Posted on 10/08/2013 5:57:56 PM PDT by Nachum
Dan Auerbach 10-8-13 Weve long suspected that the NSA, the worlds premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneierwho is working with the Guardian to go through the Snowden documentswe have a much more detailed view of how the NSA uses exploits in order to infect the computers of targeted users. The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so its important to understand and defend against this threat to avoid being a victim to the plethora of attackers out there.
How Does Malware Work Exactly?
Deploying malware over the web generally involves two steps. First, as an attacker, you have to get your victim to visit a website under your control. Second, you have to get softwareknown as malwareinstalled on the victims computer in order to gain control of that machine. This formula isnt universal, but is often how web-based malware attacks proceed.
In order to accomplish the first step of getting a user to visit a site under your control, an attacker might email the victim text that contains a link to the website in question, in a so-called phishing attack. The NSA reportedly uses phishing attacks sometimes, but weve learned that this step usually proceeds via a so-called man-in-the-middle attack.1 The NSA controls a set of servers codenamed Quantum that sit on the Internet backbone, and these servers are used to redirect targets away from their intended destinations to still other NSA-controlled servers that are responsible for the injection of malware. So, for example, if a targeted user visits yahoo.com, the targets browser will display the ordinary Yahoo! landing page but will actually be communicating with
(Excerpt) Read more at patriotsbillboard.org ...
Have you gotten your mandatory flu shot yet?
_____________________
They are not mandatory.
They absolutely positively are for some of us.
If only there were some place to detonate nuclear weapons where the fallout wouldn't go into the air... perhaps we could find large deposits of dirtlike and rocklike substances somewhere that could be used as shielding....
They did that too in Vegas...One of them broke/fractured the earths surface and dosed all those above, as they ran for their lives...
Did anyone read my file before commenting on my commenting? It says right there on the label: MALadjusted Creepy Ass Cracka. I figgered my comments show I ware it well.
O.K. I’ll try it again. When there is an article posted that says NSA is running programs that track EVERY SINGLE ONE OF US ALL DAY LONG DOING WHATEVER WE ARE DOING and thus is in a position to DESTROY EACH AND EVERY ONE OF US do people READ the article?
To prove you have READ the articles, could you send me the NAME of the person NSA destroyed via privacy intrusions, electronic surveillance etc.
Just a name answers this post. A real person’s name. Somebody who is locked up, or dead, or ruined, or forced to live in exile, someone who was NOT a terrorist and NOT Snowden. Just THAT person’s name.
The victim. NSA’s victim. If you’ve read all these articles surely you have come across the name of an otherwsie innocent American citizen who was a victim. What’s his name?
James Madison.
Michael Hastings
I don’t believe in coincidences.
Steve Bridges.
I have no idea what you’re babbling about.
Thanks for the info.
Thanks for the info.
Thanks for the info.
Several General's names come to mind. Certain you have those names too.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.