Tag Archives: Snowden leak

NSA Using Sophisticated Malware to Spy on Possible Criminals

Forget the fear factor, the information you’ll read about in this article is darn-right fascinating. Getting an inside view into techniques currently being used by NSA, will confirm the fact that the stories you’ve been reading in high tech thrillers is based on reality and not merely the imagination of the author. Read on…

(First published as the article NSA Implanting Malware in Thousands of Computers to Conduct Criminal Investigations )

According to facts revealed by fugitive whistle blower Edward Snowden, NSA (the National Security Administration) has been utilizing programmed programs to invade target computers with powerful spy malware. Using a computer program named TURBINE, NSA has allegedly employed dummy Facebook Platforms ( operation QUANTUMHAND) to introduce spy malware into the personal computers of people being investigated. After successful installation, the NSA malware starts collecting data from the infiltrated computer’s hardware. In a sequence of events reminiscent of the best selling spy thriller “The Rembrandt Affair,” NSA malware can record audio with a computer’s microphone (operation CAPTIVATEDAUDIENCE); take photos or videos with a user’s webcam (GUMFISH); make a complete record of a computer’s internet browsing history, login details, and passwords employed for Web services (FOGGYBOTTOM); make a a record of users keystrokes (GROK); fish out data from a target computer’s flash drives (operation SALVAGERABBIT); lock users out of certain web sites; and corrupt files that users try and download.

According to Facebook authorities, the social network’s current use of the https URL format will impede the ability of NSA to use their platform as a malware entry vehicle. However, many other public platforms may still serve as passages for the program.

Malware is any adverse software program that is knowingly utilized to bring about harm to another person. In instances where malware is used to investigate potentially dangerous or criminal activity, such intervention is supported by legal statute. Governments utilize malware in spy warfare, and criminals use it to steal credit and other financial information from unsuspecting surfers.

The utilization of malware on the web is widespread and one institute concluded that today the production and use of malware codes may actually outstrip that of legitimate software programs and applications. According to Microsoft, close to 1 in every 14 programs downloaded from the Internet includes some type of malware.

Malware programs exploit security defects to invade computers. They may invade as a “Trojan Horse,” that is secretly placed in a seemingly harmless program or they may sidestep safety filters and break in, unbeknownst, through the backdoor. Today there are many excellent anti-malware programs that can be downloaded onto private computers, where they detect and remove invading malware.

This report is presented by Planet Cyber, 818-999-9000, a provider of malware removal and computer repair to Northridge http://planet-cyber.net/computer-services/areas-serve/computer-repair-northridge-ca/