• Critical Vulnerability and Privacy LoopHole Found in RoboForm Password Manager

    Unless you are a human supercomputer, remembering password is not so easy, and that too if you have a different password for each site. But luckily...
  • miniLock - Open Source File Encryption Tool from CryptoCat Developer

    It’s the age of surveillance what made the Use of Encryption so widely that it has become a need of law enforcement agencies, cyber criminals as...
  • A BEGINNERS GUIDE TO HACKING UNIX

      *************  *       A BEGINNERS GUIDE TO:        *  *        ...
  • CASH! CASH! Hacking ATM Machines with Just a Text Message

    As we reported earlier, Microsoft will stop supporting the Windows XP operating system after 8th April, apparently 95% of the world’s 3 million...
  • Microsoft Word Zero-Day Vulnerability is being exploited in the Wild

    Microsoft warned about a zero-day vulnerability in Microsoft Word that is being actively exploited in targeted attacks and discovered by the...
  • Snoopy Drone Can Hack Your Smartphones

    The use of unmanned aerial vehicles (UAVS) called Drones is rapidly transforming the way we go to war. Drones were once used for...
  • Android Privilege Escalation Flaws leave Billions of Devices vulnerable to Malware Infection

    Android - a widely used Smartphone platform offered by Google is once again suspected to affect its users with malicious software that puts...
  • Introduction to Netcat

    Introduction : So I was messing around on the internet and came across a tool called Netcat.  I've been messing with it for a couple of...
  • Google Nexus phone vulnerable to SMS-based DOS attack

    Google’s Nexus Smartphones are vulnerable to SMS-based DOS attack, where an attacker can force it to restart, freeze, or lose network...
  • Linux worm targeting Routers, Set-top boxes and Security Cameras with PHP-CGI Vulnerability

    A Symantec researcher has discovered a new Linux worm, targeting machine-to-machine devices, and exploits a PHP vulnerability...

Saturday, 7 September 2013

NSA misused PRISM - Spied on Al Jazeera, bugged UN headquarters and used for personal spying


Before NSA said that they has zero tolerance for willful violations of the agency’s authorities, but NSA had violated privacy rules on thousands of occasions.



According to documents seen by SPIEGEL, Arab news broadcaster Al Jazeera was spied on by the National Security Agency. The US intelligence agency hacked into Al Jazeera's internal communications system. The NSA said these selected targets had high potential as sources of intelligence.
These Documents were provided by the former NSA contractor and whistleblower Edward Snowden. Also NSA was cracking the airline reservation services for Russian airline Aeroflot, accessing "Al Jazeera broadcasting internal communication" was listed as a notable success and the encrypted information was forwarded to the responsible NSA departments for further analysis.

Also, The National Security Agency (NSA) has admitted some of their officers misused the agency’s massive spying powers to keep tabs on their love interests. "NSA takes very seriously allegations of misconduct, and co-operates fully with any investigations responding as appropriate," the NSA said.

The agency admitted that abuses had taken place over the past decade but did not specify what the nature of those abuses were.

From another document obtained from Edward Snowden, proves that US systematically spied on other states, institutions and NSA bugged the United Nations' New York headquarters.

According to the documents, the NSA runs a bugging program in more than 80 embassies and consulates worldwide called "Special Collection Service" and Vienna based nuclear watchdog, the International Atomic Energy Agency, was among those targeted by the US.

Snowden's leaks have embarrassed the United States by exposing the global extent of its spying.

No comments:

Post a Comment