{"id":173383,"date":"2016-08-19T04:08:44","date_gmt":"2016-08-19T08:08:44","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/snowden-nsa-hack-might-reveal-ugly-side-of-us-spying\/"},"modified":"2016-08-19T04:08:44","modified_gmt":"2016-08-19T08:08:44","slug":"snowden-nsa-hack-might-reveal-ugly-side-of-us-spying","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/snowden-nsa-hack-might-reveal-ugly-side-of-us-spying\/","title":{"rendered":"Snowden: NSA hack might reveal ugly side of US spying"},"content":{"rendered":"<p><p>    Over the weekend, a mysterious group called \"The Shadow    Brokers\"     leaked what appear to be hacking tools that the U.S. National    Security Agency uses to spy on people.  <\/p>\n<p>    This bundle of computer code is about three years old. But it's    still dangerous, since it puts a high-tech military arsenal    online within reach of all kinds of criminals. They can use    these tools to rob banks, steal government secrets or expose    personal lives.  <\/p>\n<p>    And on Tuesday morning, in a series of tweets, ex-NSA    whistleblower Edward Snowden pointed out yet another potential    repercussion from the leak.  <\/p>\n<p>    If these digital weapons are found on a computer, that's    evidence of an attack -- similar to finding fragments of a    blown up missile.  <\/p>\n<p>    Computer security researchers around the world are now    reviewing computer networks for these tools. And wherever they    find this leaked code, they'll know the NSA was spying.  <\/p>\n<p>    The United States currently claims the moral high ground and    censures China, Iran, North Korea and Russia for hacking    Americans. But it could soon be caught doing the same to    others.  <\/p>\n<p>    Here's an easy-to-understand explanation of Snowden's technical    commentary on Twitter this morning, in which he describes how    modern-day computer spying works.  <\/p>\n<p>    Modern day spying 101  <\/p>\n<p>    Ever wonder how the U.S. government can accuse    China of hacking the United States?  <\/p>\n<p>    To launch an attack, an enemy government wouldn't hit American    targets directly. That's too easy to trace back. Instead,    foreign hackers find a dummy spot to launch their attack.  <\/p>\n<p>    For example, Chinese hackers might slip into a computer server    at a company in Peru. Then they'll use that server as a    launchpad, sending commands from that computer to break into a    U.S. target.  <\/p>\n<p>    It's like China launching a missile at the United States from    Peru.  <\/p>\n<p>    The job of NSA hackers is sneak into those enemy launchpad    computer servers and scrape off computer code evidence of a    breach. Next time that same code is used in an attack, the NSA    can trace it back to the bad guys.  <\/p>\n<p>    But the NSA's job is also to spy on foreign governments, so it    too launches hacking missions from unsuspecting servers. And    foreign governments try to collect evidence of NSA tools to    identify the NSA in the future.  <\/p>\n<p>    The NSA's elite hacking team, called Tailored Access    Operations, is instructed to always wipe evidence of its    presence after a mission. It's like a Navy SEAL team picking up    its spent ammunition shells. But sometimes evidence gets left    behind.  <\/p>\n<p>    Typically, enemy governments keep the evidence they find of an    NSA hack a secret. What's new this time around is that someone    is actually calling out the United States in a way that will    help other countries detect American spy activity.  <\/p>\n<p>    Here, Snowden is referring to recent     veiled accusations by the United States that Russia hacked    the Democratic National Committee. The     U.S. government hasn't formally pointed the finger, but    officials are     hinting to reporters that     Russia is messing with American politics.  <\/p>\n<p>    Snowden thinks this NSA tool leak could be a message to the    United States: You toy with foreign politics too -- don't be    hypocritical.  <\/p>\n<p>    Snowden ended his screed by pointing out an interesting tidbit.    Even though these NSA tools have just been leaked, it appears    that they were stolen back in 2013 -- a short time after        Snowden blew the whistle on NSA spying on Americans. At    that point, the NSA went into lockdown mode and ramped up    security.  <\/p>\n<p>    So, ironically, the NSA's response to Snowden's    alleged treachery might have actually prevented enemy    hackers from continuing to steal NSA tools.  <\/p>\n<p>    CNNMoney (New York)    First published August 16, 2016:    1:36 PM ET  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More:<br \/>\n<a target=\"_blank\" href=\"http:\/\/money.cnn.com\/2016\/08\/16\/technology\/nsa-hacking-tools-snowden\/index.html\" title=\"Snowden: NSA hack might reveal ugly side of US spying\">Snowden: NSA hack might reveal ugly side of US spying<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Over the weekend, a mysterious group called \"The Shadow Brokers\" leaked what appear to be hacking tools that the U.S. National Security Agency uses to spy on people.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/snowden-nsa-hack-might-reveal-ugly-side-of-us-spying\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-173383","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/173383"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=173383"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/173383\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=173383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=173383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=173383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}