{"id":175330,"date":"2017-02-06T14:58:04","date_gmt":"2017-02-06T19:58:04","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/confirmed-the-nsa-got-hacked-the-atlantic\/"},"modified":"2017-02-06T14:58:04","modified_gmt":"2017-02-06T19:58:04","slug":"confirmed-the-nsa-got-hacked-the-atlantic","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/confirmed-the-nsa-got-hacked-the-atlantic\/","title":{"rendered":"Confirmed: The NSA Got Hacked &#8211; The Atlantic"},"content":{"rendered":"<p><p>    After a never-before-seen group announced    it was in possession of a trove of malware developed by the    elite hacking arm of the National Security Agency early this    week, professional security researchers began working to try    and determine whether the code the group released was truly    developed by the NSA.  <\/p>\n<p>    Working off of hints they found in the code, which was released    by a group calling itself the Shadow Broker, researchers    guessed it was authenticbut new documentation straight from    the source appears to confirm the codes provenance.  <\/p>\n<p>    According to NSA documents obtained by Edward Snowden and    reviewed by    The Intercept, several elements in the    released code line up with details in the agencys own manuals    and materials.  <\/p>\n<p>    One manual, for example, instructs agents to use a specific    16-character string, ace02468bdf13579, to track a certain    strain of government-developed malware as it makes its way    through networks. That string shows up character-for-character    in one of the leaked hacking tools, SECONDDATE.  <\/p>\n<p>    The tool allows the NSA to execute man-in-the-middle attacks,    which intercept traffic on a network as its traveling from its    origin to its destination. The agency used it to redirect users    who think theyre browsing safe websites to NSA-run servers    that infect their computers with malwareand then back to their    destination before they know what happened. In a slide deck,    the NSA used cnn.com as an example of the sort of site it    could exploit to deliver its malicious code.  <\/p>\n<p>    The documents released by The Intercept reveal that    SECONDDATE has been used to spy on systems in Pakistan and in    Lebanon, where it gained access to data belonging to Hezbollah.  <\/p>\n<p>    Its still not clear how the tools leaked from the NSA. Snowden    speculated on Twitter    that the tools could have been found on a server it used to    infect a target, but former NSA staffers interviewed by    Motherboard said    the leak could be the work of a rogue insider, claiming that    some of the files in the leak would never had made it to an    outside server.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2016\/08\/yup-the-nsa-got-hacked\/496643\/\" title=\"Confirmed: The NSA Got Hacked - The Atlantic\">Confirmed: The NSA Got Hacked - The Atlantic<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> After a never-before-seen group announced it was in possession of a trove of malware developed by the elite hacking arm of the National Security Agency early this week, professional security researchers began working to try and determine whether the code the group released was truly developed by the NSA. Working off of hints they found in the code, which was released by a group calling itself the Shadow Broker, researchers guessed it was authenticbut new documentation straight from the source appears to confirm the codes provenance.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/confirmed-the-nsa-got-hacked-the-atlantic\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-175330","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/175330"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=175330"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/175330\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=175330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=175330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=175330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}