Update 2024-03-27: Greatly expanded the "Samples" page and renamed it to "Glossary".
Update 2024-04-04: Added 5 million mid-2011 posts from the k47 post dump. Browse (mostly) them here.
Update 2024-04-07: Added ~400 October 2003 posts from 4chan.net. Browse them here.

Welcome to Oldfriend Archive, the official 4chan archive of the NSA. Hosting ~170M text-only 2003-2014 4chan posts (mostly 2006-2008).
[4 / 0 / ?]

[1384916104] iSpy

No.25690 View ViewReplyOriginalReport
iSpy

Phone-tapping and listening bugs are methods used for spying. How else does the US National Security Agency (NSA) eavesdrop on its targets? Here are the outline a few common ways phone surveillance can happen and what can be done to secure mobile devices.

DIRECT TO PHONE

This happens when connecting to an unsecured public network, using Wi-Fi or Bluetooth, which allows anyone to be connected in the network. On a wireless network, a hacker with the right programme can access one's phone and duplicate the phone's contents or even plant a software that could monitor the phone's activity .

   Similarly, this occurs on Bluetooth connections, especially when connecting to an unknown device.

WAVES

Mobile phones can connect to a network through 2G, 3G and 4G.

   In the latter two, which are newer technologies, the phone will try to authenticate the network, ensuring that transmitters really belong to telecommunications companies.

   But in the case of a 2G network, a hacker can dupe the phone into "believing" it is connected to a base station (or telephone tower) when it is in fact connected to a hacker's system. This allows them to access information on the phone, eavesdrop and even send messages as the user. Even on a 3G/4G network, especially in small cities, hackers can create "noise" in the frequency, which forces phones to be on the 2G network, allowing hackers to easily access one's
phone.

   Some older models of Blackberry smartphones allowed users to be exclusively on a 3G network. But as more users are concerned about battery life, most new models only allow users to turn off the 3/4G function.

SOLUTION

One of the solutions is to use Voice over Internet Protocol (VoIP), which allows phone calls and texting to be made through the Internet instead of the public telephone network. A popular example is Skype. There are also companies offering encrypted voice services, or secured lines for phone calls that cannot be tapped into.

   But as more governments are putting pressure on such companies to share their users' information, most have shut down in order to not compromise user privacy.

THREE TIPS

1. Disable WI·Fi and Bluetooth when not in use. This is especially if one's phone is set to automatically connect to wireless networks. Many have misconceptions that Bluetooth has a range of about 10m, and WiFi about 250m.

   Experiments, though, have shown Bluetooth devices being able to connect at a range of 2km, while Wi-Fi can reach a range of 250km.

2. Choose your WI-FI networks carefully

Do not join an unfamiliar wireless network, especially if it's unsecured. All a hacker needs to do to get into one's phone is to be on the same wireless network.

   With our phones getting increasingly complex, tapping a phone is now more like hacking into a computer.

3. Be mindful of what applications you download

   Some applications may look attractive, but think twice if they come from a relatively unknown company. Much like fraudulent software on computers, firms now use phone applications like a Trojan horse, which would transmit user data and phone activity to the hackers.

NSA'S PRIMARY SOURCES OF INTELLIGENCE

Half of the intelligence information which is supplied to the White House every morning comes from the NSA. Based in Fort Meade, Maryland, with an annual budget of US$10.8 billion, NSA boasts ground agents, tracking ships and listening
posts to unmanned aerial vehicles (UAVs) and reconnaissance satellites.

1.Human Intelligence (HUMINT)

Spies, moles, agents and double agents are part of NSA's 35,000-strong workforce. It is also the largest employer of mathematicians in the US.

2. Signals Intelligence (SIGINT)

Gathering of intel through eavesdropping, listening posts, hacking, wire and phone tapping and decryption devices.

e.g : Spy satellite

3. Electronic Intelligence (ELINT)

Gathering of intel using assets like tracking ships, spy planes, drones and spy satellites.

e.g : RC-135 reconnaisance plane, Global Hawk drone

HOW THE NSA'S PRISM PROGRAM WORKS

Targets foreigners by collecting intelligence from tech giants such as Google and Microsoft. lt also collects e-mails, voice, text and video chats of Americans "incidentally" conversing with a foreign target overseas.

Search

An NSA analyst types one or more search terms, or "selectors".

Tasking

Search request can be sent to multiple sources like a private company and to an NSA access point that taps into the main Internet gateway switches. Tasking at a tech giant is routed to FBI equipment.

Other spy programs

Collects metadata* Includes Upstream, which taps into Internet and telephone networks. Some data comes from telcos.

Results

Data is processed by NSA's Printaura, an automated "traffic cop" system. NSA processes at least 11 types of electronic communications.

A search may yield e-malls, logln credentials, metadata, stored flies and videos. Processed data is sent back to the analyst who made the tasking.

* Metadata: Records of people, locations, equipment, dates and durations of communications.

SOURCE: THE WASHINGTON POST & THE NEW YORK TIMES