“As a result he was compromised pretty badly, he was not using a specialized operating system like tails, which if you´re a journalist and you are not using tales you should probably be using tales unless you really know what you´re doing.
You know when you mess with the military dictatorship it messes with you back.
So just simple things can cause serious serious harm to regular people that are working for some kind of truth-telling and that to me is really a big part of my motivation for coming here to talk about.
These guys aren´t impressive. They do harm to good people and they hand wave away their contribution to increasing the total amount of human suffering in the world.
(Jacob Appelbaum) (Spying Today in 2014 That will make your skin crawl: Things you need to know now)”
“Veröffentlicht am 30.12.2013
NSA AGENTS who specialize in SECRET BACK DOORS FOR SPYING ON YOU are able to keep an eye on all levels of our digital lives. THE NSA ILLEGAL GOVT HACKERS SPY ON computing centers to individual computers, and from laptops to mobile phones. UNLOCKING ANY AND ALL PHONES AND COMPUTERS AND LABTOPS. FOR EVERY SECURED COMPUTER OR NETWORK the ANT seems to have a key in its toolbox TO OPEN AND GAIN INSTANT ACCESS TO EVERYONE. And no matter what walls companies erect, the NSA’s specialists seem already to have gotten past them.
THE NSA 50-page CATAOLOG HAS A list that reads like a mail-order catalog. ALL NSA employees can order technologies from the ANT division for tapping their targets’ data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000. In the case of Juniper, the name of this particular digital lock pick is “FEEDTROUGH.” This NSA MALWARE burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive “across reboots and software upgrades.” In this way, US GOVERNMENT SPIES can SECURE and PLANT themselves a permanent presence in ANY computer networks. The catalog states that FEEDTROUGH “has been deployed on many target platforms.”
NSA SPECIALISTS at ANT which stands for Advanced or Access Network Technology, ARE GOVT EMPLOYED MASTER HACKERS for the NSA’s department for Tailored Access Operations (TAO). In cases where TAO’s usual hacking and data-skimming methods don’t suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such “IMPLANTS,” as they are referred to in NSA parlance, have played a considerable role in the intelligence agency’s ability to establish a global covert network that operates alongside the Internet.”