NSA Build its own Attack System

The U.S. government crop before it is encrypted data on a computer with the attacks to compromise computer hacking tools to automate the process design, new documents show.

We NSA ” transplants , ” by Edward Snowden once installed according to a document leaked , Skype or other voice-over- Internet protocol communication calls made to a secret encryption by copying ignored can .

( Credit: InterCept)

Through the turbine operation , the NSA leak Edward Snowden displayed on the computer monitor , new documents “millions” designed to hack developed an automated system .
According to documents published by catch on Wedesday , turbine that people can access computers that ” implants ” created. Machines are involved in an array of deceptions implants : FAKE Facebook web pages , with links to malicious spam e- mails , and was visiting the NSA found that when a target dummy data into the computer . ” shoot, ” the man in the middle attack could spoof the NSA website .
National Security Agency, once the implants were installed , they encrypt data before access can be used . The article describes some of the work as.

Of an implant plug CAPTIVATEDAUDIENCE, for example, a target computer’s microphone and record conversations taking place near the device is used to capture. Another, GUMFISH, secretly on a computer and webcam you can snap photos. Logs record and FOGGYBOTTOM Internet browsing history, login details and access websites and email accounts used to collect passwords. GROK keystrokes used to login. SALVAGERABBIT exfiltrates connect to a computer and the data from removable flash drives.

The system does not require human intervention through automatic mechanisms of attack , designed for large scale though , it was actually used is not clear how widely . However , it directly targets the NSA only more people were interested in appears .
Telecommunications and Internet service providers to the offshore system administrators strike apparently example , had a wider group . Since making her an easy target , according to a document “SYS organizers , are a means to an end ” ” takes care of some operator networks using the government to do that . “
Hold in a statement , the NSA did not comment on the details but made ​​clear as president on January 17 , said , ” The mission of the Department ‘s support for national and foreign intelligence or counterintelligence is aimed exclusively intelligence will be collected where indicated and for any other purposes . ” 

View full post on Who Got Hacked (WGH) – Latest Hacking News and Security Updates