Saturday, August 31, 2013

New documents from whistleblowers Snowden - U.S. intelligence hackers ... - Sü

news on Sü Digital

Sü Set as Home Note Do not show Close

31 August 2013 11:03

that access to Western intelligence and hacking methods had long been clear to experts. New records of Edward Snowden show for the first time the dimension of American cyber attacks: According to the end of the year special spying software to be placed on strategically selected at least 85,000 computers worldwide


U.S. intelligence agencies have provided worldwide, according to a Washington Post report of tens of thousands of computers with software back doors through which they can access data or all networks. By the end of this year, it should therefore be prepared at least 85,000 such machines, the newspaper wrote on Saturday on the basis of documents from the collection of the informant Edward Snowden. The NSA has also developed a system that millions of infected computers can automatically control.

In 2011, the American intelligence services had performed a total of 231 cyber attacks, it said. The number was caught in a leaked draft of Snowden budget. Of these “offensive operations” according to budget were directed against targets with the highest priority, almost three quarters. According to a former official were among actions against targets in countries such as Iran, Russia, China and North Korea, the newspaper said.

more information about these attacks did not exist. The U.S. intelligence defined according to a presidential directive of October 2012 offensive cyber operations as manipulation or destruction of information in computers or computer networks, or the computers and networks themselves

Most of these actions have a direct impact only on data and functionality of the computer opponent: The connections for example, would slow


code name “Genie”

is a prominent example of a national cyber attack, the Stuxnet computer worm that sabotaged Iran’s nuclear program a few years ago. IT security experts are convinced that Western intelligence stuck behind Stuxnet, although this was never officially confirmed.

More often break the intelligence hackers according to the report in a computer in order to absorb data. The actions were code-named “Genius” (spirit). By the end of this year should as part of “genius” special software to be placed on strategically selected at least 85,000 computers worldwide, it said. This software could for example record and transmit data.

2008 were only 21,252 computers have been attacked in this way, wrote the Washington Post , relying on the intelligence budget. However, in large computer networks could also just open an infected device access to hundreds of thousands more.

secret software often serve only as a back door for possible future requests, said a former official of the Washington Post . According to the documents have been fully exploited by the nearly 69,000 infected computers only 8448 in 2011. This had to do with human resources, although 1870 people were employed in the project already.


future should a system codenamed “turbine” also provide for the automatic operation of millions infiltrated spy programs on other computers. Specialists of NSAs also worked on covert software can make the relevant calls in computer networks locate and record. The intelligence hackers could break into connecting devices such as routers and also behind firewall security systems from different vendors, it said.

also not shied away from the purchase of information about software vulnerabilities. This $ 25.1 million are planned for this year. The U.S. accuses China for years to operate using similar methods cyber espionage in the West. A crucial difference is, however, that American programs would not be used for industrial espionage, it said in the Washington Post .

See more room tips id=”functions” data-bind=”articleFunctions”>
  • sending
  • Discuss
  • feedback to editors
  • copy short URL

    URL is copied to the clipboard

  • copy short URL

    Please copy the URL manually.


  • source and editors: AP / lala

    updates to See more room tips class=”stayInformed”>
  • Top News
  • Digital
  • Edward Snowden
  • Now most read on the home page of

    accusations of poison gas insert to Assad regime Putin reminded Obama Nobel Peace Prize Back to homepage

    Satellite dishes are seen at GCHQ's outpost at Bude, close to where trans-Atlantic fiber-optic cables come ashore in Cornwall, southwest England British intelligence agency GCHQ Peeking behind barbed wire

    Exclusive Actually quite idyllic: From the southern English town shack from the British intelligence agency GCHQ monitored German data connections, but he has also to uphold the law That could soon leave understand – by 50,000.? secret documents, Edward Snowden has collected information on SZ for more than a year ago. By John Goetz, Hans Leyendecker and Frederik Obermaier more .. .

    Satellite dishes are seen at GCHQ's outpost at Bude, close to where trans-Atlantic fiber-optic cables come ashore in Cornwall, southwest England internet monitoring British intelligence taps into data from Germany from

    Exclusive Documents of the whistleblower Edward Snowden show. Britain’s monitoring service GCHQ monitors multiple fiber optic cables – in two of them, the German Telekom is one of the operators after SZ-information, the British have theoretically even access Internet connections within Germany. By John Goetz, Hans Leyendecker and Frederik Obermaier more …

    No comments:

    Post a Comment