Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

KoKo

(84,711 posts)
Sat Mar 22, 2014, 11:21 AM Mar 2014

HEADS UP "Systems Admins!"-- How the NSA Targets Those of You with 'Keys to Digital Kingdoms'

Last edited Sun Mar 23, 2014, 03:17 PM - Edit history (1)

How the NSA Targets Those with 'Keys to Digital Kingdoms'
Though accused of no wrongdoing whatsoever, spy agency targets personal computers of individuals whose job it is to protect online networks
- Jon Queally, staff writer



The latest reporting from The Intercept reveals how individuals across the world who work as 'system administrators' for computer and online networks had their personal computers and digital information targeted by National Security Agency hacking units as a way for the agency to gain access to the systems they controlled.

“Our ability to pull bits out of random places of the Internet, bring them back to the mother-base to evaluate and build intelligence off of is just plain awesome!” —NSA employee


Though those targeted were not suspected of any wrong doing whatsoever, internal NSA documents provided by NSA whistleblower Edward Snowden show that these people, called "sys admins" for short, had their email and Facebook accounts tracked as the government hackers tried to access their "network maps, customer lists, [and] business correspondence."

The overall effort by the NSA relates to previously reported programs based on Snowden documents that show efforts by the US surveillance agency and their British counterparts at the GCHQ to gain direct access to "foreign network routers" and other digital systems without the companies or governments who control those networks knowing. “Who better to target than the person that already has the ‘keys to the kingdom’?” asks one NSA-employed hacker in a post cited by The Intercept.

Strikingly, according to the reporting by journalists Ryan Gallagher and Peter Maass, these internal NSA "posts" were written by an individual NSA employee thought to be a contract "network specialist" with a highly "boastful and casual tone," describing how bits of personal data—like "pictures of cats in funny poses with amusing captions"—could also be harvested alongside information related to the professional work of the targeted sys admin. The posts are full of "hacker jargon (pwn, skillz, zomg, internetz)" and "punctuated with expressions of mischief" such as “Current mood: devious.” Another reads: “Current mood: scheming.”

Gallagher and Maass report:

It is unclear how precise the NSA’s hacking attacks are or how the agency ensures that it excludes Americans from the intrusions. The author explains in one post that the NSA scours the Internet to find people it deems “probable” administrators, suggesting a lack of certainty in the process and implying that the wrong person could be targeted. It is illegal for the NSA to deliberately target Americans for surveillance without explicit prior authorization. But the employee’s posts make no mention of any measures that might be taken to prevent hacking the computers of Americans who work as sys admins for foreign networks. Without such measures, Americans who work on such networks could potentially fall victim to an NSA infiltration attempt.


Here's how it works:

The first step, according to the posts, is to collect IP addresses that are believed to be linked to a network’s sys admin. An IP address is a series of numbers allocated to every computer that connects to the Internet. Using this identifier, the NSA can then run an IP address through the vast amount of signals intelligence data, or SIGINT, that it collects every day, trying to match the IP address to personal accounts.

“What we’d really like is a personal webmail or Facebook account to target,” one of the posts explains, presumably because, whereas IP addresses can be shared by multiple people, “alternative selectors” like a webmail or Facebook account can be linked to a particular target. You can “dumpster-dive for alternate selectors in the big SIGINT trash can” the author suggests. Or “pull out your wicked Google-fu” (slang for efficient Googling) to search for any “official and non-official e-mails” that the targets may have posted online.

Once the agency believes it has identified a sys admin’s personal accounts, according to the posts, it can target them with its so-called QUANTUM hacking techniques. The Snowden files reveal that the QUANTUM methods have been used to secretly inject surveillance malware into a Facebook page by sending malicious NSA data packets that appear to originate from a genuine Facebook server. This method tricks a target’s computer into accepting the malicious packets, allowing the NSA to infect the targeted computer with a malware “implant” and gain unfettered access to the data stored on its hard drive.

“Just pull those selectors, queue them up for QUANTUM, and proceed with the pwnage,” the author of the posts writes. (“Pwnage,” short for “pure ownage,” is gamer-speak for defeating opponents.) The author adds, triumphantly, “Yay! /throws confetti in the air.”


In a final detail worth noting, The Intercept describe how the NSA posts contained in the slides reveal the internal debate at the agency over the sheer volume of data being collected by their various surveillance techniques. Whereas some agents criticized the poor infrastructure and its inability to handle so much data from around the globe, other employees celebrated what has become known as the NSA's "collect it all approach" to the world of online surveillance.

“Our ability to pull bits out of random places of the Internet, bring them back to the mother-base to evaluate and build intelligence off of is just plain awesome!” the author writes. “One of the coolest things about it is how much data we have at our fingertips.”

____________________________________
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 License.

http://www.commondreams.org/headline/2014/03/21-0
31 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
HEADS UP "Systems Admins!"-- How the NSA Targets Those of You with 'Keys to Digital Kingdoms' (Original Post) KoKo Mar 2014 OP
Yet people still defend this Aerows Mar 2014 #1
This is the behavior of criminals. woo me with science Mar 2014 #2
It shows that there is a culture within the NSA Aerows Mar 2014 #3
It's a culture. That seems exactly right. woo me with science Mar 2014 #13
the next logical step form here is blackmail tk2kewl Mar 2014 #7
Or they use this illegally obtained data Aerows Mar 2014 #20
That's what many of us thought when the KoKo Mar 2014 #21
They really think they're a separate and superior branch of government. jsr Mar 2014 #10
k&r RandiFan1290 Mar 2014 #4
Why are Americans the enemy of their own government? Oilwellian Mar 2014 #5
What a joke, that any of this has anything to do with terrorism. woo me with science Mar 2014 #12
Hence their need for this: Oilwellian Mar 2014 #15
Fabricating evidence trails to arrest Americans. woo me with science Mar 2014 #16
I can understand their concern... PoliticAverse Mar 2014 #6
Link to the Intercept Article Luminous Animal Mar 2014 #8
Thanks for posting it! KoKo Mar 2014 #11
"...individuals across the world..." randome Mar 2014 #9
here's a better article Rumold Mar 2014 #14
Thank you for posting that article again. woo me with science Mar 2014 #18
Here's an FBI agent Aerows Mar 2014 #19
Um, there is no evidence, just something a former FBI agent said -without evidence. randome Mar 2014 #22
I trust what an FBI agent says and a Federal judge Aerows Mar 2014 #23
As if the rest of the world have no rights. USA! USA! Luminous Animal Mar 2014 #17
in the actual document this article is talking about Egnever Mar 2014 #27
Kick. Aerows Mar 2014 #24
Kick woo me with science Mar 2014 #25
Kick for the DU NIGHT TECH Crowd... KoKo Mar 2014 #26
No doubt Aerows Mar 2014 #28
Another... KoKo Mar 2014 #30
Recommended Autumn Mar 2014 #29
Joseph Goebbels wildest dreams are now reality. L0oniX Mar 2014 #31
 

Aerows

(39,961 posts)
1. Yet people still defend this
Sat Mar 22, 2014, 11:26 AM
Mar 2014

If there is an argument as to why this is legal, I'd like to hear it.

 

Aerows

(39,961 posts)
3. It shows that there is a culture within the NSA
Sat Mar 22, 2014, 11:34 AM
Mar 2014

That they believe everyone is a target, and that privacy and security doesn't matter one bit to them. It's systemic, obviously. When you look at the whole picture, it's clear that there is absolutely no limits to what they will do "just because they can".

woo me with science

(32,139 posts)
13. It's a culture. That seems exactly right.
Sat Mar 22, 2014, 01:13 PM
Mar 2014

And it is carried well beyond the NSA. This government is out of control, and engaging in routine criminal behavior.


NSA, DEA, IRS Lie About Fact That Americans Are Routinely Spied On By Our Government
http://www.democraticunderground.com/10023463936


Police, SS, DEA, DOJ, DOD, DHS… Add the IRS to list
http://www.democraticunderground.com/10023434961

...review of quiet admissions and unauthorized leaks revealed that the NSA branch of the U.S. military had not only been collecting and warehousing nearly every form of electronic communications by innocent everyday people, without warrants, but had been sharing the proceeds of their unconstitutional spying with …

the Drug Enforcement Agency;
local police;
the Secret Service;
the Department of Justice;
the Pentagon;
and the Department of Homeland Security

… for regular, non-terrorism-related government purposes.

Well, now you can add another agency to the list. Reuters reports that the Internal Revenue Service — that’s right, the IRS — has been getting tips for tax investigations by dipping into the database of warrantless intelligence surveillance.

They say all this constitution-squashing is about catching the terrorists, but let’s be real — the danger of an American dying in a terrorist attack is smaller than the danger she or he will die of a hernia. The slowly-emerging secret is that U.S. government agents are using the excuse of terrorism to pry into your life for reasons that are both mundane and none of their business."

http://irregulartimes.com/



 

tk2kewl

(18,133 posts)
7. the next logical step form here is blackmail
Sat Mar 22, 2014, 11:48 AM
Mar 2014

if they can't steal what they want from you, they get something against you instead

 

Aerows

(39,961 posts)
20. Or they use this illegally obtained data
Sat Mar 22, 2014, 02:00 PM
Mar 2014

to pursue charges against people for things that have absolutely nothing to do with "national security" or "terrorism" and increase their closure rate. That makes them look good, and it fills the jail cells with people that aren't violent criminals or might actually be innocent - which is what the for-profit prison industry loves.

Due process, shmoo process. Who cares if somebody's rights get violated, they were probably guilty of something! And hey, it made me and my agency/department/organization look good!

KoKo

(84,711 posts)
21. That's what many of us thought when the
Sat Mar 22, 2014, 02:11 PM
Mar 2014

NSA spying revelations first broke. But, we were told it was "nothing to see there...move along" with some stuff about Snowden being a Chinese Spy then a Russian Spy and that it was due to reporter Glenn Greenwald who was a secret libertarian and attention seeker.

But, those of us who remembered J. Edgar Hoover's reign at FBI where he spied on Senators/House members and those protesting the Vietnam War and anyone on his "personal list" and used information to further his influence saw that this was an important revelation. They gather the information because they CAN.. The laws couldn't keep up with growth of the internet and so many of us depend on it now socially, personally for banking, medical forms, job applications...and the rest that we are caught up in the dragnet without proper protection.

The danger is the thousands of Private Contractors who have access to all this data/information can't be expected not to be using the info...selling it to those who can use it...like Multi-National Corporations, Political Operatives of both parties and those who in the Dark Shadows/Criminal Elements who can use the information for their own private gain.

We have to hope that as more and more comes out that some action will be taken to put proper legal restrictions in place and the data collected without law will be destroyed. Not hopeful that will really happen though...


Oilwellian

(12,647 posts)
5. Why are Americans the enemy of their own government?
Sat Mar 22, 2014, 11:40 AM
Mar 2014

I never thought of Skinner or Earl or fellow DU'ers as suspected terrorists before.

woo me with science

(32,139 posts)
12. What a joke, that any of this has anything to do with terrorism.
Sat Mar 22, 2014, 01:08 PM
Mar 2014

And it extends well beyond the NSA. Did you see the article Ichingcarpenter posted yesterday?

A federal judge has admonished the Justice Department on violations of the 4th
http://www.democraticunderground.com/10024703330

[font size=2]It is significant, however, that the surveillance request denied by Facciola relates to a criminal investigation, unrelated to terrorism. This demonstrates that the use by the Obama administration of blanket warrants enabling them to seize all information on a person's Internet accounts is not limited to terrorism, as is frequently claimed, but is part of a program of general mass illegal spying on the American people.
[/font size]


See also post 13.


Oilwellian

(12,647 posts)
15. Hence their need for this:
Sat Mar 22, 2014, 01:17 PM
Mar 2014
A Domestic Surveillance Scandal at the DEA? Agents Urged to Cover Up Use of NSA Intel in Drug Probes

The U.S. Department of Justice has begun reviewing a controversial unit inside the Drug Enforcement Administration that uses secret domestic surveillance tactics — including intelligence gathered by the National Security Agency — to target Americans for drug offenses. According to a series of articles published by Reuters, agents are instructed to recreate the investigative trail in order to conceal the origins of the evidence, not only from defense lawyers, but also sometimes from prosecutors and judges. "We are talking about ordinary crime: drug dealing, organized crime, money laundering. We are not talking about national security crimes," says Reuters reporter John Shiffman. Ethan Nadelmann, executive director of the Drug Policy Alliance, says this is just the latest scandal at the DEA. "I hope it is a sort of wake-up call for people in Congress to say now is the time, finally, after 40 years, to say this agency really needs a close examination."

Democracy Now
 

randome

(34,845 posts)
9. "...individuals across the world..."
Sat Mar 22, 2014, 12:22 PM
Mar 2014

Which implies, though is by no means conclusive, that the targeting involves foreign individuals.

Yet so many here fall for the same ploy without ever asking that one basic question: is the NSA targeting American citizens? The answer so far throughout this entire Snowden charade is no. Unless you count metadata as 'targeting'.

But this article? It's evidence of nothing unless that basic question is asked.
[hr][font color="blue"][center]All things in moderation, including moderation.[/center][/font][hr]

 

Rumold

(69 posts)
14. here's a better article
Sat Mar 22, 2014, 01:14 PM
Mar 2014

According to this former FBI agent and well respected expert, every single conversation made by an American via wired or wireless phone signals is being recorded - See more at :

http://www.dailytech.com/Former+FBI+Agent+All+Your+Communications+are+Recorded+Government+Accessible/article31486.htm#sthash.mxY9zqJZ.dpuf

 

Aerows

(39,961 posts)
19. Here's an FBI agent
Sat Mar 22, 2014, 01:45 PM
Mar 2014

plainly stating that all of this information in available to them, and we STILL have people in this thread saying "there is no evidence!!!"

If there isn't enough evidence for those folks at this point, there will never be enough evidence, and even if people get hauled to jail over these revelations (which they should) they will probably say "but there really isn't that much evidence."

This is in no way case of a few bad actors. It's systemic and the entire culture of all of these alphabet soup agencies. Here's why - the more cases a DEA agent, IRS agent or FBI agent (not to mention all the rest of the law enforcement agencies at every level from local all the way to federal), the more cases they close, the more it reflects positively on their careers. Closing cases results in promotions, it results in raises, and it results in status for both the agency and the agent.

Why WOULDN'T they use this information if it is there? Oh, sure, we all know it is not Constitutional, but if you can construct a case with all of this stuff being handy and hide where you got it from, why wouldn't you? 95% of people would definitely bend the rules if it benefited them to do so. These guys benefit enormously from closing cases.

Once you realize "who benefits" you start to realize it's cultural in those organizations.

 

randome

(34,845 posts)
22. Um, there is no evidence, just something a former FBI agent said -without evidence.
Sat Mar 22, 2014, 02:32 PM
Mar 2014

I don't see that the FBI has anything approaching the technology level of the NSA, and the NSA is strictly forbidden from spying on Americans.

Let's see some proof that these regulations are not being adhered to and I'll be properly outraged.

(Gotta run. Trip to the bookstore with the daughters. Not that anyone is hanging on my every word or anything.)
[hr][font color="blue"][center]All things in moderation, including moderation.[/center][/font][hr]

 

Aerows

(39,961 posts)
23. I trust what an FBI agent says and a Federal judge
Sat Mar 22, 2014, 02:59 PM
Mar 2014

that reviewed several cases stating that it was not Constitutional over a random poster on the internet that habitually defends spying.

But please continue with the "nothing to see here" defense. It's to the point where it is rather charming.

 

Egnever

(21,506 posts)
27. in the actual document this article is talking about
Sat Mar 22, 2014, 10:57 PM
Mar 2014
http://www.documentcloud.org/documents/1094387-i-hunt-sys-admins.html#document/p1


The person states all of this is about gathering info on targets they are assigned. In fact he complains that they aren't allowed to collect all data.

It is an interesting document though worth reading.

KoKo

(84,711 posts)
26. Kick for the DU NIGHT TECH Crowd...
Sat Mar 22, 2014, 09:07 PM
Mar 2014

So many tech folks here on DU that might want to know about this.

 

L0oniX

(31,493 posts)
31. Joseph Goebbels wildest dreams are now reality.
Sun Mar 23, 2014, 10:41 AM
Mar 2014


“Our ability to pull bits out of random places of the Internet, bring them back to the mother-base to evaluate and build intelligence off of is just plain awesome!” the author writes. “One of the coolest things about it is how much data we have at our fingertips.”


It is a sickness that has infected our government and its employees. It's no wonder Snowden did what he did.
Latest Discussions»General Discussion»HEADS UP "Systems Ad...