Close Menu
USAHITMAN Conspiracy News
    Facebook X (Twitter) Instagram
    USAHITMAN Conspiracy NewsUSAHITMAN Conspiracy News
    • Home
    • Featured News
      Featured

      Prince Warned Of 9/11 Attacks In 1998

      9/11 May 7, 2016
      Recent

      Hunter Biden filmed himself smoking crack behind the wheel, driving at 172mph on way to Vegas: photos

      July 2, 2023

      King Charles, Bill Gates Foundation and The OceanGate Missing Submarine – How its connected

      June 22, 2023

      Why Is WEF & Bill Gates-Funded APEEL ON Organic Produce?

      June 18, 2023
    • Conspiracy News
      1. 911 Conspiracy
      2. Big Brother
      3. Police State
      4. NWO
      5. UFOs & ETs
      6. Conspiracy or Not
      7. Freemasonry
      8. Chemtrails
      9. HAARP News
      10. The Unknown
      11. Terrorism
      12. Lies & Hoaxes
      Featured

      Candidate Le Pen’s Political Ad Regarding France from the Year 2011

      Conspiracy or Not July 3, 2023
      Recent

      Candidate Le Pen’s Political Ad Regarding France from the Year 2011

      July 3, 2023

      Justice Department: Misconduct by federal jail guards led to Jeffrey Epstein’s suicide

      June 28, 2023

      The 4th Dimension and the Birth of the Jungle Gym

      June 27, 2023
    • Interesting News
      1. Covid
      2. Deaths
      3. Food & Health News
      4. Economy & Money
      5. Restrictions
      6. Bitcoin News
      7. Our Second Amendment
      8. Science & Space
      9. Much More News
      Featured

      U.S. Navy says it can convert seawater into fuel

      Interesting News April 8, 2014
      Recent

      George Soros’ foundation lays off 40% of workforce after billionaire investor’s son takes over

      July 1, 2023

      Supreme Court rejects affirmative action at colleges as unconstitutional

      June 30, 2023

      Prosecutor Reportedly Told Six Witnesses He Was Not Permitted To Charge Hunter Biden

      June 28, 2023
    • Archived Years
      • 2010 Articles
      • 2011 Articles
      • 2012 Articles
    USAHITMAN Conspiracy News
    Home»Featured News»How the NSA Plans to Infect ‘Millions’ of Computers with Malware

    How the NSA Plans to Infect ‘Millions’ of Computers with Malware

    March 13, 20145 Mins Read
    Facebook Twitter Reddit Telegram Email

    ggnimoc2

    Yet more previously secret surveillance operations waged by the United States National Security Agency were made public Wednesday morning thanks to leaked documents supplied by former NSA contractor Edward Snowden.

    The files — published first by The Intercept this week and dissected over the course of a 3,000-word article attributed to journalists Glenn Greenwald and Ryan Gallagher — bring to light a number of previously unreported programs undertaken by the secretive US spy agency, including operations that have given the NSA the potential to infect millions of computers around the world by relying on malicious software that’s sent to targets through surreptitious means.

    In recent years, however, the NSA has reportedly made adjustments to these operations that enable them to by carried out automatically without the direct aid of human spies — a decision that experts say is undermining the internet as it is known today,

    “Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process,” the journalists wrote.

    That automated system named “TURBINE,” they said later, is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”

    According to The Intercept, the NSA has escalated offensive cyber operations significantly since 2004 in order to spy on targets, and has used an array of tactics and “implants” that were previously undisclosed in order to carry out these missions.

    The website reported that the agency’s British counterpart, the GCHQ, “appears to have played an integral role” with regards to developing these implants, which have grown in number exponentially in recent years from only 100 or so to tens-of-thousands, according to the report.

    These implants, the journalists wrote, allow the NSA “to break into targeted computers and to siphon out data from foreign Internet and phone networks.” They can also be combined with a number of specialized plugins to provide analysts with additional surveillance options, the likes of which could likely leave many thinking staying secure on the Web seem impossible after reading the Greenwald and Gallagher report.

    vebns3

    In one example cited by The Intercept, the NSA disguised itself as a fake Facebook server in order to intercept connections attempted to be made between account holders and the social networking site’s real computers. Instead, however, the NSA sends those unsuspecting Facebook users to a real site embedded with malware that then has the ability to infect that target’s computer.

    That program — QUANTUMHAND — became operational in October 2010, The Intercept reported, after it successfully allowed the NSA to gain access to “about a dozen targets.”

    A spokesperson for Facebook told The Intercept he had “no evidence of this alleged activity,” but QUANTUMHAND is far from the only program that, thanks to Edward Snowden, have linked the NSA to relying on already established websites and programs to pry into the communications of targets.

    In another example, The Intercept included images from an internal NSA slideshow presentation that indicates surveillance missions can be waged by the agency against targeted email addresses, IP addresses and the “cookies” created by websites like Google, Yahoo, YouTube and countless others to track visitors, often for advertisement and user experience purposes.

    ne4

    Ashkan Soltani, a DC-based independent security researcher, remarked on Twitter that the information in that presentation “looks a lot like a catalog of ad tracking tech.” Instead of being used by the likes of Google to give YouTube users a more “personalized” browsing experience, however, the NSA and GCHQ can use these selectors to spy on the habits of unknowing subjects of investigation.

    Other programs disclosed by Mr. Snowden and described by The Intercept include CAPTIVATEDAUDIENCE (“used to take over a targeted computer’s microphone and record conversations”, GUMFISH (“can covertly take over a computer’s webcam and snap photographs”), FOGGYBOTTOM (“records logs of Internet browsing histories and collects login details and passwords”), GROK (“used to log keystrokes”) and SALVAGERABBIT to exfiltrate data from removable flash drives connected to a target’s computer.

    To infect computers with these implants, The Intercept said, the NSA can avoid trying to trick targets into going to fake websites by instead spamming them with unsolicited email containing links to malware.

    “If we can get the target to visit us in some sort of web browser, we can probably own them,” an NSA employee wrote in one of the previously secret documents. “The only limitation is the ‘how.’”

    5vpnns

    The Intercept’s latest report was published only two days after Snowden spoke remotely to the audience of the SXSW Interactive tech conference in Austin, Texas and urged attendees to use encryption — a tactic, he said, that is still relatively successful with regards to thwarting snooping like the kind carried out by the NSA.

    Encryption, Snowden said on Monday, makes it“very difficult for any sort of mass surveillance”to occur.

    If The Intercept’s report is anywhere close to representative of the NSA’s actual capabilities though, then the agency’s operations are expanding regardless and relying on new tricks and techniques to track down and monitor persons of interest in the name of national security.

    “When they deploy malware on systems,” malware expert Mikko Hypponen told The Intercept, “they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties.”

    =”http://rt.com/usa/nsa-greenwald-malware-infect-382/”>Source

    Computers Infect Malware Millions NSA Plans
    Share. Facebook Twitter Pinterest Email Reddit

    Related Posts

    Hunter Biden filmed himself smoking crack behind the wheel, driving at 172mph on way to Vegas: photos

    July 2, 2023

    King Charles, Bill Gates Foundation and The OceanGate Missing Submarine – How its connected

    June 22, 2023

    Why Is WEF & Bill Gates-Funded APEEL ON Organic Produce?

    June 18, 2023

    Candidate Le Pen’s Political Ad Regarding France from the Year 2011

    July 3, 2023

    Vaccine billionaire’s 3000 per cent gain with surprise bet

    July 3, 2023

    Hunter Biden filmed himself smoking crack behind the wheel, driving at 172mph on way to Vegas: photos

    July 2, 2023

    Millions of Your Taxpayer Dollars Are Going to Fund Foreign Pride Parades and Drag Shows

    July 2, 2023
    Categories
    • 9/11 (108)
    • Big Brother (635)
    • Conspiracy or Not (567)
    • Covid (270)
    • Deaths (71)
    • Economy & Money (953)
    • Featured News (377)
    • Food & Health News (1,146)
    • Fukushima (82)
    • Interesting News (1,956)
    • Lies & Hoaxes (112)
    • More News (2,399)
    • NWO (385)
    • Police State (628)
    • Politics (333)
    • Predictions and Prophecies (43)
    • Random News (2,487)
    • Restrictions (152)
    • Science & Space (953)
    • Second Amendment (129)
    • Secret Societies (112)
    • Survival (67)
    • Terrorism (595)
    • The Unknown (666)
    • UFOs & ETs (388)
    • Vaccine News (237)
    • War News (878)
    • Weather Manipulation (34)
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.