NSA – 50,000 Cyber Sleeper Cells

This is the latest of the Snowden releases. While I am not against national security, America is flatly out of control on a global level. The citizens of the nation have allowed the government to hamstring us into being unable to produce without permission, threatening our physical security by being unable to feed and clothe ourselves due to policy; and US foreign policy for decades has been most similar to a rampaging bull on a rape spree. “We’re big, clumsy, and doing what we want because we can!” The US makes lots of friends that way, right?

Let’s sit back and watch to see if all the nations threatened by this cyber sleeper form of warfare by the NSA are going to be easily appeased by the Obama Administration. Here’s the article:

NSA Has 50,000 ‘Digital Sleeper Agents’ Via Computer Malware, Says Latest Snowden Leak

Sleeper agents are among the most sinister spy assets: they lie in wait, wolves in sheep’s clothing, and then deliver a critical blow when activated. The NSA has 50,000 of those waiting for the literal push of a button, according to the latest batch of leaked Snowden documents, as seen by Dutch daily evening newspaper NRC. But these aren’t people, like Keri Russel and Matthew Rhys in The Americans – these are computers, infected with malware and untroubled by conscience or the risk of going native.

The NSA reportedly infected 50,000 computer networks worldwide with malicious software with the sole aim of harvesting sensitive information it wasn’t privy to, which is basically what you’d call textbook spy work in the digital age, from an agency tasked with spying. That’s not to excuse or dismiss the significance of this revelation, but we’ve heard from the Washington Post previously that the NSA was working on this sort of thing and that at least 20,000 computers had been infected by the program as of 2008. So to hear from Snowden documents via the NRC that it’s now climbed to 50,000 is hardly surprising.

New details brought to light indicate that operations from its so-called “Computer Networks Exploitation” program are active around the world, and can remain active for many years without being detected in some parts of the world like Venezuela and Brazil. All the malware can we watched and controlled remotely, and turned on and off “with a single push of a button.” A New York Times report published yesterday also asserts that the NSA has been pushing to stretch its surveillance powers even further, with the aim of catching up to the spread and reach of digital technology and online communications.

The truly amazing thing about this is just how pedestrian the NSA’s efforts are – according to NRC, they’re essentially running the same kind of phishing scams with false email requests that you’ll see from any other purveyor of malicious software. As an example, NRC points to how the British GCHQ used false LinkedIn pages to lure and infect Belgacom network employees. Just one more good reason to never click on anything sent from anyone ever.

The ongoing NSA debacle is like a Breugel painting, with more and more detail emerging every time you look at it anew. Yahoo and Google’s networks were apparently compromised in a similar fashion, documents revealed in late October, and with up to 200,000 documents in total potentially taken by Snowden and shared with reporters, it’s unlikely we’re anywhere near seeing the whole picture at this point.

The NSA declined to comment on this story or the original report.

Advertisement

4 Comments (+add yours?)

  1. google.com
    Dec 03, 2013 @ 21:25:19

    I go to see everyday a few web sites and websites to read posts, except this website offers feature based writing.

    Reply

  2. 1
    Feb 24, 2014 @ 15:00:28

    Hi there, I log on to your blog regularly. Your
    writing style is awesome, keep it up!

    Reply

  3. imanfakhar.ueuo.com
    Mar 08, 2014 @ 16:44:50

    I take pleasure in, result in I discovered exactly what I used to
    be having a look for. You have ended my four day long hunt!

    God Bless you man. Have a nice day. Bye

    Reply

  4. Alison
    Mar 11, 2014 @ 06:08:24

    Hi! Someone in my Myspace group shared this website with us so I came to check it out.
    I’m definitely loving the information. I’m bookmarking and will be tweeting this to my followers!

    Superb blog and fantastic style and design.

    Reply

Leave a Reply to imanfakhar.ueuo.com Cancel reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: