Why Can The NSA Delete, Erase And Edit Your Text Messages?

Many may not recall the recent Edward Snowden interview with Brian Williams of NBC News.

In the interview Snowden, the former National Security Agency analyst states that the NSA can own anyone’s cellphone via hacking and government installed and created backdoors of the cell phone manufacturers.

Technology Snowden says is exploitable and readily available by any large country that has a laboratory of experts.

“The NSA, the Russian intelligence service, the Chinese intelligence service, any intelligence service in the world that has significant funding and a real technological research team can own that phone… as soon as you turn it on, it can be theirs. They can turn it into a microphone, they can take pictures from it, they can take data off of it,” Snowden volunteers to Brian Williams on NBC News.

What they didn’t mention in the whole piece is that those same intelligence services and research groups can delete, erase and edit your text messages.

“As you write a message, you know, an analyst at the NSA or any other service out there that’s using this kind of attack against people can actually see you write sentences and then backspace over your mistakes and then change the words and then kind of pause and — and — and think about what you wanted to say and then change it. And it’s this extraordinary intrusion not just into your communications, your finished messages but your actual drafting process, into the way you think” said Snowden.

Now what does all this have to do with privacy if you have nothing to hide?

What comes crawling out of the depths of the Church Committee Hearings On Assassination found the corrupt practices used by COINTELPRO and law enforcement to turn one group of activists against another by creating messages that were crafted to look like insults.

This opportunity allowed the law enforcement to then divide groups and eliminate activists by marginalizing their access to dissent and protest.

Sometimes this marginalization campaign worked up to include people being turned into assassins via these fake messages that plant doubt and animosity between group hierarchies.

Today, COINTELPRO has morphed into the NSA. The gangstalking techniques like the cellphone hacking and stingray cell phone hacking intercept data techniques leave little doubt that COINTELPRO is operational and that warrantless searches will continue well into the foreseeable future.

Music by:
We give appropriate credit and provide a link to the license, and indicate changes were made as needed. Our videos do not in any reasonable manner are affiliated with the following artists. We do not in any way that suggests the artists endorse the work.

“The Moments of Our Mornings” (by Kai Engel)
http://freemusicarchive.org/music/Kai_Engel/Irsens_Tale/Kai_Engel_-_Irsens_Tale_-_06_The_Moments_of_Our_Mornings

More –
Snowden explains what the NSA can do with your phone even when it’s off
by Pushpa Mishra – Hack Read – Posted on May 29, 2014
http://hackread.com/snowden-nsa-remotely-controls-phone/

Advertisements

About Take The Gate

A web based blog about Ohio and intelligence gathering tool for the spread of aletheia, logos, and, sophia (truth, reason, and wisdom). Looking through the glass darkly.
Video | This entry was posted in news and tagged , , , , , , , , , , , , , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s