{"id":11590,"date":"2014-04-08T22:02:03","date_gmt":"2014-04-08T20:02:03","guid":{"rendered":"https:\/\/test-blog.mailfence.com\/?p=11590"},"modified":"2025-09-17T12:23:53","modified_gmt":"2025-09-17T10:23:53","slug":"nsa-espia-al-espionaje-de-facebook","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/es\/nsa-espia-al-espionaje-de-facebook\/","title":{"rendered":"Cuando la NSA descubre el espionaje de Facebook"},"content":{"rendered":"\n<p>Glenn Greenwald, periodista pol\u00edtico, abogado y bloguero, trabaj\u00f3 con Edward Snowden en las revelaciones acerca del programa de vigilancia de la Agencia de Seguridad Nacional de los EE. UU. (o NSA, acr\u00f3nimo del ingl\u00e9s National Security Agency). Fue \u00e9l quien public\u00f3 la informaci\u00f3n recopilada de los documentos de Snowden en el peri\u00f3dico brit\u00e1nico <a href=\"http:\/\/www.theguardian.com\/profile\/glenn-greenwald\">The Guardian<\/a>. En su web, The Intercept, Greenwald comparte una lista de las t\u00e9cnicas de espionaje empleadas por las NSA para vigilar a los usuarios.<\/p>\n\n\n\t\t<div data-elementor-type=\"section\" data-elementor-id=\"100846\" class=\"elementor elementor-100846 elementor-100761\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-124e1725 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"124e1725\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-654e4e21\" data-id=\"654e4e21\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a3b1a23 elementor-widget elementor-widget-text-editor\" data-id=\"3a3b1a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Mailfence &#8211; Su paquete de productividad seguro<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c004279 elementor-widget elementor-widget-text-editor\" data-id=\"2c004279\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Recupere su privacidad con<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83e0dd6 elementor-icon-list--layout-inline elementor-align-center elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"83e0dd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-envelope-open-text\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M176 216h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16c0 8.84 7.16 16 16 16zm-16 80c0 8.84 7.16 16 16 16h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16zm96 121.13c-16.42 0-32.84-5.06-46.86-15.19L0 250.86V464c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V250.86L302.86 401.94c-14.02 10.12-30.44 15.19-46.86 15.19zm237.61-254.18c-8.85-6.94-17.24-13.47-29.61-22.81V96c0-26.51-21.49-48-48-48h-77.55c-3.04-2.2-5.87-4.26-9.04-6.56C312.6 29.17 279.2-.35 256 0c-23.2-.35-56.59 29.17-73.41 41.44-3.17 2.3-6 4.36-9.04 6.56H96c-26.51 0-48 21.49-48 48v44.14c-12.37 9.33-20.76 15.87-29.61 22.81A47.995 47.995 0 0 0 0 200.72v10.65l96 69.35V96h320v184.72l96-69.35v-10.65c0-14.74-6.78-28.67-18.39-37.77z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Mensajes<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-alt\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M148 288h-40c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12zm108-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 96v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm192 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96-260v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V112c0-26.5 21.5-48 48-48h48V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h128V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h48c26.5 0 48 21.5 48 48zm-48 346V160H48v298c0 3.3 2.7 6 6 6h340c3.3 0 6-2.7 6-6z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Calendarios<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-folder\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 128H272l-54.63-54.63c-6-6-14.14-9.37-22.63-9.37H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V176c0-26.51-21.49-48-48-48zm0 272H48V112h140.12l54.63 54.63c6 6 14.14 9.37 22.63 9.37H464v224z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Documentos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-users-cog\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M610.5 341.3c2.6-14.1 2.6-28.5 0-42.6l25.8-14.9c3-1.7 4.3-5.2 3.3-8.5-6.7-21.6-18.2-41.2-33.2-57.4-2.3-2.5-6-3.1-9-1.4l-25.8 14.9c-10.9-9.3-23.4-16.5-36.9-21.3v-29.8c0-3.4-2.4-6.4-5.7-7.1-22.3-5-45-4.8-66.2 0-3.3.7-5.7 3.7-5.7 7.1v29.8c-13.5 4.8-26 12-36.9 21.3l-25.8-14.9c-2.9-1.7-6.7-1.1-9 1.4-15 16.2-26.5 35.8-33.2 57.4-1 3.3.4 6.8 3.3 8.5l25.8 14.9c-2.6 14.1-2.6 28.5 0 42.6l-25.8 14.9c-3 1.7-4.3 5.2-3.3 8.5 6.7 21.6 18.2 41.1 33.2 57.4 2.3 2.5 6 3.1 9 1.4l25.8-14.9c10.9 9.3 23.4 16.5 36.9 21.3v29.8c0 3.4 2.4 6.4 5.7 7.1 22.3 5 45 4.8 66.2 0 3.3-.7 5.7-3.7 5.7-7.1v-29.8c13.5-4.8 26-12 36.9-21.3l25.8 14.9c2.9 1.7 6.7 1.1 9-1.4 15-16.2 26.5-35.8 33.2-57.4 1-3.3-.4-6.8-3.3-8.5l-25.8-14.9zM496 368.5c-26.8 0-48.5-21.8-48.5-48.5s21.8-48.5 48.5-48.5 48.5 21.8 48.5 48.5-21.7 48.5-48.5 48.5zM96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm224 32c1.9 0 3.7-.5 5.6-.6 8.3-21.7 20.5-42.1 36.3-59.2 7.4-8 17.9-12.6 28.9-12.6 6.9 0 13.7 1.8 19.6 5.3l7.9 4.6c.8-.5 1.6-.9 2.4-1.4 7-14.6 11.2-30.8 11.2-48 0-61.9-50.1-112-112-112S208 82.1 208 144c0 61.9 50.1 112 112 112zm105.2 194.5c-2.3-1.2-4.6-2.6-6.8-3.9-8.2 4.8-15.3 9.8-27.5 9.8-10.9 0-21.4-4.6-28.9-12.6-18.3-19.8-32.3-43.9-40.2-69.6-10.7-34.5 24.9-49.7 25.8-50.3-.1-2.6-.1-5.2 0-7.8l-7.9-4.6c-3.8-2.2-7-5-9.8-8.1-3.3.2-6.5.6-9.8.6-24.6 0-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h255.4c-3.7-6-6.2-12.8-6.2-20.3v-9.2zM173.1 274.6C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Grupos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-436babb elementor-align-center elementor-widget elementor-widget-button\" data-id=\"436babb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mailfence.com\/es\/#pricing\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Obtener Mailfence gratis<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\n\n\n<p>Hace algunas semanas, durante las conferencias celebradas en el festival South by Southwest (SXSW) en Austin (Texas, EE. UU.), Snowden inst\u00f3 a todos los usuarios de internet para que usasen el cifrado (<a href=\"https:\/\/mailfence.com\/\">un servicio que algunas p\u00e1ginas web de servicios de correo electr\u00f3nico seguro ofrecen gratuitamente<\/a>) para protegerse de las agencias de inteligencia. Sin embargo, Snowden explic\u00f3 que la NSA era capaz de enfocarse en un usuario espec\u00edfico y, en este caso, \u00abinfiltrarse en su ordenador\u00bb.<\/p>\n\n\n\n<p>La NSA es muy consciente del riesgo que corre con estos intentos de protecci\u00f3n, y es precisamente por ello que han invertido importantes cantidades de dinero (de los contribuyentes) para intentar \u00abpinchar\u00bb masivamente millones de ordenadores con software malintencionado, cosa que podr\u00eda volverlos los \u00abamos de la red\u00bb, seg\u00fan <a href=\"http:\/\/www.zerohedge.com\/news\/2014-03-12\/most-evil-and-disturbing-nsa-spy-practices-date-have-just-been-revealed\">Zero Hedge<\/a>. \u00abLas t\u00e9cnicas de vigilancia de la NSA podr\u00edan, involuntariamente, poner en peligro la seguridad en internet\u00bb, advirti\u00f3 Mikko Hypponen, un experto en malware.<\/p>\n\n\n\n<p>La agencia ha ampliado sus capacidades de pirateo automatizando sus sistemas y reduciendo la supervisi\u00f3n por parte de seres humanos. En algunos casos, la NSA ha usado servidores de Facebook falsos para secuestrar la red social para usarla como \u00abplataforma de lanzamiento\u00bb que les permita pinchar ordenadores espec\u00edficos y extraer informaci\u00f3n de su hardware. Tambi\u00e9n han enviado correos no deseados (spam) con \u00abimplantes de malware\u00bb, capaces de piratear un ordenador de muchas maneras diferentes. Estos implantes fueron desarrollados en un programa autom\u00e1tico llamado Turbine, que permite la implantaci\u00f3n de malware a gran escala. En 2004, s\u00f3lo se trataba de unos 100 o 150 implantes, pero \u00faltimamente se han multiplicado hasta alcanzar las decenas de miles. Los informes de Snowden indican que entre 85.000 y 100.000 implantes se han enviado a ordenadores y mediante redes sociales al mundo entero. Se invirtieron aproximadamente unos 67,6 millones de d\u00f3lares americanos en el desarrollo del programa \u00abTurbine\u00bb, para que este pudiese expandirse a una \u00abgran variedad de redes\u00bb.<\/p>\n\n\n\n<p>El implante llamado \u00abUnitedrake\u00bb puede usarse con una amplia variedad de complementos, m\u00f3dulos de extensi\u00f3n de software que permiten un control total del ordenador infectado. \u201cCaptivatedaudience\u201d graba conversaciones desde el micr\u00f3fono del ordenador. \u201cGumfish\u201d toma fotos desde la webcam. \u201cFoggybottom\u201d graba el historial de navegaci\u00f3n completo y recopila informaci\u00f3n acerca de las conexiones y contrase\u00f1as. \u201cGrok\u201d se usa para registrar las pulsaciones de teclas y todas las actividades del usuario. \u201cSalvagerabbit\u201d roba datos de los discos extra\u00edbles conectados a la computadora infectada.<\/p>\n\n\n\n<p>Adem\u00e1s, estos implantes presuntamente tambi\u00e9n le permiten a la NSA anular las herramientas de cifrado empleadas para navegar de manera an\u00f3nima y cifrar los contenidos. Esto es posible debido a que el malware de la agencia les otorga acceso ilimitado al ordenador objetivo, siempre y cuando el usuario no proteja sus comunicaciones mediante el cifrado. \u201cQuantumsky\u201d, un malware desarrollado en el 2004, permite bloquear el acceso del ordenador a ciertas p\u00e1ginas web y \u00abQuantumcopper\u00bb, probado en el 2008, se usa para corromper los archivos descargados por el ordenador objetivo.<\/p>\n\n\n\n<p>Estas t\u00e9cnicas se han empleado no solamente para rastrear sospechosos de participar en actividades terroristas. Tambi\u00e9n se han utilizado estos software malintencionados contra administradores de sistemas de proveedores de servicios telef\u00f3nicos y de internet para acceder\/espiar en las comunicaciones secretas de una empresa. <a href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/03\/12\/thousands-implants\/\">Seg\u00fan un documento \u00abtop secret\u00bb del 2012<\/a>, para poder sembrar estos implantes, la NSA envi\u00f3 miles de correos no deseados que invitaban a los usuarios a hacer clic en enlaces que activaban el software malintencionado. Una vez activado, el ordenador resulta infectado en 8 segundos. La t\u00e9cnica de \u00ab<a href=\"https:\/\/es.wikipedia.org\/wiki\/Ataque_de_intermediario\">ataque de intermediario<\/a>\u00bb redirige al navegador del usuario a los servidores de las NSA que intentan pinchar el ordenador. La t\u00e1ctica de \u00ab<a href=\"https:\/\/es.wikipedia.org\/wiki\/Ataque_de_canal_lateral\">ataque de canal lateral<\/a>\u00ab, cuyo nombre c\u00f3digo es \u00abQuantumhand\u00bb le permite a la NSA disfrazarse de un servidor de Facebook falso y transferir datos malintencionados cuando el objetivo pretenda conectarse a la red social. Al usar este malware, que se asemeja a una p\u00e1gina com\u00fan y corriente de Facebook, la NSA puede piratear el ordenador del usuario, acceder a datos del hardware y modificar las comunicaciones. Esto ha intensificado enormemente el espionaje de Facebook, mediante estas t\u00e1cticas tan sofisticadas.<\/p>\n\n\n\n<p>Los cortafuegos y otros m\u00e9todos de seguridad convencionales no parecen molestar a la NSA. De hecho, los hackers de la agencia parecen muy confiados de su capacidad de evadir cualquier protecci\u00f3n e invadir cualquier ordenador o red. \u00abSi logramos que el ordenador objetivo nos visite desde alg\u00fan tipo de navegador, probablemente seremos capaces de controlarlo\u00bb, dice uno de los hackers de la agencia que se cita en los documentos secretos.<\/p>\n\n\n\n<p><a href=\"http:\/\/thenextweb.com\/insider\/2014\/03\/13\/nsa-denies-reports-impersonating-facebook-infect-pcs-malware\/?utm_source=feedburner&amp;utm_medium=email&amp;utm_campaign=Feed%3A%20TheNextWeb%20%28The%20Next%20Web%20All%20Stories%29#!Agmcd\">La NSA ha negado que haya empleado las redes sociales para infectar a varios millares de ordenadores con software malintencionado<\/a>. De acuerdo a la NSA, sus posibilidades t\u00e9cnicas se emplean para operaciones apropiadas y leg\u00edtimas relacionadas con inteligencia internacional.<\/p>\n\n\n\n<p>Mailfence es un paquete de software de E-mail <a href=\"https:\/\/mailfence.com\/es\/e-mail-seguro.jsp\">seguro<\/a> y <a href=\"https:\/\/mailfence.com\/es\/e-mail-privado.jsp\">privado<\/a>.<\/p>\n\n\n\n<p>S\u00edganos en <a href=\"https:\/\/twitter.com\/mailfence\" target=\"_blank\" rel=\"noopener noreferrer\">twitter<\/a>\/<a href=\"https:\/\/www.reddit.com\/r\/mailfence\" target=\"_blank\" rel=\"noopener noreferrer\">reddit<\/a> y mant\u00e9ngase actualizado en todo momento.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Glenn Greenwald, periodista pol\u00edtico, abogado y bloguero, trabaj\u00f3 con Edward Snowden en las revelaciones acerca del programa de vigilancia de la Agencia de Seguridad Nacional de los EE. UU. (o NSA, acr\u00f3nimo del ingl\u00e9s National Security Agency). Fue \u00e9l quien public\u00f3 la informaci\u00f3n recopilada de los documentos de Snowden en el peri\u00f3dico brit\u00e1nico The Guardian. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":85973,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"link","meta":{"footnotes":""},"categories":[857],"tags":[],"class_list":["post-11590","post","type-post","status-publish","format-link","has-post-thumbnail","hentry","category-seguridad","post_format-post-format-link"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Espionaje de Facebook por la NSA | Blog de Mailfence<\/title>\n<meta name=\"description\" content=\"El espionaje de facebook, la NSA y otras redes sociales. Greenwald da una lista de t\u00e9cnicas de espionaje que emplea la NSA:\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cuando la NSA descubre el espionaje de Facebook | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"Cuando la NSA descubre el espionaje de Facebook | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/es\/nsa-espia-al-espionaje-de-facebook\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-08T20:02:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-17T10:23:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Patrick De Schutter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pdeschutter\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick De Schutter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/nsa-espia-al-espionaje-de-facebook\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/nsa-espia-al-espionaje-de-facebook\\\/\"},\"author\":{\"name\":\"Patrick De Schutter\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#\\\/schema\\\/person\\\/20a0c25f4ff87b6c5510971559c01c28\"},\"headline\":\"Cuando la NSA descubre el espionaje de Facebook\",\"datePublished\":\"2014-04-08T20:02:03+00:00\",\"dateModified\":\"2025-09-17T10:23:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/nsa-espia-al-espionaje-de-facebook\\\/\"},\"wordCount\":937,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/nsa-espia-al-espionaje-de-facebook\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/NSA_bugs_FB_spying1.png\",\"articleSection\":[\"Seguridad\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/nsa-espia-al-espionaje-de-facebook\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/nsa-espia-al-espionaje-de-facebook\\\/\",\"name\":\"Espionaje de Facebook por la NSA | Blog de Mailfence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/nsa-espia-al-espionaje-de-facebook\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/nsa-espia-al-espionaje-de-facebook\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/NSA_bugs_FB_spying1.png\",\"datePublished\":\"2014-04-08T20:02:03+00:00\",\"dateModified\":\"2025-09-17T10:23:53+00:00\",\"description\":\"El espionaje de facebook, la NSA y otras redes sociales. Greenwald da una lista de t\u00e9cnicas de espionaje que emplea la NSA:\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/nsa-espia-al-espionaje-de-facebook\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/nsa-espia-al-espionaje-de-facebook\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/nsa-espia-al-espionaje-de-facebook\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/NSA_bugs_FB_spying1.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/NSA_bugs_FB_spying1.png\",\"width\":600,\"height\":600,\"caption\":\"facebook app icon\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/nsa-espia-al-espionaje-de-facebook\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/category\\\/seguridad\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cuando la NSA descubre el espionaje de Facebook\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mailfence\\\/\",\"https:\\\/\\\/x.com\\\/mailfence\",\"https:\\\/\\\/www.reddit.com\\\/r\\\/Mailfence\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mailfence\",\"https:\\\/\\\/www.instagram.com\\\/mailfence_\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@mailfence\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#\\\/schema\\\/person\\\/20a0c25f4ff87b6c5510971559c01c28\",\"name\":\"Patrick De Schutter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g\",\"caption\":\"Patrick De Schutter\"},\"description\":\"Patrick is the co-founder of Mailfence. He's a serial entrepreneur and startup investor since 1994 and launched several pioneering internet companies such as Allmansland, IP Netvertising or Express.be. He is a strong believer and advocate of encryption and privacy.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/pdeschutter\\\/\",\"https:\\\/\\\/x.com\\\/pdeschutter\"],\"gender\":\"male\",\"knowsLanguage\":[\"English\",\"French\",\"Dutch\",\"Swedish\"],\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/author\\\/patrick\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Espionaje de Facebook por la NSA | Blog de Mailfence","description":"El espionaje de facebook, la NSA y otras redes sociales. Greenwald da una lista de t\u00e9cnicas de espionaje que emplea la NSA:","robots":{"index":"noindex","follow":"follow"},"og_locale":"es_ES","og_type":"article","og_title":"Cuando la NSA descubre el espionaje de Facebook | Mailfence Blog","og_description":"Cuando la NSA descubre el espionaje de Facebook | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/es\/nsa-espia-al-espionaje-de-facebook\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2014-04-08T20:02:03+00:00","article_modified_time":"2025-09-17T10:23:53+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png","type":"image\/png"}],"author":"Patrick De Schutter","twitter_card":"summary_large_image","twitter_creator":"@pdeschutter","twitter_site":"@mailfence","twitter_misc":{"Escrito por":"Patrick De Schutter","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/es\/nsa-espia-al-espionaje-de-facebook\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/es\/nsa-espia-al-espionaje-de-facebook\/"},"author":{"name":"Patrick De Schutter","@id":"https:\/\/blog.mailfence.com\/es\/#\/schema\/person\/20a0c25f4ff87b6c5510971559c01c28"},"headline":"Cuando la NSA descubre el espionaje de Facebook","datePublished":"2014-04-08T20:02:03+00:00","dateModified":"2025-09-17T10:23:53+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/es\/nsa-espia-al-espionaje-de-facebook\/"},"wordCount":937,"publisher":{"@id":"https:\/\/blog.mailfence.com\/es\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/es\/nsa-espia-al-espionaje-de-facebook\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png","articleSection":["Seguridad"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/es\/nsa-espia-al-espionaje-de-facebook\/","url":"https:\/\/blog.mailfence.com\/es\/nsa-espia-al-espionaje-de-facebook\/","name":"Espionaje de Facebook por la NSA | Blog de Mailfence","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/es\/nsa-espia-al-espionaje-de-facebook\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/es\/nsa-espia-al-espionaje-de-facebook\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png","datePublished":"2014-04-08T20:02:03+00:00","dateModified":"2025-09-17T10:23:53+00:00","description":"El espionaje de facebook, la NSA y otras redes sociales. Greenwald da una lista de t\u00e9cnicas de espionaje que emplea la NSA:","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/es\/nsa-espia-al-espionaje-de-facebook\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/es\/nsa-espia-al-espionaje-de-facebook\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blog.mailfence.com\/es\/nsa-espia-al-espionaje-de-facebook\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png","width":600,"height":600,"caption":"facebook app icon"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/es\/nsa-espia-al-espionaje-de-facebook\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/es\/"},{"@type":"ListItem","position":2,"name":"Seguridad","item":"https:\/\/blog.mailfence.com\/es\/category\/seguridad\/"},{"@type":"ListItem","position":3,"name":"Cuando la NSA descubre el espionaje de Facebook"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/es\/#website","url":"https:\/\/blog.mailfence.com\/es\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/es\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blog.mailfence.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/es\/#\/schema\/person\/20a0c25f4ff87b6c5510971559c01c28","name":"Patrick De Schutter","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g","caption":"Patrick De Schutter"},"description":"Patrick is the co-founder of Mailfence. He's a serial entrepreneur and startup investor since 1994 and launched several pioneering internet companies such as Allmansland, IP Netvertising or Express.be. He is a strong believer and advocate of encryption and privacy.","sameAs":["https:\/\/www.linkedin.com\/in\/pdeschutter\/","https:\/\/x.com\/pdeschutter"],"gender":"male","knowsLanguage":["English","French","Dutch","Swedish"],"url":"https:\/\/blog.mailfence.com\/es\/author\/patrick\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/posts\/11590","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/comments?post=11590"}],"version-history":[{"count":11,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/posts\/11590\/revisions"}],"predecessor-version":[{"id":103467,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/posts\/11590\/revisions\/103467"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/media\/85973"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/media?parent=11590"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/categories?post=11590"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/tags?post=11590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}