{"id":130953,"date":"2014-05-06T23:59:00","date_gmt":"2014-05-07T03:59:00","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nsa-hijacked-criminal-botnets-to-install-spyware.php"},"modified":"2014-05-06T23:59:00","modified_gmt":"2014-05-07T03:59:00","slug":"nsa-hijacked-criminal-botnets-to-install-spyware","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-hijacked-criminal-botnets-to-install-spyware.php","title":{"rendered":"NSA &#39;hijacked&#39; criminal botnets to install spyware"},"content":{"rendered":"<p><p>      The NSA allegedly \"co-opted\" more than 140,000 computers      since August 2007 for the purpose of injecting them with      spyware. Photo: Reuters    <\/p>\n<p>    While US law enforcement agencies have long tried to stamp out    networks of compromised computers used by cybercriminals, the    National Security Agency has been hijacking the so-called    botnets as a resource for spying.  <\/p>\n<p>      The NSA sought the means to automate the deployment of its      tools for capturing email, browsing history and other      information in order to reach as many as millions of      machines.    <\/p>\n<p>    The NSA has \"co-opted\" more than 140,000 computers since August    2007 for the purpose of injecting them with spying software,    according to a slide leaked byformer    NSA contractor Edward Snowdenand published    byThe    Intercepton Wednesday.  <\/p>\n<p>    Botnets are typically used by criminals to steal financial    information from infected machines, to relay spam messages, and    to conduct \"denial-of-service\" attacks against websites by    having all the computers try to connect simultaneously, thereby    overwhelming them.  <\/p>\n<p>    In November, FBI director James Comey told the US Senate that    botnets had \"emerged as a global cyber security threat\" and    that the agency had developed a \"comprehensive public-private    approach to eliminate the most significant botnet activity and    increase the practical consequences for those who use botnets    for intellectual property theft or other criminal activities.\"  <\/p>\n<p>    According to the NSA slide, one technique the intelligence    agency used was called QUANTUMBOT, which \"finds computers    belonging to botnets, and hijacks the command and control    channel.\" The program was described as \"highly successful\".  <\/p>\n<p>    It was reported in May that US agencies had tapped botnets to    harvest data from the machines' owners or to maintain the    ability to issue the infected computers new commands.  <\/p>\n<p>    The slide leaked by Snowden is the first confirmation of the    practice, and underscores the complications for the NSA of    balancing its major mission of providing eavesdropping    capability with the less well-funded missions of protecting    critical national assets and assisting law enforcement.  <\/p>\n<p>    The top secret slide was marked for distribution to    the\"Five    Eyes\" intelligence alliance, comprising Australia, New    Zealand, Canada, the United States and Britain.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/rss.feedsportal.com\/c\/34697\/f\/644136\/s\/381c923b\/sc\/21\/l\/0L0Ssmh0N0Bau0Cit0Epro0Csecurity0Eit0Cnsa0Ehijacked0Ecriminal0Ebotnets0Eto0Einstall0Espyware0E20A140A3130Ehvi1k0Bhtml\/story01.htm\/RK=0\/RS=hDAIFYfaRD9_WVO2RARVBnJvcUY-\" title=\"NSA &#39;hijacked&#39; criminal botnets to install spyware\">NSA &#39;hijacked&#39; criminal botnets to install spyware<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The NSA allegedly \"co-opted\" more than 140,000 computers since August 2007 for the purpose of injecting them with spyware. Photo: Reuters While US law enforcement agencies have long tried to stamp out networks of compromised computers used by cybercriminals, the National Security Agency has been hijacking the so-called botnets as a resource for spying.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-hijacked-criminal-botnets-to-install-spyware.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-130953","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/130953"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=130953"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/130953\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=130953"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=130953"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=130953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}