Showing posts with label data privacy. Show all posts
Showing posts with label data privacy. Show all posts

Fake Cellphone Towers Care About You And Just Want To Listen

It's one thing to steal American's private information and listen in on their phone calls, it's another thing to be completely overt about it.  Now, even the theft of our privacy is no longer being conducted privately.  This now seems to be the society we're allowing ourselves to be a part of.  A recent discovery of seventeen fake cellphone towers has brought no answers as to their use, but raise some serious questions.

The cellphone towers, all of which are located near military bases, were discovered using an ESD Cryptophone 500, manned by Les Goldsmith, the CEO of the ESD organization.  ESD, based out of Las Vegas, provides defense and law enforcement technology, but still can't explain what the towers are there for.  Rather than augmenting cell signals, they appear to be doing little more than bypassing encryption to read texts and listen to calls.

Originally reported in Popular Science and cited by yahoo.com, the troubling locations and seemingly-insidious intent of the towers are pervasive. As Goldsmith explained, "Interceptor use in the U.S. is much higher than people had anticipated. One of our customers took a road trip from Florida to North Carolina and he found eight different interceptors on that trip. We even found one at South Point Casino in Las Vegas.”

Goldsmith went on to speculate on which military (ours or another) could possibly be using the towers for surveillance.  Another idea involved escalation of the "Stringray" surveillance systems that the police departments of some large cities have put in place for observation.  It remains a sad but true fact that the NSA would not need the towers, and could simply hijack information from the cell service provider. The only hint the average citizen may have that the secret towers are operating in their area is that their calls will be forced down to the less-secure 2G connection, as opposed to currently-conventional 4G.

Under surveillance means under control. Are you allowing yourself to be controlled without evening knowing it? Keep your eyes peeled for the sketchy cell trees...

If you like pina coladas...and getting caught in a sting...

Going Dark: New Email Technology To Easily Encrypt Everything

The unabashed abuse of privacy on the global scale is one of the most troubling invasions of our time. Now, one programmer is advocating a new paradigm of electronic communications that is simple and effective: "Dark Mail" that encrypts every email, every time.

Ladar Levison created the popular and secure email service Lavabit, which made news when he shut down the service entirely rather than cede to the goverment's demands that he surrender his security keys (which would have effectively undermined the entirety of the operation's purpose.) This happened hot on the heels of the Edward Snowden leaks, and since then no seriously secure single service has stepped forward to fill the gap. Now, as popularmechanics.com reports, Levison still wants to keep you covered.

In an interview posted today, Levison stated that everyone should be under the assumption that their electronic communications are being monitored at all times. This creepy but cruelly accurate statement is one that has yet to sink in for modern society, even though it means that everything from their (possibly "dangerous" and defamatory) private opinions to naked pictures are subject to scrutiny. He argues that the complexity of the e-communication infrastructure, coupled with the ease of cracking "endpoint security" (one's personal computer or device) makes things difficult for the average privacy-prone person. He has created "Dark Mail", a new encryption idea, to aid in spreading the powers of privacy.

As Levison explained:

"Dark Mail is really an effort to turn the world’s email dark—to make email encryption ubiquitous, universal, and automatic. The simplest explanation of what we’re doing is that we’re rewriting the protocols of email—the standard rules computers use for delivering email messages—so that messages are encrypted before they leave your computer and can’t be decrypted until they’ve reached the recipient’s computer. And because this is built into the system, there’s no cognitive burden. Grandma could use this—you don’t need to understand encryption or why it’s important. If someone can use email today, they will be able to use Dark Mail tomorrow."

Levison went on to elucidate that Dark Mail is not an email service, rather, it is a technology than any provider could implement. Expounding on PGP (Pretty Good Privacy) software, Dark Mail implements asymmetric cryptography techniques that use a public key (given to anyone who would like to send an automatically-message to a specific recipient) and a private key (theoretically, only the viewer of the message) to keep communications secure. Layers of anti-metadata technology to shake electronic position trackers are also in the works.

Levison went on to reference Phil Zimmerman, PGP's creator, and his lengthy police investigation and legal battle stemming from the creation of an encryption so strong that it was at first considered a munition (although the charges were eventually dropped.) On paper (and e-documents), there are laws that are in place to allow us this level of privacy.

Even if you feel you're doing nothing wrong, how do you know what those who would malign you are using against your favor? Why become a target just because you might be seeking knowledge that someone else deems illicit? Keep your privacy and your freedom close at hand, for both are valuable enough to be stolen.

If George W. Bush's personal oil painted nudies can be e-heisted, your info doesn't stand a chance. 

Mass Surveillance In Massachusetts: Boston Police Spy And Lie


In yet another installation of a police force overprotecting and serving themselves, it has recently come to light that every single attendee of the Boston Calling music festival in 2013 was under surveillance, the records of which were accessible through the darknet.  According to techdirt.com, the Boston Police Department then lied about their involvement in the entire operation.

While the event was clearly being documented by the media, various videographers, and amateur snapshooters alike, no one was availed of the information that they were being categorized and profiled during the festival.  Reporter Tim Cushing described it as such:

"What Boston Calling attendees (and promoters, for that matter) didn't know, however, was that they were all unwitting test subjects for a sophisticated new event monitoring platform. Namely, the city's software and equipment gave authorities a live and detailed birdseye view of concertgoers, pedestrians, and vehicles in the vicinity of City Hall on May 25 and 26 of 2013 (as well as during the two days of a subsequent Boston Calling in September). We're not talking about old school black and white surveillance cameras. More like technology that analyzes every passerby for height, clothing, and skin color."

Boston's Dig website found some even more unsettling information:

"Shockingly, these sensitive documents have been left exposed online for more than a year. Among them are memos written by employees of IBM, the outside contractor involved, presenting plans to use "Face Capture" on "every person" at the 2013 concert. Another defines a party of interest "as anyone who walks through the door."

Over 50 hours of footage was available for easy access. When confronted, the Boston police department denied any involvement, until they were called out by journalist Kenneth Lipp (who found the files.) Boston police were clearly seen in monitoring stations, being trained by IBM employees.

Fortunately, this forced out the truth, with mayoral press secretary Kate Walsh explaining to Dig in an email that a "pilot program" had indeed been tested, and of course, it was for our own good. The city was merely "looking at challenges such as permitting, basic services, crowd and traffic management, public safety, and citizen engagement through social media and other channels. These were technology demonstrations utilizing pre-existing hardware (cameras) and data storage systems."

Yes, that's right. They've had the ability to do this for a while. And nobody in the crowd - or even the promoters - knew.

Lipp continued to probe, uncovering a host of other sensitive information that the BPD had left out in nearly plain sight. Driver's license information, addresses, and other valuable informative material was easily accessed, which could have led to a bigger problem than anything the cops were looking out for with their spy system.

Despite events like the Boston Marathon bombings prompting authorities to seek more intel on members of large crowds, the fact that this system went live without any public knowledge or oversight, and was then lied about, doesn't make the average civilian feel any safer.  When civilians are treated like suspects for no reason, cops are acting like villains for no reason.  And what kind of society is served by villains?

Soon they'll start judging and profiling you by your music tastes, too.



Like? Everyone Outside The U.S. And Canada Can Join A Class-Action Lawsuit Against Facebook For Messing With Your Data

Like! Share! Friend! Poke! For all of Facebook's friendly antics, the fact remains that the NSA's Prism program actively monitors the site to gather data on users, and great swaths of marketing vultures have swooped in to feast on your information. Now, thanks to one Austrian innovator, the company may be held accountable for its actions.

Citing inexcusable breaches of privacy and data violations, Austrian law student Max Schrems has started a class-action lawsuit against Facebook, with users from anywhere outside the US and Canada welcome to join by signing in here. According to tech.firstpost.com, Schrems stated, “Our aim is to make Facebook finally operate lawfully in the area of data protection."

Facebook users can join the lawsuit with no financial risk to themselves. Schrems' financial goal for the case would be a payout of 500 Euros ($670) for each afflicted user. So if you feel like trying to get some payback for being spied on and emotionally manipulated by a social media site, here's your chance to try to get your voice heard...they already know what your face looks like.

U.S. and Canadian citizens will continue to be spied upon and emotionally manipulated.   

ACLU and Human Rights Watch To NSA: Stop Spying On Journalists, Sources

Two human rights groups have come forward to voice their worries over hyper-invasive government monitoring derailing the efforts of many assiduous journalists.  As reported by the Washington Post, the ever-encroaching surveillance network that spies on emails, phone calls, and other digital data is making journalists' jobs harder and those willing to tell their stories more paranoid.

Both Human Rights Watch and the American Civil Liberties Union came forward today to support a report decrying both the NSA's broad scope of operations as well as Obama's policy of locking up whistleblowers.  This combination, they say, is infringing on confidentiality not just between reporters and their subjects but even up to lawyers and their criminal defendants.  Both activist groups called for greater transparency regarding the methods of collecting, storing, and analyzing citizens' data.

ABC reporter Brian Ross, one of the 46 journalists, 42 lawyers, and assorted security professionals who presented the anti-surveillance report, mentioned that he now begins phone conversations with the phrase, "I'm a U.S. citizen, are you?"  This is due to laws (though many are currently up for debate) restricting the unfettered surveillance of Americans.  However the government maintains all of their watchdoggery is for "national security", and their constant worries about letting classified information leak have grown undeniably overbearing.  Hopefully thanks to this report, those that monitor our calls will soon be getting called out.


Image courtesy www.aclu.org.


NSA: Naked Snaps Agency

The famous Edward Snowden NSA leaks provided a shocking amount of disclosure to a nation that is still trying to chalk up the agency's egregious misconduct to "national security." Now, in a new interview, Snowden admits the dirt they were digging up on people is a little more lascivious than previously thought.

In an interview with The Guardian as reported by Ars Technica, Snowden said in no uncertain terms that NSA agents commonly obtained and distributed nude and sexually illicit private photos from the people they are sworn to protect. Snowden described the chain of events where young agents would find an appealing photo during the course of their work, then share and compare it with pornographic pics found by their coworkers.

In Snowden's own words, he said, "It's never reported. Nobody ever knows about it because the auditing of these systems is incredibly weak. The fact that your private images, records of your private lives, records of your intimate moments have been taken from your private communications stream from the intended recipient and given to the government without any specific authorization without any specific need is itself a violation of your rights. Why is that in a government database?”

The interview also included Snowden categorically denying attacks that he is a Russian spy, calling such allegations, "Bullshit." Just because he's trying to shut off the NSA's abundant amateur porn supply doesn't mean he hates America.

You Keep It, They Peep It: No Fourth Amendment For Foreign Data Storage?

The United States government is actively opposing Microsoft's endeavors to protect users' electronic information. Contesting a ruling from earlier this year that demanded warrants for online data, the government cited the Stored Communications Act to attempt to retrieve data from a server in Ireland, saying,"Overseas records must be disclosed domestically when a valid subpoena, order, or warrant compels their production. The disclosure of records under such circumstances has never been considered tantamount to a physical search under Fourth Amendment principles, and Microsoft is mistaken to argue that the SCA provides for an overseas search here. As there is no overseas search or seizure, Microsoft’s reliance on principles of extra-territoriality and comity falls wide of the mark."

According to petapixel.com, the case was in regards to information stored by drug traffickers and was a target for extensive search, but the principle remains the same. Better get your own external hard drive to store those terabytes of homemade furry videos, because if they're stored offshore, the government can enjoy them to their hearts' content.

Just assume your data's not safe anywhere.

Chicago Serves Up Deep-Dish Big Brother With New Downtown Multi-Sensors

Urban engineering requires a lot of data to help cities and their denizens improve. However, the city of Chicago may have taken it into creepy territory with their new, discreet, downtown multi-sensors.

Ostensibly created to track data on climate, pedestrian movement patterns, environmental pollutants, light intensity, sound volume, and (of course, in Chicago) wind, the sensors are an interesting idea to monitor city elements in real time. The worrisome bit is that they also record the cellphone connectivity of passersby. Advocates are quick to point out that the sensors only monitor connectivity to wireless networks, not actual device signatures, but the element of privacy invasion remains.

Computer scientist Charlie Catlett, who has led the team working on this "Array Of Things" project, told the Chicago Tribune that, "We don't collect things that can identify people. There are no cameras or recording devices...sensors will be collecting sound levels but not recording actual sound. The only imaging will be infrared."

However, Gary King, Harvard University's director of the Institute for Quantitative Social Science, astutely pointed out that, "If they do a good job they'll collect identifiable data. You can (gather) identifiable data with remarkably little information...you have to be careful. Good things can produce bad things."

The data grab is being promoted in part as a means to understand urban environments more thoroughly, and to make cities run more cleanly and efficiently. Hopefully this won't include raids from the Thought Police.

Will you be e-raided by the Array?  Image courtesy the Chicago Tribune.


Frying The Onion Ring: NSA Databases ALL German Tor Users




While the NSA claims to only target a small number of internet users for its creepy peeping (and then, only for our "security"), recent discoveries have shown that their methods of determining who is watch-worthy is more than just a few naughty buzzwords you may have typed into Google. Data from targeted users is compiled and stored indefinitely...with some targets (particularly those overseas) having done nothing more than use the Tor anonymizing software.

Tor, an "onion" type encryption service, anonymizes one by rerouting information through various proxy servers. This is extremely difficult to trace and henceforth infuriating to the NSA. Rather than do actual investigations to decide who may actually be committing cybercrimes via this software, the NSA instead chooses to target anyone who has downloaded the program to their computer. They are apparently under the assumption that those of us who are smart enough to recognize what is going on and going wrong are likely criminals for taking the "crazy" steps to protect ourselves.

This revelation, as reported by boingboing.com, first emerged from the investigations of several intrepid German reporters. The leak of this information is thought to have been divulged post-Snowden, leading reporter Corey Doctorow to speculate, "The existence of a potential second source means that Snowden may have inspired some of his former colleagues to take a long, hard look at the agency's cavalier attitude to the law and decency."  Yet while the total Tor-based "terrorist" list is currently thought only to apply to German users, one would not be surprised if this did or will soon apply to Tor users in America.

If only one good apple could change the whole rotten barrel. At least we still have a barrel of...onions?  Stinking as the whole operation is, the powers that be can't simply stop our freedom of thought just yet.






Down With The Sickness: Your Online Health Records Are Easily Hackable



Your medical records from personal doctors and hospitals are increasingly going electronic, both due to ease of accessibility for providers and the stimulus of $24 billion dollars in federal incentive money (thanks to the 2009 Health Information Technology for Economic and Clinical Health Act.)  Now, serious worries are raised that this sensitive information's accessibility isn't being protected well enough from threats.

According to the Identify Theft Resource Center, over half of the 353 tracked breaches in 2014 were from the health sector.  Criminal attacks on health data are on the rise, with the target information (such as a full health profile on a certain person) selling for $500 on the black market.  This information can be used to steal an identity to gain care, or worse, commit blackmail with the sensitive material.  A Ponemon report claimed 313,000 people were health-record heist victims in 2013, up 19 percent from the previous year.

Politico.com reports that security ratings firm BitSight has rated the health care industry as the least prepared for a cyber attack, thanks in part to their high volume of threats and slow response time.  Also, about half of health systems surveyed in an annual review by the Health Information Management Systems Society indicated that they spent 3 percent or less of their IT budgets on security.

Even the Feds admit this is a weak system.  The health industry “is not as resilient to cyber intrusions compared to the financial and retail sectors, therefore the possibility of increased cyber intrusions is likely,” according to a warning released by the FBI.

Since 2009, more than 31.6 million individuals (a tenth of the United States) have had their medical records exposed through some form of malfeasance or outright theft, according to the U.S. Department of Health and Human Services.

OnionWare Anonymity Software Makes Spies Cry: New Secure Filesharing Service Expertly Thwarts Middlemen


With privacy issues becoming more and more critical in modern life, it is important to retain a feeling of security when dealing with one's major online documents. More than simple spied-on social media or intercepted emails, having a means to store and transfer large files online in a private manner is the focus of a new anonymity software.

Inspired by NSA patriot Edward Snowden, the new OnionWare technology uses the super-secure Tor network to thwart prying eyes, then establishes a temporary website on the user's computer. This eliminates the "middleman" of other filesharing services like Dropbox, which could be infiltrated by the government at any point. Using Onionware and Tor, a secure password and URL are exchanged peer-to-peer, and once the desired files are downloaded by the recipient, the temporary site is deleted permanently.

Parker Higgins, an activist with the Electronic Frontier Foundation, lauded the new technology, telling www.digitaljournal.com that, "Peer-to-peer offers no convenient mechanism for centralized surveillance or censorship. By design, there's usually no middleman that can easily record metadata about transfers—who uploaded and downloaded what, when, and from where—or block those transfers...recording all of it would require a dragnet effort, not a simple request for a log file from a centralized service provider."

The software was developed by tech analyst and cryptography/cybersecurity crusader Micah Lee while trying to expedite the secure transfer of files between Edward Snowden and journalists David Miranda and Glenn Greenwald, whose own files came under government scrutiny once the Snowden leaks were exposed.

Your Phone Is Your Own: Supreme Court Forbids Warrantless Phone Searches

In a major breakthrough for privacy rights, the Supreme Court of the United States has decided that cell phones are among the effects that are Constitutionally protected against warrantless searches.

Yesterday in a unanimous ruling, the court made it abundantly clear that warrants are required before any search of a citizen's cell phone can take place, with some speculation as to what will follow if a person was arrested on charges not pertaining to the vast amount of information a cell phone could contain. Justice John Roberts was quoting as saying, “A phone not only contains in digital form many sensitive records previously found in the home; it also contains a broad array of private information never found in a home in any form—unless the phone is.”

The Constitutional verbiage of the Fourth Amendment, partially reprinted here via www.msnbc.com, guarantees that citizens shall be “secure in their persons, houses, papers or effects." Phones of all types (from brick to smart) are covered under the ruling.  

Image courtesy www.aclu.org.

No Cash For Spy Stash: The NSA Loses Government Funds For Domestic Peeping; Foreign Spyware

Will a lack of "backdoor funding" deter the NSA in any way from spying on citizens at home and abroad? Soon the world will have a chance to find out.

As reported by www.wired.co.uk, on June 19th the House of Representatives passed an amendment to the Department of Defense Appropriations Act 2015 that will prevent the NSA from using government funds to stock information obtained while stalking both Americans and foreign citizens not expressly under warrant.

An open letter from several civil liberties groups to the House Of Representatives regarding the vote stated, "...These measures would make appreciable changes that would advance government surveillance reform and help rebuild lost trust among internet users and businesses, while also preserving national security and intelligence authorities."

This is an important breakthrough, with many foreign citizens recently extra-suspicious of the NSA thanks to discoveries of wireless routers sold in Europe being tainted by American spyware (subsequent hacks and defenses have already been issued to quell this problem.) But will removing Uncle Sam's wallet from Big Brother's pocket really slow down the spying?

Now they'll have to raise funds just as shady as they are.


"External Communications" And Infernal Revelations: Britain Allows Cyber-Spying On Facebook And Google

While many other nations around the world are condemning the US for its privacy violations, it seems that Great Britain is taking advantage of our lapses.

The BBC reports that British intelligence now considers sites like Facebook and Google to be "external communications" due to the companies' headquarters being based in the US, and thus the information gleaned from these sites is acceptable for agency retainment and/or review. Non-external sources would require the signature of a minister on a targeted warrant, issued only after suspicion of illegal activity was clearly stated.

Privacy International director Eric King noted the actual laws preventing this are unclear and possibly manipulated by those who would scour for secrets, stating "Intelligence agencies cannot be considered accountable to parliament and to the public they serve when their actions are obfuscated through secret interpretations of Byzantine laws."

With America, Britain, and even more of the world now affected by pervasive privacy penetration, an international dialogue on what constitutes infringement may be necessary. With the American Constitution already well trampled in regards to cyber and cell security, perhaps a rallying of world citizens tired of being spied on would achieve some measure of change.




Congressman Rogers: Google Being Unpatriotic For Halting Pro-NSA Bill

"Unpatriotic" is the new "communism" when it comes to slinging mud, and Congressman Mike Rogers has gotten down and dirty on Silicon Valley.

Heavily insinuating that companies like Google and Microsoft were acting unpatriotically for their disapproval of the FISA bill (which did not go far enough enacting measures that would prevent the NSA from broadly expanding its powers of espionage over the internet), Rogers tried to rationalize things in terms of money, like a good politician.

According to www.techdirt.com, Rogers was quoted at a CIA conference on national security, saying, "One sixth of our economy now, is through the internet! One sixth! So this notion that we're all going to say "well the government should do nothing and just completely keep away" -- and I'm not for regulation, by the way, that's not what I mean, but I mean in some way to... to help defend these private networks or allow them to defend themselves -- if we don't get it right, one-sixth of our economy is going to go away. Like that (*snaps*). If every time you turn it on, you lose money, how many times are you going to turn it on and use the internet for commerce? You're not!"

Hypocritically, in the same speech, Rogers had previously attacked the Silicon Valley companies' ethics due to their discreetly-worded rebuttal of the FISA bill.  The companies had rejected the bill citing worries over losses of European profits. As in, Europe would be smart enough to immediately distrust this bill, despite incompetents like former Congressman Rogers (who is retiring to become a talk-radio bloviator) trying to pull the wool over peoples' eyes.


Dropping The Ball On Watching Us All: NSA's "Complex" Software Mysteriously Deletes Info Before Lawsuit

The National Security Agency, who have been arguing accusations of massive breaches of privacy due to their supposed care about protecting the very national security their name entails, have turned out to be rather insecure after all...thanks to the apparent complexity their own software.

The Washington Post reports that the NSA was told to retain information for a lawsuit from the Electronic Freedom Foundation (EFF), intended to assess the depths of the NSA's invasive espionage efforts, but that the information was difficult to retain due to the need to shut down certain software elements where the data would be contained. Deputy director Richard Ledgett claimed that trying to safely retain all of the information required for the lawsuit would be deleterious to the agency, and would create "an immediate, specific, and harmful impact on the national security of the United States."

The EFF maintains that some of the information required for their lawsuit, which deals with the unlawful and downright creepy Big Brothering of American citizens, has already been destroyed. The NSA, meanwhile, maintains massive operational facilities' worth of workers and computer systems in which any of their valuable peeping-tom discoveries could have been "lost."


Secret Service Using Totally Cool Sarcasm Detector While Watching Social Media

The United States Secret Service has escalated their social-media surveillance methods as of late, and it makes things soooo much better for the common person. If you don't have a specially-crafted program to filter that sentence, it contained sarcasm, which has become a problem for Big Brother by creating false positives for threats during their nitpicking of our online brain droppings.

The new technology is considered superior than tasking agents with creating fake profiles to gather and assess the public's social media commentary.  According to www.nextgov.com, the technology also includes the abilities for “sentiment analysis,” "influencer identification," "access to historical Twitter data," “ability to detect sarcasm," and "heat maps" or graphics showing user trends by color intensity, agency officials said.

The program will operate in real time and totally respects your opinion.


Inflight Wifi Provider Goes Above and Beyond to Compromise Passenger Info Security

From Wired:
Gogo, the inflight Wi-Fi provider, is used by millions of airline passengers each year to stay connected while flying the friendly skies. But if you think the long arm of government surveillance doesn’t have a vertical reach, think again.
Gogo and others that provide Wi-Fi aboard aircraft must follow the same wiretap provisions that require telecoms and terrestrial ISPs to assist U.S. law enforcement and the NSA in tracking users when so ordered. But they may be doing more than the law requires.
According to a letter Gogo submitted to the Federal Communications Commission, the company voluntarily exceeded the requirements of the Communications Assistance for Law Enforcement Act, or CALEA, by adding capabilities to its service at the request of law enforcement.  The revelation alarms civil liberties groups, which say companies should not be cutting deals with the government that may enhance the ability to monitor or track users.
“CALEA itself is a massive infringement on user’s rights,” says Peter Eckersley of the Electronic Frontier Foundation. “Having ISP’s [now] that say that CALEA isn’t enough, we’re going to be even more intrusive in what we collect on people is, honestly, scandalous.”

Torrent Freak's Updated VPN Privacy Profiles

From Torrent Freak:
Millions of people use a VPN service to protect their privacy, but not all VPNs are as anonymous as one might hope. In fact, some VPN services log users' IP-addresses for weeks. To find out how secure VPNs really are TorrentFreak asked the leading providers about their logging policies, and more. . . .

Unfortunately, not all VPN services are as anonymous as they claim. Following a high-profile case of an individual using an ‘anonymous’ VPN service that turned out to be not so private, TorrentFreak decided to ask a selection of VPN services some tough questions.

By popular demand we now present the third iteration of our VPN services “logging” review. In addition to questions about logging policies we also asked VPN providers about their stance towards file-sharing traffic, and what they believe the most secure VPN is . . . 

NSA Spreads Malware By the Millions

From the Intercept:
Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.
The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.
The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.