Sunday, April 18, 2021
FEATURED ARTICLES New Snowden Bombshell: NSA Can Pose as Facebook And Hack Into Computers...

New Snowden Bombshell: NSA Can Pose as Facebook And Hack Into Computers to Steal Computer Data

Like the post? Why not make it Facebook official. ⇊

NSA Stealing Info

Just when you thought the NSA couldn’t get any more detestable, new information released yesterday reveals that the agency has expanded its hacking capabilities and can infect millions of computers with malware “imprints.”


 

General Michael Flynn defense fund Fellow patriots, please listen to this short, inspiring message from General Flynn. General Michael Flynn exemplifies patriotism, courage, and love of God and country - despite some of his own countrymen relentlessly attacking him. Donations for his defense are greatly appreciated. If you can only give $5.00, please do so - every little bit helps. Thank you so much, and God bless. Letter from General Flynn. 


Documents provided by NSA whistleblower Edward Snowden provide details about the groundbreaking technology, which uses automated systems to hack into computers on a mass scale without much human oversight.

The documents also revealed that the NSA has pretended to be Facebook to install its malware, according to The Intercept:

You Might Like

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The automated system the NSA is using is codenamed TURBINE and is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.” TURBINE is listed as part of a larger NSA surveillance plan called “Owning the Net.”

Taxpayer money in the amount of $67.6 million was sought by the agency in 2013, with some specifically designated for expansion of TURBINE for “a wider variety” of networks and “enabling greater automation of computer network exploitation.”

The Intercept explained how TURBINE works:

TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.”

In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations.

The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)

According to the secret files, the system has been in use since at least July 2010, and the NSA has already deployed between 85,000 and 100,000 implants worldwide.

The NSA has employed the use of spam emails that trick users into clicking on malicious links. This “back-door implant”, codenamed WILLOWVIXEN, infects computers within 8 seconds. This method isn’t working as well as it used to, according to documents, because people have become more careful about clicking links in emails.

Enter QUANTUMHAND, the system the NSA uses to pose as Facebook:

In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive.

Facebook has denied any knowledge of the program, and told the National Journal that the site is now protected from such attacks:

“We have no evidence of this alleged activityIn any case, this method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year.

“If government agencies indeed have privileged access to network service providers, any site running only HTTP could conceivably have its traffic misdirected.”

Matt Blaze, a surveillance and cryptography expert at the University of Pennsylvania, told The Intercept he has concerns about the NSA using TURBINE and QUANTUMHAND together:

“As soon as you put this capability in the backbone infrastructure, the software and security engineer in me says that’s terrifying.

“Forget about how the NSA is intending to use it. How do we know it is working correctly and only targeting who the NSA wants? And even if it does work correctly, which is itself a really dubious assumption, how is it controlled?”

Malware installed by the NSA is capable of performing different tasks on infected computers, as this list compiled by the LA Times outlines:

  • Use a computer’s microphone to record audio
  • Use a computer’s webcam to take photos
  • Record a computer’s Internet browsing history
  • Record login details and passwords use for Web services
  • Log users’ keystrokes
  • Extract data from flash drives when they are plugged into infected computers
  • Block users from accessing certain websites
  • Corrupt files that computers attempt to download

In response to the story, the NSA provided the following statement:

“Signals intelligence shall be collected exclusively where there is a foreign intelligence or counterintelligence purpose.”

Do they really expect us to believe that?

SOURCE: Freedom Outpost


Viewpoints expressed herein are of the article’s author(s), or of the person(s) or organization(s) quoted or linked therein, and do not necessarily represent those of TCP News

What you can do to help:

 

It is vitally important that we all take the time to like and share articles regardless of what site you are on. Conservative sites (like this one) cannot count on traffic from Facebook etc. any more. Subscribing is also important; this bypasses the censorship. The more that we can get the word out the better – and in order to continue bringing you content like this – we ALL need traffic in order to survive. Sign up for desktop notifications (the red bell symbol). Running a website is not only expensive, it also takes a lot of time and effort.

No one likes ads, but very few people will donate, hence the reason most of us have ads.

Besides donating and clicking on ads, you can make a purchase from our store and buy my book.

Don't forget to follow TCP News on Parler, USA Life, Gab, Facebook, and Twitter

TCP News is proud to be ranked #24 in the Top 40 Conservative Political Blogs

Thank you for helping us grow, we appreciate it!


2 COMMENTS

  1. I find that amusing that the NSA states (without a smidgen of corruption) that “intelligence shall be collected exclusively where there is a foreign intelligence or counterintelligence purpose.” Really? From the location ISP’s on my blog’s statcounter, I am receiving hits from the Department of Defense in many different states. I am getting views from Homeland Security in different areas; from the IRS in Washington, D.C.; from the FBI Criminal Justice Information system; and that is just to name a few. Sometimes the views last for several hours. I have a Christian blog. Is that some sort of counterintelligence threat that requires our taxpayer dollars to investigate?

    • You said it sister! We are all terrorists you know. What a joke…you would think that the us gov. would have better things to do than monitor us. They can monitor us who have relatively small web sites, but cannot find a jumbo jet that disappeared? Uh huh.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Related news

One Thing That The “Officials” Forgot To Tell You About The Vaccines, The Truth (Video)

Why isn't the public being informed about how dangerous the vaccines are and the many resulting deaths?   By Bradlee Dean “Four scathing federal studies, including two...

Maricopa County Arizona Forensic Audit Will Move Forward – Results of Antrim County Georgia Audit

After nearly six months of political and legal maneuvering, the Maricopa County, Arizona forensic audit is about to commence   By Lyle Rapacki (TCP News)  The adversarial...

Should Democrats be Named a Subversive Organization and be Banned From Holding Office?

It’s clear that Democrats are violating their oath of office and have become the most dangerous enemies of the Constitution   By Joe Newby To say that...

Around the World of Woke in 80 Days

The reality is that these policies are being proposed and implemented against the will of the American people   By Jeff Crouere (TCP News)  The first 80...