Announcement

Collapse
No announcement yet.

How the NSA Plans to Infect ‘Millions’ of Computers with Malware

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • How the NSA Plans to Infect ‘Millions’ of Computers with Malware

    Below is just an excerpt, please read the entire article.



    Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.

    The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.

    The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.

    In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

    The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”

    In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the “Expert System,” which is designed to operate “like the brain.” The system manages the applications and functions of the implants and “decides” what tools they need to best extract data from infected machines.

    Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm F-Secure, calls the revelations “disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.

    “When they deploy malware on systems,” Hypponen says, “they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties.”

    Hypponen believes that governments could arguably justify using malware in a small number of targeted cases against adversaries. But millions of malware implants being deployed by the NSA as part of an automated process, he says, would be “out of control.”

    “That would definitely not be proportionate,” Hypponen says. “It couldn’t possibly be targeted and named. It sounds like wholesale infection and wholesale surveillance.”

    The NSA declined to answer questions about its deployment of implants, pointing to a new presidential policy directive announced by President Obama. “As the president made clear on 17 January,” the agency said in a statement, “signals intelligence shall be collected exclusively where there is a foreign intelligence or counterintelligence purpose to support national and departmental missions, and not for any other purposes.”

  • #2
    Somebody at NSA has been watching Person of Interest.

    Comment


    • #3
      Thank god I've got a Mac.

      Comment


      • #4
        Having/using a Mac doesn't exclude one from being surveiled by this garbage.

        Comment


        • #5
          Originally posted by Tx Redneck View Post
          Having/using a Mac doesn't exclude one from being surveiled by this garbage.
          Does too. Mac is the solution to all problems
          I wear a Fez. Fez-es are cool

          Comment


          • #6
            Originally posted by Sean88gt View Post
            Somebody at NSA is a writer for Person of Interest.
            fixed
            Fuck you. We're going to Costco.

            Comment


            • #7
              Originally posted by Forever_frost View Post
              Does too. Mac is the solution to all problems

              Exactly.

              Comment


              • #8
                System is ready.

                Comment


                • #9
                  Originally posted by Forever_frost View Post
                  Does too. Mac is the solution to all problems
                  Snowden says it will always succede when they hack an iphone. Ios is based off MacOs so youre probably a lot safer with linux
                  WH

                  Comment


                  • #10
                    Exactly why I run Windows95

                    Comment


                    • #11
                      WinNT 4.0 SP5
                      When the government pays, the government controls.

                      Comment


                      • #12
                        working towards skynet more each week!

                        Comment

                        Working...
                        X