Using this back door access the NSA now has the capability to store everything and anything about each of us.

Back door access - Comment on 2013 July 21

Website: countdown4us.com
Home | Comments | Creation | Redemption Period | Miscellaneous
Home > Comments > 2013 > Comment on 2013 July 21
2008 | 2009 | 2010 | 2011 | 2012  |  2013 |
End: Go to the end of this webpage.

The US Military (NSA) has required all Internet connected electronic device makers to embed backdoor access in all software and hardware in those products to allow them (NSA) to monitor us instantly and easily. Read more:

Here something I read today:

 

The US Military (NSA) has required all Internet connected electronic device makers (Samsung, HTC, Apple, Google, Microsoft, GM, Chrysler, Ford, etc) to embed backdoor access in all software & hardware in those products to allow them (NSA) to monitor us instantly and easily (through your PCs, smartphones, OnStar System, tablets, xBox, Skype, Office 365, Skype, DropBox, laptops, PDs, cars, trucks, etc).

Using this back door access the NSA now has the capability to store everything and anything about each of us (device audio, video, keyword searches, email content, web sites visited, contacts, GPS location, etc). They have your voice-print, and face image (for facial recognition). They (the NSA) have admitted they can turn on any of your devices at any time and use the microphones and/or cameras and concert all your conversation to text and store it forever.

A research and development agency attached to the Pentagon is paying a computer scientist in Texas $300,000 to develop a means of transcribing thousands of real-time telephone conversations into text at once. This would enable the government to create a database containing thousands or millions of telephone conversations. The database could be easily searched by government or military agents employing a simple search queries. That means agencies like the National Security Agency (US Military) would be able to keep a record of millions of phone conversations and pull up what you said at any time.

 

So when someone writes an email und then wants to encode it und send it off, then Obama and his friends know the content already, still before the encoding has even started. The area drone already approaches the location of the potential sender. Now a human need suddenly meets the writer of the email and he goes to the toilet and there he hears an ear-splitting explosion and his computer-room is just a black, burnt out cave giving off clouds of thick smoke.

Years ago the Chinese have already introduced this back door access and the other countries immediately followed the good example and therefore with every internet enabled device, our own one or the unknown one around us, we are immediately part of the Obama system.

 

Back to: 2013 July 21
Top: Go to the top of this webpage.
2008 | 2009 | 2010 | 2011 | 2012  |  2013 |
Home | Comments | Creation | Redemption Period | Miscellaneous
Site Map: For an overview of this website and for access to the individual webpages.
The web address of this webpage is:
http://www.countdown4us.com/en022013/en022013161.htm