|
To perform a man-on-the-side attack, the NSA observes a target?s Internet traffic using its global network of covert ?accesses? to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency?s surveillance sensors alert the TURBINE system, which then ?shoots? data packets at the targeted computer?s IP address within a fraction of a second.
In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target?s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action. |
|
Robert Cailliau |
The Web is actually a coming together of three technologies, if you like: the hypertext, the personal computer, and the network. So, the network we had, and the personal computers were there, but people didn't use them, because they didn't know what to use them for, except maybe for a few games. |