Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
General Discussion
Showing Original Post only (View all)HEADS UP "Systems Admins!"-- How the NSA Targets Those of You with 'Keys to Digital Kingdoms' [View all]
Last edited Sun Mar 23, 2014, 03:17 PM - Edit history (1)
How the NSA Targets Those with 'Keys to Digital Kingdoms'
Though accused of no wrongdoing whatsoever, spy agency targets personal computers of individuals whose job it is to protect online networks
- Jon Queally, staff writer
The latest reporting from The Intercept reveals how individuals across the world who work as 'system administrators' for computer and online networks had their personal computers and digital information targeted by National Security Agency hacking units as a way for the agency to gain access to the systems they controlled.
Our ability to pull bits out of random places of the Internet, bring them back to the mother-base to evaluate and build intelligence off of is just plain awesome! NSA employee
Though those targeted were not suspected of any wrong doing whatsoever, internal NSA documents provided by NSA whistleblower Edward Snowden show that these people, called "sys admins" for short, had their email and Facebook accounts tracked as the government hackers tried to access their "network maps, customer lists, [and] business correspondence."
The overall effort by the NSA relates to previously reported programs based on Snowden documents that show efforts by the US surveillance agency and their British counterparts at the GCHQ to gain direct access to "foreign network routers" and other digital systems without the companies or governments who control those networks knowing. Who better to target than the person that already has the keys to the kingdom? asks one NSA-employed hacker in a post cited by The Intercept.
Strikingly, according to the reporting by journalists Ryan Gallagher and Peter Maass, these internal NSA "posts" were written by an individual NSA employee thought to be a contract "network specialist" with a highly "boastful and casual tone," describing how bits of personal datalike "pictures of cats in funny poses with amusing captions"could also be harvested alongside information related to the professional work of the targeted sys admin. The posts are full of "hacker jargon (pwn, skillz, zomg, internetz)" and "punctuated with expressions of mischief" such as Current mood: devious. Another reads: Current mood: scheming.
Gallagher and Maass report:
It is unclear how precise the NSAs hacking attacks are or how the agency ensures that it excludes Americans from the intrusions. The author explains in one post that the NSA scours the Internet to find people it deems probable administrators, suggesting a lack of certainty in the process and implying that the wrong person could be targeted. It is illegal for the NSA to deliberately target Americans for surveillance without explicit prior authorization. But the employees posts make no mention of any measures that might be taken to prevent hacking the computers of Americans who work as sys admins for foreign networks. Without such measures, Americans who work on such networks could potentially fall victim to an NSA infiltration attempt.
Here's how it works:
The first step, according to the posts, is to collect IP addresses that are believed to be linked to a networks sys admin. An IP address is a series of numbers allocated to every computer that connects to the Internet. Using this identifier, the NSA can then run an IP address through the vast amount of signals intelligence data, or SIGINT, that it collects every day, trying to match the IP address to personal accounts.
What wed really like is a personal webmail or Facebook account to target, one of the posts explains, presumably because, whereas IP addresses can be shared by multiple people, alternative selectors like a webmail or Facebook account can be linked to a particular target. You can dumpster-dive for alternate selectors in the big SIGINT trash can the author suggests. Or pull out your wicked Google-fu (slang for efficient Googling) to search for any official and non-official e-mails that the targets may have posted online.
Once the agency believes it has identified a sys admins personal accounts, according to the posts, it can target them with its so-called QUANTUM hacking techniques. The Snowden files reveal that the QUANTUM methods have been used to secretly inject surveillance malware into a Facebook page by sending malicious NSA data packets that appear to originate from a genuine Facebook server. This method tricks a targets computer into accepting the malicious packets, allowing the NSA to infect the targeted computer with a malware implant and gain unfettered access to the data stored on its hard drive.
Just pull those selectors, queue them up for QUANTUM, and proceed with the pwnage, the author of the posts writes. (Pwnage, short for pure ownage, is gamer-speak for defeating opponents.) The author adds, triumphantly, Yay! /throws confetti in the air.
What wed really like is a personal webmail or Facebook account to target, one of the posts explains, presumably because, whereas IP addresses can be shared by multiple people, alternative selectors like a webmail or Facebook account can be linked to a particular target. You can dumpster-dive for alternate selectors in the big SIGINT trash can the author suggests. Or pull out your wicked Google-fu (slang for efficient Googling) to search for any official and non-official e-mails that the targets may have posted online.
Once the agency believes it has identified a sys admins personal accounts, according to the posts, it can target them with its so-called QUANTUM hacking techniques. The Snowden files reveal that the QUANTUM methods have been used to secretly inject surveillance malware into a Facebook page by sending malicious NSA data packets that appear to originate from a genuine Facebook server. This method tricks a targets computer into accepting the malicious packets, allowing the NSA to infect the targeted computer with a malware implant and gain unfettered access to the data stored on its hard drive.
Just pull those selectors, queue them up for QUANTUM, and proceed with the pwnage, the author of the posts writes. (Pwnage, short for pure ownage, is gamer-speak for defeating opponents.) The author adds, triumphantly, Yay! /throws confetti in the air.
In a final detail worth noting, The Intercept describe how the NSA posts contained in the slides reveal the internal debate at the agency over the sheer volume of data being collected by their various surveillance techniques. Whereas some agents criticized the poor infrastructure and its inability to handle so much data from around the globe, other employees celebrated what has become known as the NSA's "collect it all approach" to the world of online surveillance.
Our ability to pull bits out of random places of the Internet, bring them back to the mother-base to evaluate and build intelligence off of is just plain awesome! the author writes. One of the coolest things about it is how much data we have at our fingertips.
____________________________________
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 License.
http://www.commondreams.org/headline/2014/03/21-0
InfoView thread info, including edit history
TrashPut this thread in your Trash Can (My DU » Trash Can)
BookmarkAdd this thread to your Bookmarks (My DU » Bookmarks)
31 replies, 2242 views
ShareGet links to this post and/or share on social media
AlertAlert this post for a rule violation
PowersThere are no powers you can use on this post
EditCannot edit other people's posts
ReplyReply to this post
EditCannot edit other people's posts
Rec (34)
ReplyReply to this post
31 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies