{"id":55891,"date":"2015-02-05T15:49:04","date_gmt":"2015-02-05T20:49:04","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-raided-hackers-troves-of-stolen-data-report\/"},"modified":"2015-02-05T15:49:04","modified_gmt":"2015-02-05T20:49:04","slug":"nsa-raided-hackers-troves-of-stolen-data-report","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-raided-hackers-troves-of-stolen-data-report\/","title":{"rendered":"NSA raided hackers&#39; troves of stolen data: report"},"content":{"rendered":"<p><p>    The NSA and its allies have raided the pockets of independent    and nation-state hackers and monitored some of the security    industry's foremost researchers in its bid to hoover    information on targets and find better ways to break systems,    Snowden documents reveal.  <\/p>\n<p>    Spooks would monitor the work of 'freelance' and rival state    hackers, notably those plundering email accounts owned by    targets of interest to the NSA and friends, and pilfer the    stolen contents, according to a report by The Intercept.  <\/p>\n<p>    That stolen data, referred to as 'take', was then pinched from    hacker targets such as journalists, activists and military    sources including the Indian Navy. Those hacks were likely the    handiwork of other nation-state hackers given the    sophistication of the breaches.  <\/p>\n<p>    The documents revealed the hackers' email-plundering    infrastructure was referred to under the moniker INTOLERANT and    that Canada and the UK had hands in hacker pockets.  <\/p>\n<p>    Here's a choice bit from one of the alleged NSA documents:  <\/p>\n<p>    The NSA would tip-off allies such as the UK and Australia when    it found data in hackers' take.  <\/p>\n<p>    Snowden's trickle-feed cache also revealed the NSA had run an    open source intelligence gathering service known as Lovely    Horse which monitored the Twitter feeds of security bods    including Mark Dowd, Tavis Ormandy and HD Moore. The    Intercept listed 36 other Twitter sources who could be    flattered by the agency's interest.  <\/p>\n<p>    The agency also scraped security blogs for data in its bid to    keep abreast of emerging exploits and vulnerabilities.  <\/p>\n<p>    It need not have go to the length to build in-house systems    however. Plenty of RSS feed platforms and page-monitoring    browser extensions exist, while Aussie hacker Matt Jones    (@volvent) had in 2012 created    the TalkBack portal to    analyse Twitter chatter and pry out new vulnerability    information using known good security sources.   <\/p>\n<p>    Sponsored:     Network DDoS protection  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2015\/02\/05\/snowden_documents_intolerant_and_lovely_horse\" title=\"NSA raided hackers&#39; troves of stolen data: report\">NSA raided hackers&#39; troves of stolen data: report<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The NSA and its allies have raided the pockets of independent and nation-state hackers and monitored some of the security industry's foremost researchers in its bid to hoover information on targets and find better ways to break systems, Snowden documents reveal. Spooks would monitor the work of 'freelance' and rival state hackers, notably those plundering email accounts owned by targets of interest to the NSA and friends, and pilfer the stolen contents, according to a report by The Intercept.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-raided-hackers-troves-of-stolen-data-report\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-55891","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/55891"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=55891"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/55891\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=55891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=55891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=55891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}