NSA AGENTS who specialize in SECRET BACK DOORS FOR SPYING ON YOU are able to keep an eye on all levels of our digital lives. THE NSA ILLEGAL GOVT HACKERS SPY ON computing centers to individual computers, and from laptops to mobile phones. UNLOCKING ANY AND ALL PHONES AND COMPUTERS AND LABTOPS. FOR EVERY SECURED COMPUTER OR NETWORK the ANT seems to have a key in its toolbox TO OPEN AND GAIN INSTANT ACCESS TO EVERYONE. And no matter what walls companies erect, the NSA’s specialists seem already to have gotten past them.
THE NSA 50-page CATAOLOG HAS A list that reads like a mail-order catalog. ALL NSA employees can order technologies from the ANT division for tapping their targets’ data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to 0,000. In the case of Juniper, the name of this particular digital lock pick is “FEEDTROUGH.” This NSA MALWARE burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive “across reboots and software upgrades.” In this way, US GOVERNMENT SPIES can SECURE and PLANT themselves a permanent presence in ANY computer networks. The catalog states that FEEDTROUGH “has been deployed on many target platforms.”
NSA SPECIALISTS at ANT which stands for Advanced or Access Network Technology, ARE GOVT EMPLOYED MASTER HACKERS for the NSA’s department for Tailored Access Operations (TAO). In cases where TAO’s usual hacking and data-skimming methods don’t suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such “IMPLANTS,” as they are referred to in NSA parlance, have played a considerable role in the intelligence agency’s ability to establish a global covert network that operates alongside the Internet.
AND GRAPHICS SHOWING NSA SPY TOOLS http://www.spiegel.de/international/world/a-941262.html
PHOTOS OF NSA SPY PROGRAMS http://www.spiegel.de/fotostrecke/photo-gallery-how-the-nsa-infiltrates-computers-fotostrecke-105339.html