Click here to log in
Click here to log in
Home
Popular
Search
Rank
Users
About

Thought



Main Conversations Thoughts Quotes
 
cauz March 13, 2014, 12:46 p.m.
  • 0
  • 0
  • 3
 
How the NSA Plans to Infect ?Millions? of Computers with Malware|https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/?t=dXNlcmlkPTUyMDcxMjMyLGVtYWlsaWQ9NTc3MQ==
Comments
xsziorv March 13, 2014, 12:57 p.m.
  • 0
  • 0
  • 0
whaaaaaaat
 
cauz March 13, 2014, 9:28 p.m.
  • 0
  • 0
  • 0
The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.

To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency?s term for the interception of electronic communications. Instead, it sought to broaden ?active? surveillance methods ? tactics designed to directly infiltrate a target?s computers or network devic...
 
cauz March 13, 2014, 9:29 p.m.
  • 0
  • 0
  • 0
To perform a man-on-the-side attack, the NSA observes a target?s Internet traffic using its global network of covert ?accesses? to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency?s surveillance sensors alert the TURBINE system, which then ?shoots? data packets at the targeted computer?s IP address within a fraction of a second.

In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target?s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the ...