Sign in to follow this  
Followers 0
Turk.

How The NSA Plans To Infect

11 posts in this topic

By Ryan Gallagher And Glenn Greenwald 12 Mar 2014, 9:19 AM EDT

vo38ra.jpg
One presentation outlines how the NSA performs ?industrial-scale exploitation? of computer networks across the world.
Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.
The classified files ? provided previously by NSA whistleblower Edward Snowden ? contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware ?implants.? The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.
The covert infrastructure that supports the hacking efforts operates from the agency?s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target?s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer?s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.
The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system ? codenamed TURBINE ? is designed to ?allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.?

In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the ?Expert System,? which is designed to operate ?like the brain.? The system manages the applications and functions of the implants and ?decides? what tools they need to best extract data from infected machines.
etuq1t.jpg5v279t.jpg
xf95ow.jpgw9ivl4.jpg
b55wno.png2lvhb0p.png

Full Article

2 people like this

Share this post


Link to post
Share on other sites

Based on the first image, I've concluded that the NSA is using a giant fan to blow viruses across the ocean into Euro-Asia and Africa. Seriously, I didn't read the article, but that image is great.

12 people like this

Share this post


Link to post
Share on other sites

Well, this is it.

Share this post


Link to post
Share on other sites

I thought this is Skynet.

Share this post


Link to post
Share on other sites

Rel To US,UK,AUS,CAN,NZL. They had forgotten/omitted/ignored IRELAND? :)

Share this post


Link to post
Share on other sites

They won't infect mine, I'll just disconnect it from the internet.  That will show 'em!  :P

1 person likes this

Share this post


Link to post
Share on other sites

This is nothing new... Have  you guys read about HB Gary?  His web site is now tagged by WOT as a bad website.

1 person likes this

Share this post


Link to post
Share on other sites

Based on the first image, I've concluded that the NSA is using a giant fan to blow viruses across the ocean into Euro-Asia and Africa.

 

I think this is similar to when I'm home, and fart in the summer. The fan in the corner picks it up and spreads it around the room, and down the hall.

 

I'm like, f you fan. f you.

Share this post


Link to post
Share on other sites

What you guys don't believe this. . .come on look at all those pretty flow charts, and how well developed they are; this can only be real then . . .maybe. . . :rofl:  :rofl: :rofl:  :rofl:  :rofl:  :rofl:  :rofl:  

Share this post


Link to post
Share on other sites

They can't penetrate my tough firewall in Windows Server 2012 R2.

1 person likes this

Share this post


Link to post
Share on other sites

That just looks like a load of bull crap on a slide. I mean come on Pressure Wave? ha Also why use the word Internet Cloud??? The Internet != Cloud. I presume this "slideshow" was aimed at investors ha

 

The more and more stuff that gets "Leaked" I think its a precursor to something much bigger. No way if they were this good at whatever this is would they let someone walk out of the door with all these documents. Unless they were focusing and concentrating their efforts in the wrong way. 

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0

  • Recently Browsing   0 members

    No registered users viewing this page.