Peacepink

Worldwide Campaign to stop the Abuse and Torture of Mind Control/DEWs

TURBINE PROGRAM - INFECT COMPUTERS AND NETWORKS WITH MALAWARE

NSA Posed As Facebook To Infect Computers With Malware, Report Says.......

By Salvador Rodriguez.  This post has been updated, as indicated below.

March 12, 2014, 11:34 a.m.

 

The NSA has reportedly been using an automated system codenamed TURBINE to infect computers and networks with malware. (Patrick Semansky / Associated Press / June 6, 2013)

 

The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010, according to a Wednesday report. And at times the agency pretended to be Facebook to install its malware.

The NSA has been using a program codenamed  TURBINE  to contaminate computers and networks with malware "implants" capable of spying on users, according to the Intercept, which cited documents provided by whistleblower Edward Snowden.

Between 85,000 and 100,000 of these implants have been deployed worldwide thus far, the report said.

ALSO: Will Flappy Bird fly again? Developer is 'considering it'

To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook.

The federal agency performed what is known as a "man-on-the-side" attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user's computer and extracted data from their hard drive.

Facebook said it had no knowledge of the NSA"s TURBINE program, according to the National Journal. However, the social network said it is no longer possible for the NSA or hackers to attack users that way, but Facebook warned that other websites and social networks may still be vulnerable to those types of attacks.

"This method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year," Facebook told the National Journal. "If government agencies indeed have privileged access to network service providers, any site running only HTTP could conceivably have its traffic misdirected."

Other ways the NSA infects malware onto computers include sending out spam emails.

The NSA is capable of installing different kinds of malware, each capable of performing different tasks. According to the report, certain malware can:

Use a computer's microphone to record audio

Use a computer's webcam to take photos

Record a computer's Internet browsing history

Record login details and passwords use for Web services

Log users' keystrokes

Extract data from flash drives when they are plugged into infected computers

Block users from accessing certain websites

Corrupt files that computers attempt to download

When the NSA first began infecting computers with malware in 2004, it would do so manually, according to the report. At that time, only between 100 and 150 implants had been deployed.

[Updated 1:25 p.m. PDT March 13: The NSA has said that the report by the Intercept is inaccurate.

"NSA does not use its technical capabilities to impersonate U.S. company websites," the agency said in a statement. "Nor does NSA target any user of global Internet services without appropriate legal authority."]

 

http://www.latimes.com/business/technology/la-fi-tn-nsa-posing-facebook-malware-20140312,0,3491724.story#ixzz2vqBAW6xC

Views: 31

Comment

You need to be a member of Peacepink to add comments!

Join Peacepink

Latest Activity

bernard blundell replied to Lauren C's discussion What shielding methods worked for all of you?
"Hi..I was wondering what the speaker system method consists of to deter intrusions? Thanks B"
51 minutes ago
donkey posted a discussion

Download people fast videos

What are Twitch clips and what are they on the platform for?It must be taken into account that this platform offers its users various alternatives so that they can increase the visibility of your channels, nevertheless it is also necessary to create some resources that will help increase the visits to the channel twitching has offered what the clips are .From this momentum thanks to clips, viewers have the opportunity to quickly share the best moments of the broadcasts and thus the streamers…See More
2 hours ago
Profile Icondonkey, fix offline printers and Diana joined Peacepink
2 hours ago
Robin Yan posted a discussion

At G7 Summit, they all promise democracy , freedom and human rights for the whole world. Please send this.

You all must receive all evidence about why I launch   international (legal  ) proceedings against "them" because they have committed  terror, psychological torture and MK Ultra. Now, I provide further documents about their ongoing brutality and evil...For 17 years, I write, write, speak out and stand up. Maybe you are tired of what I am doing. But, please see what OMCT stated recently after contacting them : "Torture Destroys Societies " ; " Global Voice For Ending Torture"At G7 Summit, they…See More
6 hours ago
Jeremy C A Paul left a comment for davidfulton3
"Fucking unreal what happens in Australia.. with the public mostly unaware/ oblivious"
9 hours ago
Jeremy C A Paul left a comment for davidfulton3
"Yes David..  * They're now threatning my safety  - in the process of writing a complaint to Aust Human Rights Comission to be forwarded as Allegation Letter to the United Nations (hoping that it'll be sent to the Aust Federal…"
9 hours ago
davidfulton3 left a comment for Jeremy C A Paul
"Hello Jeremy ; I have personally abandoned trying, to get accountability, through any conventional avenues of accountability...I instead focus on trying, to educate the unaware, about the true origins, & purposes, of  East German Stasi…"
14 hours ago
Sally Mander commented on 达 李's photo
Thumbnail

Victim Certificate for Evidence on Court

"How do I get this device?"
18 hours ago

Badge

Loading…

© 2021   Created by Soleilmavis.   Powered by

Badges  |  Report an Issue  |  Terms of Service