-
9-11 Eleven Years Later
-
these engineers and architects are pretty dumb if they cant work the real 911 truth out....they should ...
-
-
China's Air Pollution Behind Erratic Weather in the U.S., say Climatologists
-
Coal is dirty, but what happens to Australia if Chinese consumption falls.
-
-
Community Chat Room Poll
-
I get the impression this chat will start ringing like crazy
-
-
UK Column Live 9th July 2012
-
as activist for ukip and supporter of uk column having passed around 100,000 copys of this paper ...
-
Latest Comments
Chat Room Info
Rooms:
None
Users: None
How the NSA Plans to Infect ‘Millions’ of Computers with Malware
- Details
- Created on Thursday, 13 March 2014 19:30

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.
The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware "implants." The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.
The covert infrastructure that supports the hacking efforts operates from the agency's headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target's computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer's microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.
The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to "allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually."
READ MORE: How the NSA Plans to Infect ‘Millions’ of Computers with Malware


