Please disable your Ad Blocker to better interact with this website.

Edward Snowden Hints At NSA’s Ability To “Mind-Hack”

Written by:

Published on: February 3, 2017

Over the years, most notably in 2013, Edward Snowden has revealed a great deal of our nation’s most classified information gathering secrets. Prior to when he released the classified documents to confirm all the wild accusations he was making, many ignorant Americans would have scoffed at the things he said, and then started crying, “conspiracy theory,” just as the mainstream media has conditioned them to. This story will most likely be no different.

The video below sums up Edward Snowden’s most recent provocative statement, which suggested that the NSA has access to some type of “mind reading” technology. The video also briefly touches on several other technologies that have originated out of DARPA during recent years, suggesting that “mind reading” technology might not be as much science fiction, as it could be science fact. The video also serves as a warm up to some highly controversial information coming out in the next video and post!

True Activist reports:

A recent tweet from Snowden suggested that the NSA knows your ‘secret thoughts and feelings’.

Edward Snowden recently replied to a tweet from New York Times Minus Context, implying that certain government agencies have the ability to browse through your private thoughts. The original tweet, from NYT Minus Context, reads “Remember that people don’t have access to your secret thoughts and feelings”. Snowden retweeted, with the response“Well, most people”. As in, most people don’t have access to your thoughts, but some do? The tweets prompted wide speculation and many interpreted them as a reference to the National Security Agency (NSA).

NYT Minus Context is a Twitter account (unaffiliated with the New York Times) that tweets lines verbatim from NYT articles. They provide “context” on their related account @NYTPlusContext, which refers the dubious quote to an article entirely unrelated to government security. It may be that Snowden was simply replying to another popular account with something cryptic in order to push an agenda or to potentially solicit a response on twitter, where his own account boasts nearly 3 million followers. Snowden’s Twitter bio reads “I used to work for the government. Now I work for the public”.

A controversial character of the modern technological age, Snowden is a computer programmer formerly employed by the CIA. He became internationally known in June 2013 when he leaked classified internal memos belonging to the NSA. The leaks revealed global surveillance programs and black budget operations of the NSA and the Five Eyes Intelligence Alliance. This brought issues of mass surveillance into the spotlight and emphasized the contemporary difficulties inherent in protecting one’s personal information in an increasingly digital world. As articulated by the New York Times in a reflective article about the Snowden revelations, “What has changed is that since the staggering extent of government surveillance became known, the public has sought greater privacy, and corporations have begun to provide it on widely used platforms”.

In many ways, Snowden has re-defined the concept of whistleblowing. Whether traitor or patriot, today, Snowden is head of a human rights group, Freedom of the Press Foundation, which works to “protect and defend adversarial journalism in the 21st century. We use crowdfunding, digital security, and internet advocacy to support journalists and whistleblowers worldwide”. Canadian Journalists for Free Expression has compiled The Snowden Archive in order to facilitate worldwide access to hundreds of the leaked documents.

It is certainly uncomfortable to imagine that secret government agencies are able to regularly monitor all our activities. It has been suggested that NSA hackers can see you through the web camera on your computer, listen to telephone calls and engineer subliminal messages through music and television. Additionally, is perfectly possible that there are agents who access all our information and obsessively violate our constitutional right to privacy. Under the Fourth Amendment:

“[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated”.

It is important to know our rights and realize the incredible implications of grand scale privacy invasion. Mounting evidence begs the question: can “privacy” even exist in today’s world?

As mentioned in the first video, the technology discussed in the following video details the staggering abilities of the NSA to scan hard drives of remote computers, whether or not those computers have ever been online before!  Much of the information comes from a New York Times article in 2014.

Unbeknownst to many Americans, the NSA possess the technology to implant software in nearly 100,000 computers around the world that allows them to conduct surveillance on those machines, and can also create a digital highway for launching cyberattacks.

The technology used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. 

The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and MANY American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.

While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officialsOver the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden. 

A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.’s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT.

Article posted with permission from The Last Great Stand

Sign-up to get breaking alerts from Sons of Liberty Media

Don't forget to like SonsOfLibertyMedia.com on Facebook, Google+, & Twitter.
The opinions expressed in each article are the opinions of the author alone and do not necessarily reflect those of SonsOfLibertyMedia.com.

Comment via Facebook
Comment via Disqus

Send this to a friend