Cover your cameras and microphone before you read this
Is NSA spying us?
How the NSA spies on you in America:
The Patriot Act allows the U.S. Government to obtain “business records that are relevant to terrorist investigations.” This apparently includes records of every domestic and international call made in the U.S., including the number dialed, the time of the call, and its duration.
Facebook, Google, Apple and six other leading online services have all gone on record as having passed their customers’ data to the NSA, as legally required by the “PRISM” program. Data shared includes emails, messages, and documents. The NSA’s hacking unit, Tailored Access Operations, has developed a whole range of hacking exploits. These enable the NSA to break into consumer electronics devices and IT systems as it sees fit. When the NSA finds a security hole in a popular consumer device, they do not, as previously intended, fix the security hole, but instead exploit it. That leaves all our devices vulnerable to hackers. The NSA has also made the job of hacking security devices easier for itself, by coercing many manufacturers into building vulnerabilities into products such as networking switches, firewalls, and encryption protocols. These vulnerabilities are known to the NSA, which can exploit them at any time. The NSA also intercepts shipments of computers and phones and plants backdoors in them. When you move around your town, cell phone towers are able to calculate your exact position. The NSA keeps records of where you are at any time. They are able to read all your incoming text messages and phone calls and store them indefinitely.
How the NSA spies on you overseas:
The internet connects different continents via undersea fiber optic cables that carry truly massive amounts of data. In some places, the NSA has deals with local intelligence agencies to tap into these cables; in others, it does so on its own. The NSA even uses submarines to attach snooping bugs to cables deep beneath in the ocean. In Brazil, Germany and other countries, the NSA has broken into the internal networks of major telecommunications providers, intercepting the data they collect and weakening the security of their systems. They collect every email and phone call they can. The NSA has access, through agreements and hacking, to major credit card networks, payment gateways, and wire transfer facilities. This allows them to follow every cent of your money, where it comes from, and what you are spending it on.