Drop Down MenusCSS Drop Down MenuPure CSS Dropdown Menu


Try with us

Saturday, March 15, 2014

The greatness of the NSA spying machine was revealed

A recent leaked documents from NSA whistle-blower, Edward Snowden reveals the greatness of the National Security Agency (NSA) 'engine' in the course of a spy. Surveillance and tapping machine is an evil digital application so-called malware.
The US National Security Agency headquarters in Fort Meade, Maryland. (Picture from: http://www.scmp.com/)
U.S. intelligence agencies have a system called "TURBINE" that can spread malware millions at a time. TURBINE is under NSA hackers unit called Tailored Access Operations (TAO). From the documents cited by The Register, revealed that the TURBINE able to handle malware that infects the computer in "large scale (millions of units)" through an automated system that controls implanted malware in groups.

TURBINE have 'an expert system' that will automatically choose the type of malware that is matched with the target and the particular situation, and then install it on the target computer. Thus, this system requires little human intervention to be run.
One presentation outlines how the NSA performs “industrial-scale exploitation” of computer networks across the world. (Picture from: http://fox43.com/)
Types of malware such as those coded name of 'GROK' that can record keyboard keystrokes, 'CAPTIVATEDAUDIENCE' which can record sound through a microphone, or 'SALVAGERABBIT' that can copy data from computer storage media.

NSA system design is similar to other sophisticated cyber weapon ever makes a scene in the virtual world, such as Stuxnet and Flame. Both programs also allegedly deliberately made by certain countries. NSA has enabled TURBINE least since July 2010 and has infected up to 100,000 computers.

TURBINE is also connected to the NSA sensor system that called "TURMOIL" which tapped into a worldwide computer network to monitor data traffic and identifying potential targets. TURMOIL can track targets via e-mail address, or IP, or cookies from major sites such as Google, Microsoft, Twitter, and Yahoo!. *** [EKA | FROM VARIOUS SOURCES | THE REGISTER]
Note: This blog can be accessed via your smart phone.
Enhanced by Zemanta
Kindly Bookmark and Share it: