Industryweek 6323 Nsa Spy
Industryweek 6323 Nsa Spy
Industryweek 6323 Nsa Spy
Industryweek 6323 Nsa Spy
Industryweek 6323 Nsa Spy

NSA Has 'Industrial Scale' Malware for Spying: Snowden

March 12, 2014
The Intercept reports on new revelations from former NSA contractor Edward Snowden. Codenamed, TURBINE, the program gathers intelligence with less human oversight. Malware can also covertly record audio from a computer's microphone and take snapshots with its webcam.

WASHINGTON - The National Security Agency has developed malware that allows it to collect data automatically from millions of computers worldwide, a report based on leaked documents showed Wednesday.

The report co-authored by former Guardian reporter Glenn Greenwald for the online news site The Intercept said the program has dramatically expanded the U.S. spy agency's ability to covertly hack into computers on a mass scale.

The report is based on classified documents provided by former NSA contractor Edward Snowden.

It said the surveillance technology allows the NSA to infect potentially millions of computers worldwide with malware "implants" which can help the agency extract data from overseas Internet and phone networks.

The report by Greenwald and reporter Ryan Gallagher said these implants were once reserved for a few hundred hard-to-reach targets whose communications could not be monitored through traditional wiretaps but that the NSA has expanded this to "industrial scale," according to the documents.

The automated system codenamed TURBINE expands the ability to gather intelligence with less human oversight, according to the report.

The report was the first by Greenwald based on leaked documents since he joined First Look Media, an organization backed by tech entrepreneur Pierre Omidyar that includes The Intercept.

Greenwald was among the first journalists to publish documents leaked by Snowden describing the vast surveillance programs of the NSA and other intelligence services, sparking a massive outcry.

Wednesday's report said the covert infrastructure that supports TURBINE operates from the NSA headquarters in Maryland, and from eavesdropping bases in Britain and Japan and that the British intelligence agency GCHQ appears to have played an important role in the effort.

The report said that in some cases the NSA has used a decoy Facebook server to infect a target's computer and exfiltrate files.

It said the malware can also covertly record audio from a computer's microphone and take snapshots with its webcam.

The Intercept said the malware has been in existence since 2004 but that the automated program expanding its use appears to have begun in 2010.

The malware can be installed in as little as eight seconds, according to the documents.

Because people have become suspicious of email attachments, the report said the NSA has had to resort to new tools to install the malware such as "man-in-the-middle" and "man-on-the-side" attacks through Internet browsers.

The NSA, queried by AFP, did not directly respond to the report. But an NSA official reiterated policy that its operations are conducted "exclusively where there is a foreign intelligence or counterintelligence purpose to support national and departmental missions, and not for any other purposes."

Copyright Agence France-Presse, 2014

Popular Sponsored Recommendations

Connected Manufacturing – The 5 most impactful use cases for Industry 4.0

April 18, 2023
Learn how to build a smarter, more connected factory through private cellular networks and five of the most impactful use cases. Create operational efficiencies and a safer work...

The Supply Chain of Tomorrow

May 22, 2023
A control tower enables proactively managing complex supply chains in real time and achieving new efficiencies through connected visibility, continual improvement, and predictive...

Digital Production Tracking: How Connected Platforms with No-Code Deliver Value

March 11, 2024
Manual tracking lacks the real-time visibility manufacturers need to identify root causes and remain competitive. Digital, connected production tracking is crucial for your operations...

5 Surprising Findings from OT Vulnerability Assessments

April 19, 2023
This white paper illuminates OT vulnerability assessment findings that may be unexpected or unanticipated, based on Honeywell team experience, to inform teams about the real-world...

Voice your opinion!

To join the conversation, and become an exclusive member of IndustryWeek, create an account today!