Jump to content

File:NSA BlackBerry intercept.jpg

Page contents not supported in other languages.
This is a file from the Wikimedia Commons
From Wikipedia, the free encyclopedia

Original file (850 × 636 pixels, file size: 78 KB, MIME type: image/jpeg)

Summary

Description
English: This slide comes from an internal National Security Agency presentation called "Your target is using a BlackBerry? Now what?" It shows a Mexican government e-mail which was sent or received by a BlackBerry, and collected by the NSA. BES is short for BlackBerry Enterprise Server.
Date
Source http://www.spiegel.de/fotostrecke/photo-gallery-spying-on-smartphones-fotostrecke-101201-5.html
Author US government (National Security Agency)

Licensing

Public domain
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code. Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.
This file has been identified as being free of known restrictions under copyright law, including all related and neighboring rights.

Captions

Add a one-line explanation of what this file represents

Items portrayed in this file

depicts

23 March 2014

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current16:05, 23 March 2014Thumbnail for version as of 16:05, 23 March 2014850 × 636 (78 KB)RybecUser created page with UploadWizard

The following page uses this file:

Global file usage

The following other wikis use this file: