Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Inside the NSA’s Secret Efforts to Hunt and Hack System Administrators
The Intercept ^ | Mar 20, 2014 | Ryan Gallagher and Peter Maass

Posted on 03/21/2014 6:24:44 AM PDT by Izzy Dunne

Across the world, people who work as system administrators keep computer networks in order – and this has turned them into unwitting targets of the National Security Agency for simply doing their jobs. According to a secret document provided by NSA whistleblower Edward Snowden, the agency tracks down the private email and Facebook accounts of system administrators (or sys admins, as they are often called), before hacking their computers to gain access to the networks they control.

The document consists of several posts – one of them is titled “I hunt sys admins” – that were published in 2012 on an internal discussion board hosted on the agency’s classified servers. They were written by an NSA official involved in the agency’s effort to break into foreign network routers, the devices that connect computer networks and transport data across the Internet. By infiltrating the computers of system administrators who work for foreign phone and Internet companies, the NSA can gain access to the calls and emails that flow over their networks.

The classified posts reveal how the NSA official aspired to create a database that would function as an international hit list of sys admins to potentially target. Yet the document makes clear that the admins are not suspected of any criminal activity – they are targeted only because they control access to networks the agency wants to infiltrate. “Who better to target than the person that already has the ‘keys to the kingdom’?” one of the posts says.

The NSA wants more than just passwords. The document includes a list of other data that can be harvested from computers belonging to sys admins, including network maps, customer lists, business correspondence and, the author jokes, “pictures of cats in funny poses with amusing captions.” The posts, boastful and casual in tone, contain hacker jargon  (pwn, skillz, zomg, internetz) and are punctuated with expressions of mischief. “Current mood: devious,” reads one, while another signs off, “Current mood: scheming.”

The author of the posts, whose name is being withheld by The Intercept, is a network specialist in the agency’s Signals Intelligence Directorate, according to other NSA documents. The same author wrote secret presentations related to the NSA’s controversial program to identify users of the Tor browser – a privacy-enhancing tool that allows people to browse the Internet anonymously. The network specialist, who served as a private contractor prior to joining the NSA, shows little respect for hackers who do not work for the government. One post expresses disdain for the quality of presentations at Blackhat and Defcon, the computer world’s premier security and hacker conferences:

It is unclear how precise the NSA’s hacking attacks are or how the agency ensures that it excludes Americans from the intrusions. The author explains in one post that the NSA scours the Internet to find people it deems “probable” administrators, suggesting a lack of certainty in the process and implying that the wrong person could be targeted. It is illegal for the NSA to deliberately target Americans for surveillance without explicit prior authorization. But the employee’s posts make no mention of any measures that might be taken to prevent hacking the computers of Americans who work as sys admins for foreign networks. Without such measures, Americans who work on such networks could potentially fall victim to an NSA infiltration attempt.

The NSA declined to answer questions about its efforts to hack system administrators or explain how it ensures Americans are not mistakenly targeted. Agency spokeswoman Vanee’ Vines said in an email statement: “A key part of the protections that apply to both U.S. persons and citizens of other countries is the mandate that information be in support of a valid foreign intelligence requirement, and comply with U.S. Attorney General-approved procedures to protect privacy rights.”

As The Intercept revealed last week, clandestine hacking has become central to the NSA’s mission in the past decade. The agency is working to aggressively scale its ability to break into computers to perform what it calls “computer network exploitation,” or CNE: the collection of intelligence from covertly infiltrated computer systems. Hacking into the computers of sys admins is particularly controversial because unlike conventional targets – people who are regarded as threats – sys admins are not suspected of any wrongdoing.

In a post calling sys admins “a means to an end,” the NSA employee writes, “Up front, sys admins generally are not my end target. My end target is the extremist/terrorist or government official that happens to be using the network some admin takes care of.”

The first step, according to the posts, is to collect IP addresses that are believed to be linked to a network’s sys admin. An IP address is a series of numbers allocated to every computer that connects to the Internet. Using this identifier, the NSA can then run an IP address through the vast amount of signals intelligence data, or SIGINT, that it collects every day, trying to match the IP address to personal accounts.

“What we’d really like is a personal webmail or Facebook account to target,” one of the posts explains, presumably because, whereas IP addresses can be shared by multiple people, “alternative selectors” like a webmail or Facebook account can be linked to a particular target. You can “dumpster-dive for alternate selectors in the big SIGINT trash can” the author suggests. Or “pull out your wicked Google-fu” (slang for efficient Googling) to search for any “official and non-official e-mails” that the targets may have posted online.

Once the agency believes it has identified a sys admin’s personal accounts, according to the posts, it can target them with its so-called QUANTUM hacking techniques. The Snowden files reveal that the QUANTUM methods have been used to secretly inject surveillance malware into a Facebook page by sending malicious NSA data packets that appear to originate from a genuine Facebook server. This method tricks a target’s computer into accepting the malicious packets, allowing the NSA to infect the targeted computer with a malware “implant” and gain unfettered access to the data stored on its hard drive.

“Just pull those selectors, queue them up for QUANTUM, and proceed with the pwnage,” the author of the posts writes. (“Pwnage,” short for “pure ownage,” is gamer-speak for defeating opponents.) The author adds, triumphantly, “Yay! /throws confetti in the air.”

In one case, these tactics were used by the NSA’s British counterpart, Government Communications Headquarters, or GCHQ, to infiltrate the Belgian telecommunications company Belgacom. As Der Speigel revealed last year, Belgacom’s network engineers were targeted by GCHQ in a QUANTUM mission named “Operation Socialist” – with the British agency hacking into the company’s systems in an effort to monitor smartphones.

While targeting innocent sys admins may be surprising on its own, the “hunt sys admins” document reveals how the NSA network specialist secretly discussed building a “master list” of sys admins across the world, which would enable an attack to be initiated on one of them the moment their network was thought to be used by a person of interest. One post outlines how this process would make it easier for the NSA’s specialist hacking unit, Tailored Access Operations (TAO), to infiltrate networks and begin collecting, or “tasking,” data:

Aside from offering up thoughts on covert hacking tactics, the author of these posts also provides a glimpse into internal employee complaints at the NSA. The posts describe how the agency’s spies gripe about having “dismal infrastructure” and a “Big Data Problem” because of the massive volume of information being collected by NSA surveillance systems. For the author, however, the vast data troves are actually something to be enthusiastic about.

“Our ability to pull bits out of random places of the Internet, bring them back to the mother-base to evaluate and build intelligence off of is just plain awesome!” the author writes. “One of the coolest things about it is how much data we have at our fingertips.”

Micah Lee contributed to this report.

———

Documents published with this article:



TOPICS: Government; News/Current Events
KEYWORDS: domesticspying; nsa; snowden
Navigation: use the links below to view more comments.
first 1-2021-28 next last
Notice they're not targeting SysAdmins who are suspect. They are targeting SysAdmins of networks where something MIGHT be going on.

I wonder if JimRob / JohnRob have been targeted?

1 posted on 03/21/2014 6:24:44 AM PDT by Izzy Dunne
[ Post Reply | Private Reply | View Replies]

To: Izzy Dunne

does the Pope live at the vatican?


2 posted on 03/21/2014 6:27:30 AM PDT by MeshugeMikey (Spreading Peace and Luv Since...1960 something)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Izzy Dunne

If they have not been doing anyting wrong, what’s the problem? s\


3 posted on 03/21/2014 6:27:44 AM PDT by Gadsden1st
[ Post Reply | Private Reply | To 1 | View Replies]

To: MeshugeMikey

Yeah, now that you mention it, I guess the Pope does poop in the woods.


4 posted on 03/21/2014 6:29:45 AM PDT by Izzy Dunne (Hello, I'm a TAGLINE virus. Please help me spread by copying me into YOUR tag line.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Izzy Dunne

Given the scope of all this, it would safe to assume that anyone can be a target to be spied on.


5 posted on 03/21/2014 6:33:00 AM PDT by Texas resident (The democrat party is now the CPUSA)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Izzy Dunne

Im betting that a close inspection of the nsa list would reveal data on everyone who’s ever posted on FR!!


6 posted on 03/21/2014 6:34:47 AM PDT by MeshugeMikey (Spreading Peace and Luv Since...1960 something)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Texas resident

Safe assumption. People who have tools find ways to use them. Just saying.


7 posted on 03/21/2014 6:36:05 AM PDT by Starboard
[ Post Reply | Private Reply | To 5 | View Replies]

To: MeshugeMikey

ZeroHedge is probably a little higher up on that list. ;)


8 posted on 03/21/2014 6:37:59 AM PDT by Starboard
[ Post Reply | Private Reply | To 6 | View Replies]

To: MeshugeMikey

Have you Googled your screen name in quotes and freerepublic.com ?

It is very amazing how quickly new posts are added to search results.


9 posted on 03/21/2014 6:40:01 AM PDT by Texas Fossil (Texas is not where you were born, but a Free State of Heart, Mind & Attitude!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Texas Fossil

It is very amazing how quickly new posts are added to search results.

*********

And soon to be stored in perpetuity in Utah.


10 posted on 03/21/2014 6:42:27 AM PDT by Starboard
[ Post Reply | Private Reply | To 9 | View Replies]

To: MeshugeMikey

Is the IRS run by Hedy Lamarr?

That’s Hedley.


11 posted on 03/21/2014 6:50:32 AM PDT by TimF
[ Post Reply | Private Reply | To 2 | View Replies]

To: Texas Fossil

I have indeed done many such searches and fin that ordinarily those quotes go up within mere minutes


12 posted on 03/21/2014 6:52:22 AM PDT by MeshugeMikey (NSA Magnet!)
[ Post Reply | Private Reply | To 9 | View Replies]

To: MeshugeMikey

There is something to be learned from that.


13 posted on 03/21/2014 6:56:42 AM PDT by Texas Fossil (Texas is not where you were born, but a Free State of Heart, Mind & Attitude!)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Starboard

I hope the data grows at such a rate that they have a total melt down.


14 posted on 03/21/2014 6:57:19 AM PDT by Texas Fossil (Texas is not where you were born, but a Free State of Heart, Mind & Attitude!)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Jet Jaguar; NorwegianViking; ExTexasRedhead; HollyB; FromLori; EricTheRed_VocalMinority; ...

The list, Ping

Let me know if you would like to be on or off the ping list

http://www.nachumlist.com/


15 posted on 03/21/2014 7:32:54 AM PDT by Nachum (Obamacare: It's. The. Flaw.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Ping


16 posted on 03/21/2014 8:31:12 AM PDT by BuckeyeTexan (There are those that break and bend. I'm the other kind. ~Steve Earle)
[ Post Reply | Private Reply | To 1 | View Replies]

What “they” assume is that sysadmins don’t know they are being hunted. Amateurs.


17 posted on 03/21/2014 8:33:53 AM PDT by BuckeyeTexan (There are those that break and bend. I'm the other kind. ~Steve Earle)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Izzy Dunne; rdb3; Calvinist_Dark_Lord; Salo; JosephW; Only1choice____Freedom; amigatec; ...

18 posted on 03/21/2014 8:35:23 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Izzy Dunne

bkmk


19 posted on 03/21/2014 9:33:14 AM PDT by AllAmericanGirl44
[ Post Reply | Private Reply | To 1 | View Replies]

To: Texas Fossil
Have you Googled your screen name in quotes and freerepublic.com ?

What's even more disturbing is that the NSA likely has the passwords for every FReeper, as there's no SSL available for sign ons. I've deliberately left my FR password simple, because I use incredibly complex passwords everywhere else; and I don't want the NSA to figure out my syntax.

Further, the NSA isn't interested in forum sites like FR for data collection. Everything is publicly visible and available by search on any browser. The NSA wants to infiltrate networks for use as botnets and to gather intel from those networks. If you're literally not hiding anything through SSL obfuscation, you're already open and been cataloged by the NSA.

20 posted on 03/21/2014 10:30:04 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 9 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-28 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson