NSA has direct access to tech giants' systems for user data, secret files reveal

Discussion in 'privacy general' started by Dermot7, Jun 6, 2013.

  1. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    I totally agree. I also love his role in "The Magic Christian".

    Yes, the US and CCCP raced to capture German experts. It's common knowledge (or was, anyway) that German scientists (such as Wernher von Braun) and captured V2s were essential in jump starting the US missile program. The Soviets got help too. But there were also intelligence experts (for KGB and CIA/NSA) and propaganda experts (for Soviet Glavlit, and US advertising/PR agencies and government).

    I wouldn't know ;)
     
  2. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  3. gerardwil

    gerardwil Registered Member

    Joined:
    Jan 17, 2004
    Posts:
    4,750
    Location:
    EU
  4. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,405
    Location:
    Surrey, England.
    https://www.bigbrotherwatch.org.uk/home/2014/03/gchq-enemy-internet.html
     
  5. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,618
    NSA Has Been Hijacking the Botnets of Other Hackers
    http://www.wired.com/threatlevel/2014/03/nsa-botnet/
     
  6. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    All botnet operators do that. It's rather a game, I think ;)

    The distinction between NSA hackers and "other hackers" is extremely fuzzy. And that's especially so when consultants are included. It's hard to know what other clients your consultants have, and what they do on their own. Also, consultants who work for multiple groups of players are often the best ;)
     
  7. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    5,210
    Location:
    DC Metro Area
    Here's an excerpt from the frightening Intercept story. The NSA is frighteningly out of control!!

    "How the NSA Plans to Infect ‘Millions’ of Computers with Malware"

    "Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.

    The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.

    ...

    In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites."

    Full Story Here: https://firstlook.org/theintercept/a...uters-malware/
     
  8. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Reading https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/, I'm struck by the impression that they're targeting Windows and smartphones (iPhone and Nokia/Windows). But I don't see anything about Linux, BSD, or even OS X. Is it really possible that those systems aren't being targeted? But hey, botnets don't target them either, so maybe it is possible ;)
     
  9. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    From Snowden accuses Senate intelligence chair of hypocrisy over CIA disclosures:
     
  10. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    That brings us back to the issue of Windows being backdoored or at a minimum, designed to be exploited. Just another piece in the puzzle but the picture is finally becoming clear.
     
  11. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    9,926
    How about no.
    Mrk
     
  12. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  13. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    9,926
    As opposed to a million other botnets?
    Mrk
     
  14. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  15. mattdocs12345

    mattdocs12345 Registered Member

    Joined:
    Mar 23, 2013
    Posts:
    1,887
    Location:
    US
  16. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    Such a backdoor was found on Samsung Galaxy phones. They're being found in routers, firewalls, and modems. The NSA has been coercing companies into backdooring their equipment and sabotaging the encryption. In spite of this and more, you continue to claim that this can't be true with Windows and other desktop operating systems, no matter how much circumstantial evidence there is to the contrary. Some people just refuse to see what they don't want to see.
    The majority of their exploits appear to target proprietary systems, like Windows and smartphones, especially the modem components. Either their code is sloppy to the point of being completely vulnerable or the manufacturers have been coerced into making them vulnerable to their exploits. Without the source code, we can't verify that the malware isn't already part of the operating systems.
     
  17. Virmaline

    Virmaline Registered Member

    Joined:
    Feb 2, 2014
    Posts:
    16
    Location:
    Rhode Island
    "Coerced" manufacturer = cowardly money-whoring NSA-collaborating traitor to the American people
     
  18. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    That's one possibility but not the only one. One of the released documents described how the NSA kept records of online activities like porn sites visited, intimate chats, etc for the purpose of discrediting individuals. It's a very small step from that to blackmail, "Add this code or we release these records of chat and porn site visits." If we're honest with ourselves, most of us have done things that aren't illegal in themselves, but would be very damaging to our reputation or family relationships. Those with more money have more opportunities to become involved in "white collar crime", eg a little insider trading, business deals that could get you in trouble, etc. They're prime targets for such blackmail. What's needed here is a form of amnesty. If they reveal the coercion, they won't be penalized for the actions they're being blackmailed with.
     
  19. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,618
    Dianne Feinstein Warns CIA Behavior Directly Challenges Constitution
    http://www.infosecurity-magazine.co...ia-behavior-directly-challenges-constitution/
     
  20. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    9,926
    Samsung Galaxy is not Windows. The page mentions the calls/messagges might be there for legit purposes or not. In other words, maybe.

    Now, a serious question: if you were to implement macros in C or whatever for the purpose of being hax0r, it does not make sense to call them in such beautiful serial names, does it? Would it not make sense to obfuscate your code and use generic names? Perform more than one jump?

    If anything sounds like sloppy coding.
    And do read some of the comments on slashdot:
    http://mobile.slashdot.org/story/14...opers-find-backdoor-in-samsung-galaxy-devices

    Mrk
     
  21. kareldjag

    kareldjag Registered Member

    Joined:
    Nov 13, 2004
    Posts:
    622
    Location:
    PARIS AND ITS SUBURBS
  22. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    9,926
  23. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,618
    Mark Zuckerberg called President Obama to complain about NSA surveillance
    http://www.theverge.com/2014/3/13/5505628/zuckerberg-calls-obama-over-nsa-surveillance-complaints
     
  24. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,405
    Location:
    Surrey, England.
    http://techcrunch.com/2014/03/13/th...nated-facebook-and-infected-pcs-with-malware/
     
  25. Brandonn2010

    Brandonn2010 Registered Member

    Joined:
    Jan 10, 2011
    Posts:
    1,853
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.