Süddeutsche.de Set as Home Note Do not show Close
‘) / /]]>
31 August 2013 11:03
‘) / /]]>
that access to Western intelligence and hacking methods had long been clear to experts. New records of Edward Snowden show for the first time the dimension of American cyber attacks: According to the end of the year special spying software to be placed on strategically selected at least 85,000 computers worldwide
U.S. intelligence agencies have provided worldwide, according to a Washington Post report of tens of thousands of computers with software back doors through which they can access data or all networks. By the end of this year, it should therefore be prepared at least 85,000 such machines, the newspaper wrote on Saturday on the basis of documents from the collection of the informant Edward Snowden. The NSA has also developed a system that millions of infected computers can automatically control.
In 2011, the American intelligence services had performed a total of 231 cyber attacks, it said. The number was caught in a leaked draft of Snowden budget. Of these “offensive operations” according to budget were directed against targets with the highest priority, almost three quarters. According to a former official were among actions against targets in countries such as Iran, Russia, China and North Korea, the newspaper said.
more information about these attacks did not exist. The U.S. intelligence defined according to a presidential directive of October 2012 offensive cyber operations as manipulation or destruction of information in computers or computer networks, or the computers and networks themselves
Most of these actions have a direct impact only on data and functionality of the computer opponent: The connections for example, would slow
‘) / /]]>
code name “Genie”
is a prominent example of a national cyber attack, the Stuxnet computer worm that sabotaged Iran’s nuclear program a few years ago. IT security experts are convinced that Western intelligence stuck behind Stuxnet, although this was never officially confirmed.
More often break the intelligence hackers according to the report in a computer in order to absorb data. The actions were code-named “Genius” (spirit). By the end of this year should as part of “genius” special software to be placed on strategically selected at least 85,000 computers worldwide, it said. This software could for example record and transmit data.
2008 were only 21,252 computers have been attacked in this way, wrote the Washington Post , relying on the intelligence budget. However, in large computer networks could also just open an infected device access to hundreds of thousands more.
secret software often serve only as a back door for possible future requests, said a former official of the Washington Post . According to the documents have been fully exploited by the nearly 69,000 infected computers only 8448 in 2011. This had to do with human resources, although 1870 people were employed in the project already.but
future should a system codenamed “turbine” also provide for the automatic operation of millions infiltrated spy programs on other computers. Specialists of NSAs also worked on covert software can make the relevant calls in computer networks locate and record. The intelligence hackers could break into connecting devices such as routers and also behind firewall security systems from different vendors, it said.
also not shied away from the purchase of information about software vulnerabilities. This $ 25.1 million are planned for this year. The U.S. accuses China for years to operate using similar methods cyber espionage in the West. A crucial difference is, however, that American programs would not be used for industrial espionage, it said in the Washington Post .See more room tips id=”functions” data-bind=”articleFunctions”>
URL is copied to the clipboard
Please copy the URL manually.
Copyright © 2013 Rules for …
source and editors: AP / lala