Inside the NSA’s Secret Efforts to Hunt and Hack System Administrators

By  and 20 Mar 2014, 7:07 PM EDT130
Featured photo - Inside the NSA’s Secret Efforts to Hunt and Hack System AdministratorsA secret document reveals how the NSA tracks down system administrators for surveillance. Illustration: Josh Begley.

Across the world, people who work as system administrators keep computer networks in order – and this has turned them into unwitting targets of the National Security Agency for simply doing their jobs. According to a secret document provided by NSA whistleblower Edward Snowden, the agency tracks down the private email and Facebook accounts of system administrators (or sys admins, as they are often called), before hacking their computers to gain access to the networks they control.

The document consists of several posts – one of them is titled “I hunt sys admins” – that were published in 2012 on an internal discussion board hosted on the agency’s classified servers. They were written by an NSA official involved in the agency’s effort to break into foreign network routers, the devices that connect computer networks and transport data across the Internet. By infiltrating the computers of system administrators who work for foreign phone and Internet companies, the NSA can gain access to the calls and emails that flow over their networks.

The classified posts reveal how the NSA official aspired to create a database that would function as an international hit list of sys admins to potentially target. Yet the document makes clear that the admins are not suspected of any criminal activity – they are targeted only because they control access to networks the agency wants to infiltrate. “Who better to target than the person that already has the ‘keys to the kingdom’?” one of the posts says.

The NSA wants more than just passwords. The document includes a list of other data that can be harvested from computers belonging to sys admins, including network maps, customer lists, business correspondence and, the author jokes, “pictures of cats in funny poses with amusing captions.” The posts, boastful and casual in tone, contain hacker jargon  (pwn, skillz, zomg, internetz) and are punctuated with expressions of mischief. “Current mood: devious,” reads one, while another signs off, “Current mood: scheming.”

The author of the posts, whose name is being withheld by The Intercept, is a network specialist in the agency’s Signals Intelligence Directorate, according to other NSA documents. The same author wrote secret presentations related to the NSA’s controversial program to identify users of the Tor browser – a privacy-enhancing tool that allows people to browse the Internet anonymously. The network specialist, who served as a private contractor prior to joining the NSA, shows little respect for hackers who do not work for the government. One post expresses disdain for the quality of presentations at Blackhat and Defcon, the computer world’s premier security and hacker conferences: MUCH MORE HERE

Views: 97

Replies to This Discussion

$104 and 8 hours of Amazon’s cloud computing is all it took to hack...

FREAK is a very good example of how governments across the world implement backdoors to spy on systems and create a Frankenstein monster which they now can't control. Echoing similar thoughts, Ed Felten, professor of computer science at Princeton University said freak was a, “good example of what can go wrong when government asks to build weaknesses into security systems.”



Read more: $104 and 8 hours of Amazon’s cloud computing is all it took to hack... http://whatreallyhappened.com/content/104-and-8-hours-amazon%E2%80%...

RSS

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted a blog post
18 hours ago
tjdavis posted blog posts
yesterday
Sandy commented on tjdavis's blog post Drones Used In Gaza Surveilling US Cities
Thursday
Less Prone favorited cheeki kea's photo
Wednesday
cheeki kea commented on cheeki kea's photo
Thumbnail

ancient lost worlds ~ DNA

"The area of Ket and Selkup  peoples.There have been groups of people that have long…"
Wednesday
cheeki kea posted a photo
Wednesday
cheeki kea commented on Less Prone's video
Thumbnail

FEYNMAN: THE QUEST FOR TANNU TUVA (1988)

"Wow. And as strange coincidence this could be the very place of the great migration ( to America,…"
Wednesday
cheeki kea favorited Less Prone's video
Wednesday
tjdavis favorited Sandy's discussion Sick sci-fi sex fantasy written by Epstein's first benefactor people say inspired his twisted island... before author's SON ended up arresting him
Wednesday
tjdavis posted a blog post
Wednesday
tjdavis posted photos
Tuesday
Less Prone posted a video

FEYNMAN: THE QUEST FOR TANNU TUVA (1988)

100th birthday present! Richard Feynman (1918-88), physicist, and his friend Ralph Leighton became fascinated by the remote and mysterious Asian country of T...
Tuesday
tjdavis favorited cheeki kea's video
Monday
tjdavis posted blog posts
Monday
cheeki kea commented on Doc Vega's blog post Grooming the New Generation of Assassins
"That's right. Many countries head down that road into a terrorising future of Self ID-ers. (…"
Oct 31
Doc Vega posted a blog post

Terror on All Hallows Eve Pt. 2 The Aftermath

Elizabeth had just gotten home from Junior High when the doorbell rang. She’d barely put her books…See More
Oct 30
Doc Vega commented on Doc Vega's blog post Grooming the New Generation of Assassins
"cheeki kea, I fear that we are headed further down the road of inhumanity institutionalized by the…"
Oct 30
omegamann is now a member of 12160 Social Network
Oct 29
Doc Vega commented on Doc Vega's blog post Three Must See Movies for Halloween
"cheeki kea Thanks. I watched most of the movie but I'd forgotten until a few minutes into it…"
Oct 29
cheeki kea commented on Doc Vega's blog post Three Must See Movies for Halloween
"That's a fine movie menu you've got Doc V. I love the old days theme. Great to view when…"
Oct 29

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted