Sunday, November 24, 2013

Cyber - Agency NSA infected 50 , 000 computer networks with malicious software designed to steal sensitive information ...... US Government Lawyers declare Americans cannot challenge Surveillance ...... Additional NSA updates for November 24 , 2013

http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/



NSA infected 50,000 computer networks with malicious software

nsa
Photo Corbis
NEWS 
The American intelligence service - NSA - infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information. Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this.
A management presentation dating from 2012 explains how the NSA collects information worldwide. In addition, the presentation shows that the intelligence service uses ‘Computer Network Exploitation’ (CNE) in more than 50,000 locations. CNE is the secret infiltration of computer systems achieved by installing malware, malicious software.
One example of this type of hacking was discovered in September 2013 at the Belgium telecom provider Belgacom. For a number of years the British intelligence service - GCHQ – has been installing this malicious software in the Belgacom network in order to tap their customers’ telephone and data traffic. The Belgacom network was infiltrated by GCHQ through a process of luring employees to a false Linkedin page.

NSA SPECIAL DEPARTMENT EMPLOYS MORE THAN A THOUSAND HACKERS

The NSA computer attacks are performed by a special department called TAO (Tailored Access Operations). Public sources show that this department employs more than a thousand hackers. As recently as August 2013, the Washington Post published articles about these NSA-TAO cyber operations. In these articles The Washington Post reported that the NSA installed an estimated 20,000 ‘implants’ as early as 2008. These articles were based on a secret budget report of the American intelligence services. By mid-2012 this number had more than doubled to 50,000, as is shown in the presentation NRC Handelsblad laid eyes on.

Cyber operations are increasingly important for the NSA. Computer hacks are relatively inexpensive and provide the NSA with opportunities to obtain information that they otherwise would not have access to. The NSA-presentation shows their CNE-operations in countries such as Venezuela and Brazil. The malware installed in these countries can remain active for years without being detected.

‘SLEEPER CELLS’ CAN BE ACTIVATED WITH A SINGLE PUSH OF A BUTTON

The malware can be controlled remotely and be turned on and off at will. The ‘implants’ act as digital ‘sleeper cells’ that can be activated with a single push of a button. According to theWashington Post, the NSA has been carrying out this type of cyber operation since 1998.
The Dutch intelligence services - AIVD and MIVD – have displayed interest in hacking. The Joint Sigint Cyber Unit – JSCU – was created early in 2013. The JSCU is an inter-agency unit drawing on experts with a range of IT skills. This new unit is prohibited by law from performing the type of operations carried out by the NSA as Dutch law does not allow this type of internet searches.
The NSA declined to comment and referred to the US Government. A government spokesperson states that any disclosure of classified material is harmful to our national security.



Govt Lawyers: Americans Have No Right to Challenge Surveillance

Ordinary Americans Have No Say, Officials Insist

by Jason Ditz, November 22, 2013
Government lawyers are demanding that the US District Court immediately throw out an ACLU lawsuit against NSA surveillance, insisting that there is no avenue by which “ordinary Americans” could even theoretically challenge its legality.
The ACLU is arguing that the surveillance, involving collecting every phone record of every American, exceeds the authority the NSA has under either the Patriot Act or the Constitution.
The government is arguing that only phone companies could challenge the collection orders, however, and then only in super-secret FISA courts, which have already rubber-stamped the surveillance time and again.
The lawyers are also arguing that the judge himself isn’t qualified to hear questions of “national security” and that he should simply trust the administration’s officials to figure things out on their own, outside of courts.


1 comment:

  1. Thanks for share this nice information! Your Sound is really good about "Cyber - Agency NSA infected 50 , 000 computer networks with malicious software designed to steal sensitive information ...... US Government Lawyers declare Americans cannot challenge Surveillance ...... Additional NSA updates for November 24 , 2013". I am intimidated by the excellence of information. There are a bundle of good funds here. I am sure I will visit this position again soon.
    I think, Computer support specialists provide technical assistance and many forms of computer-related support, such as problem troubleshooting and installation of new hardware.
    Here is some information about computer support specialist.

    ReplyDelete