently reported that the nsa does this)
-drones that can see through walls with infrared,xray
-smart sand
-smart meters
-wifi scanning
-robot insects
-robot birds/wildlife(extremely useful on a real battlefield) from DARPA
-fake trees,sticks,rocks/pebbles,lampposts,pipes,hollowed logs/branches anything lol that are actually spy hubs that collect and surveil wireless signals and upload it to a satellite.(old and publicly available) This was presented by private spy gadget business mogul on Jesse Ventura's conspiracy show.
-bugging senate rooms and offices
www.nytimes.com...
www.libertynews.com...
-spies on other countries leaders.
-new "gunshot detector" microphones installed in lampposts can scan your voice and triangulate your position.
-CCTV can be hacked into.
-phones can be tapped.
-phones can be bugged.
-phones can be cloned.
-doctors can be paid to spy on you.
-internet info via ISP request can be donated to the nsa or private contractors of the government
-Trace your IP+MAC+hardware serial id + GUID serial id or... use it to ban cheaters from video games.
forums.euw.leagueoflegends.com...
-LCD/LED monitors signal can be intercepted and archived at a distance.
-Vehicular speeding detection cameras.
-Frequent shopper cards and insurance companies.
-intentionally poorly scripted healthcare.org website that tricks you into giving over all your medical information to insurance companies and government agencies willingly.Then charge you twice as much when your old plans are shut off.Genius!



posted on Jan, 8 2014 @ 07:35 PM
link   

Ghost147
Has any tech-savvy ATS user ever found any strange contraptions imbedded in their computer?

I wonder how far this activity extends to? Makes me not want to buy a new laptop.
edit on 30/12/13 by Ghost147 because: (no reason given)


I wonder how far back this goes. Last January I bought a bunch of components to put together a new computer, I have my old stuff as well which is about 6 years old. I never really gave much thought to inspecting it closely for suspicious chips. I have a new video card coming in a few days, and a monitor (I'm even suspicious of the cable now), as well as a laptop at some point.

Out of curiosity I dug out my old computer motherboard, there is a chip on it of moderate size with no identification whatsoever, but I assume it's not from the NSA.

After watching the videos I've come to realize that my new laptop will be bugged.





new topics




 
33
<< 1   >>

log in

join