[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

"The Time For Real Change Is Now!" - Conor McGregor Urges Irish To Lobby Councillors For Presidential Bid

Daniela Cambone: Danger Not Seen in 40+ Years

Tucker Carlson: Whistleblower Exposes the Real Puppet Masters Controlling the State Department

Democrat nominee for NJ Governor, says that she will push an LGBTQ agenda in schools and WILL NOT allow parents to opt out.

Holy SH*T, America's blood supply is tainted with mRNA

Thomas Massie's America First : A Documentary by Tom Woods & Dan Smotz

Kenvue Craters On Report RFK Jr To Link Autism To Tylenol Use In Pregnancy

All 76 weapons at China 2025 military parade explained. 47 are brand new.

Chef: Strategy for Salting Steaks

'Dangerous' Chagas disease confirmed in California, raising concerns for Bay Area

MICROPLASTICS ARE LINKED TO HEART DISEASE; HERE'S HOW TO LOWER YOUR RISK

This Scholar PREDICTED the COLLAPSE of America 700 years ago

I Got ChatGPT To Admit Its Antichrist Purpose

"The CIA is inside Venezuela right now" Col Macgregor says regime change is coming

Caroline Kennedy’s son, Jack Schlossberg, mulling a run.

Florida Surgeon General Nukes ALL School Vaxx Mandates, Likens Them to Slavery

Doc on High Protein Diet. Try for more plant based protein.

ICE EMPTIES Amazon Warehouse… Prime Orders HALTED as ‘Migrant Workforce’ REMOVED

Trump to ask SCOTUS to reverse E. Jean Carroll sex-abuse verdict

Wary Of Gasoline Shortage, California Pauses Price-Gouging Penalty On Oil Companies

Jewish activist Barbara Lerner Spectre calls for the destruction of European

The Democrats Are Literally Making Stuff Up!

Turn Dead Dirt Into Living Soil With IMO 4

Michael Knowles: Trump & Israel, Candace Owens, and Why Christianity Is Booming Despite the Attacks

Save Canada's Ostrich Farms! Protests Erupt Over Government Tyranny in Canada

Holy SH*T! Poland just admitted the TRUTH about Zelensky and it's not good

Very Alarming Earthquakes Strike As We Enter The Month Of September

Billionaire Airbnb Co-Founder Reveals Why He Abandoned Democrat Party For Trump

Monsoon floods devastate Punjab’s crops, (1.7 billion people) at risk of food crisis

List Of 18 Things That Are Going To Happen Within The Next 40 Days


Ron Paul
See other Ron Paul Articles

Title: How the NSA Plans to Infect ‘Millions’ of Computers with Malware
Source: [None]
URL Source: https://firstlook.org/theintercept/ ... ct-millions-computers-malware/
Published: Mar 13, 2014
Author: Ryan Gallagher and Glenn Greenwald
Post Date: 2014-03-13 20:11:50 by Ada
Keywords: None
Views: 259
Comments: 1

One presentation outlines how the NSA performs “industrial-scale exploitation” of computer networks across the world.

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.

The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.

The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”

In a top-secret presentation, dated August 2009, the NSA describes a pre- programmed part of the covert infrastructure called the “Expert System,” which is designed to operate “like the brain.” The system manages the applications and functions of the implants and “decides” what tools they need to best extract data from infected machines.

Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm F-Secure, calls the revelations “disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.

“When they deploy malware on systems,” Hypponen says, “they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties.”

Hypponen believes that governments could arguably justify using malware in a small number of targeted cases against adversaries. But millions of malware implants being deployed by the NSA as part of an automated process, he says, would be “out of control.”

“That would definitely not be proportionate,” Hypponen says. “It couldn’t possibly be targeted and named. It sounds like wholesale infection and wholesale surveillance.”

The NSA declined to answer questions about its deployment of implants, pointing to a new presidential policy directive announced by President Obama. “As the president made clear on 17 January,” the agency said in a statement, “signals intelligence shall be collected exclusively where there is a foreign intelligence or counterintelligence purpose to support national and departmental missions, and not for any other purposes.”

“Owning the Net”

The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.

Click for Full Text!

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: Ada (#0)

Windows is as watertight as a screen door would be on a submarine. There are almost 3000 back doors built in to the OS. It doesn't take much brain power to have your way with any windows based system.

The beauty of the second amendment is that it will not be needed until they try to take it away-Thomas Jefferson

Give Me Liberty  posted on  2014-03-13   21:29:03 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]