Templeton Times

Saturday, March 15, 2014

The Worldwide Surveillance Machine: Leaked NSA Documents expose Agency’s Sophisticated Malware Arsenal By Thomas Gaist Global Research, March 14, 2014


Global Research


The Worldwide Surveillance Machine: Leaked NSA Documents expose Agency’s Sophisticated Malware Arsenal

By Thomas Gaist
Global Research, March 14, 2014
World Socialist Web Site
Region: USA
Theme: Intelligence, Police State & Civil Rights
 7
 5  1
 
 26
nsa
In an article published Wednesday by the Intercept, “How the NSA Plans to Infect ‘Millions’ of Computers with Malware,” Glenn Greenwald and Ryan Gallagher made public yet more revelations—based on documents provided to them by Edward Snowden—about US National Security Agency surveillance operations.
The latest documents show that the NSA has escalated its “active” surveillance operations exponentially during the past decade. In contrast to passive surveillance, active surveillance methods involve intervening directly against targeted machines using a sophisticated arsenal of malware for a range of surveillance-related purposes. According to the Intercept, the NSA’s malware efforts have already infected at least 85,000 to 100,000 computers.
The leaked documents detail various aspects of a worldwide surveillance machine that is increasingly automated.
The growth of spying operations has encouraged the agency to automate aspects of its work. The NSA presentation states, “One of the greatest challenges for active SIGINT/attack is scale,” and adds, “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture.)”

A program codenamed TURBINE, which has been operating since at least the summer of 2010, automated aspects of the process of malware deployment by NSA hackers. The Intercept described the program as “a major tactical shift within the NSA that was expected to have a profound impact—allowing the agency to push forward into a new frontier of surveillance operations.” One NSA document leaked to the Intercept conceived TURBINE as a means to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.”
The intelligence “Black Budget” leaked by Snowden listed TURBINE as a main component of the NSA project “Owning the Net.”
The NSA leaks characterize TURBINE as: “A new intelligent command and control capability designed to manage a very large number of covert implants for active SIGINT and active Attack that reside on the GENIE covert infrastructure (for endpoint data extraction). It will increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.”
Malware tools deployed by the NSA and operating increasingly on an automated basis under TURBINE, include:
UNITEDRAKE—takes control over computers through plug-ins
CAPTIVATEDAUDIENCE—takes control of computer microphones and records users’ conversations
GUMFISH—accesses computer webcams to take photos of those nearby
FOGGYBOTTOM—records users’ browsing histories and collects login information including passwords for email accounts
SALVAGERABBIT—extracts data from removable flash drives once they are linked to a targeted machine
HAMMERCHANT and HAMMERSTEIN—carries out “exploitation attacks” against Virtual Private Network (VPN) systems, track phone calls sent via Skype
QUANTUMSKY—blocks targeted computers from accessing web sites
QUANTUMCOPPER – corrupts files downloaded by targeted computers
WILLOWVIXEN—sends spam messages with malicious links containing “back-door implants”
QUANTUMHAND—uses fake Facebook server to “shoot” malware packets at target
SECONDDATE—modifies content of communications between servers and clients in real time, redirects browsers to NSA servers codenamed FOXACID, said by NSA docs to have “mass exploitation potential for clients passing through network choke points”
VALIDATOR—downloads and uploads data to and from targeted computers
The NSA also launches malware attacks against systems administrators of telecommunications providers. This practice enables the NSA to spy on all communications being handled by a given provider.
“Sys admins are a means to an end” wrote an NSA operative in an internal message titled, “I hunt sys admins,” the documents show.
TURBINE operations are coordinated with a global network of surveillance “sensors,” codenamed TURMOIL, set up by the NSA around the world. This network finds targets by identifying data “selectors” including email and IP addresses, usernames, etc.
The documents leaked to the Intercept show that the other major powers which make up the “Five Eyes” global surveillance alliance—the UK, Canada, New Zealand, and Australia—have been involved in the use of malware implants. As part of its TURMOIL network, the NSA runs a joint eavesdropping base with the Government Communications Headquarters (GCHQ) in Britain, called the Menwith Hill satellite eavesdropping base.
The latest documents also revealed that GCHQ has been targeting systems administrators at Belgacom, known as “Operation Socialist,” since at least 2010.
In the wake of Snowden’s exposure of the mass surveillance, a propaganda offensive was initiated by the ruling elite, claiming that the spying was “narrowly targeted” against highly specific, imminent terrorist threats. These arguments have been thoroughly discredited. As the most recent leaks show, the US and its allies are carrying out aggressive surveillance and cyberwarfare operations against their own populations and targets around the world.
The implementation of “active” surveillance practices reflects the drive of the state to accumulate as much information on as many people as possible, in preparation for state repression against the mass struggles now developing in the international working class. This political agenda is propelling the continuous expansion and automation of the spying machinery.
SHOP GLOBAL RESEARCH
 7
 5  1
 
 26
Articles by: Thomas Gaist

Related content:

Disclaimer: The contents of this article are of sole responsibility of the author(s). The Centre for Research on Globalization will not be responsible for any inaccurate or incorrect statement in this article. The Center of Research on Globalization grants permission to cross-post original Global Research articles on community internet sites as long as the text & title are not modified. The source and the author's copyright must be displayed. For publication of Global Research articles in print or other forms including commercial internet sites, contact: publications@globalresearch.ca
www.globalresearch.ca contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to our readers under the provisions of "fair use" in an effort to advance a better understanding of political, economic and social issues. The material on this site is distributed without profit to those who have expressed a prior interest in receiving it for research and educational purposes. If you wish to use copyrighted material for purposes other than "fair use" you must request permission from the copyright owner.
For media inquiries: publications@globalresearch.ca
Copyright © Thomas Gaist, World Socialist Web Site, 2014
Font-size:
A+
Print:

Latest News / Top Stories

  • Regime Change: First Ukraine, then Venezuela, then Ecuador, Bolivia, Brazil . . . China?
  • The Blossoming of “Idle No More”. Canada’s First Nations Movement
  • Aleksandr Solzhenitsyn: Ukraine and The New Russia
  • Ukraine’s Gold Reserves Secretely Flown Out and Confiscated by the New York Federal Reserve?
  • CIA Intimidation, Obstruction and Spying on US Congress: Obama’s “High Crimes and Misdemeanors”
  • Malware “Industrialises Spying”: The NSA has “Automated its Spying Operations”
  • The Worldwide Surveillance Machine: Leaked NSA Documents expose Agency’s Sophisticated Malware Arsenal
  • Germany Threatens “Massive Damage” to Russia ahead of Crimea Referendum
  • Israel calls for “Full Reoccupation” of Gaza Strip
  • GMO Agribusiness in India: Grassroots Action against Monsanto, Cargill, Sygenta
  • The Pentagon’s Map of Afghanistan: An Eldorado of Mineral Wealth and Natural Resources
  • After Ukraine, Turkey might be the Next Target of “Regime Change”
  • Controlling the Lens: The Media War Being Fought Over Ukraine Between the Western Bloc and Russia
  • Coups, False Flags, Covert Wars, Color Revolutions: Ukraine and America’s Neocolonial Adventure
  • The “Big Secret” Behind the CIA Spying on the Congress: America’s “Rogue Government” Controlled by US Intelligence
All Articles
  • News
  • Most Popular
  • Geograpic Regions
  • Themes
  • I-Books Series
  • In-Depth Reports
  • The global research news hour

Global Research Newsletter:

  • Let Them Stay Week 2014 – Stop the deportations!
  • Become a Member of Global Research – Receive Free Books!
  • “Artworks for Peace”: Support Global Research
Donate to Global Research
  • Advanced Search
  • Index by Countries
  • Index by Author

Join us on Facebook

  • youtube
  • twitter
  • facebook
  • rss

Twitter: crg_crm

  • Chernobyl and Fukushima Radiation Reduces Animal and Plant Numbers, Diversity, Lifespan,... http://t.co/iWpSJQ5qXu 03:46:33 PM March 13, 2014 from Facebook

Global Research Publishers

  • Towards a World War III Scenario
    Towards a World War III Scenario by Michel Chossudovsky Buy Now!
  • America's War on Terrorism
    America's "War on Terrorism" by Michel Chossudovsky Buy Now!
  • Globalization of Poverty and the New World Order
    Globalization of Poverty and the New World Order by Michel Chossudovsky Buy Now!
  • Seeds of Destruction: Hidden Agenda of Genetic Manipulation
    Seeds of Destruction: Hidden Agenda of Genetic Manipulation by F. William Engdahl Buy Now!
  • The Global Economic Crisis: The Great Depression of the XXI Century
    The Global Economic Crisis by M. Chossudovsky and A. G. Marshall Buy Now!
Visit our online store

Partner Websites

  • Project Censored
  • Stop NATO
  • Strategic Culture Foundation
  • The Corbett Report
  • Washington's Blog
The 4th Media - Just another voice
Clarity Press
  • English
  • Français
  • Español
  • Italiano
  • Deutsch
  • Português
  • srpski
  • العربية
  • Global Research News
  • I-BOOKS SERIES
  • Countries Index
  • Authors Index
  • Most Popular
  • Links
  • Contact
  • Membership
  • Online Store
Themes
Geographic Regions
  • US NATO War Agenda
  • Global Economy
  • Crimes against Humanity
  • Militarization and WMD
  • Law and Justice
  • Police State & Civil Rights
  • Culture, Society & History
  • 9/11 & ‘War on Terrorism’
  • Media Disinformation
  • Militarization and WMD
  • Oil and Energy
  • Police State & Civil Rights
  • Politics and Religion
  • Poverty & Social Inequality
  • Science and Medicine
  • United Nations
  • US NATO War Agenda
  • Women’s Rights
  • USA
  • Canada
  • Middle East & North Africa
  • Latin America & Caribbean
  • Europe
  • sub-Saharan Africa
  • Russia and FSU
  • Asia
  • Oceania
GlobalResearch Center for Research on Globalization Privacy Policy Copyright © 2005-2014 GlobalResearch.ca
Baldwin Templeton at 4:48 AM
Share

No comments:

Post a Comment

‹
›
Home
View web version

About Me

Baldwin Templeton
View my complete profile
Powered by Blogger.