Welcome Guest [Log In] [Register]
Welcome to Crypto. We hope you enjoy your visit.


You're currently viewing our forum as a guest. This means you are limited to certain areas of the board and there are some features you can't use. If you join our community, you'll be able to access member-only sections, and use many member-only features such as customizing your profile, sending personal messages, and voting in polls. Registration is simple, fast, and completely free.


Join our community!


If you're already a member please log in to your account to access all of our features:

Username:   Password:
Add Reply
What you won't read from Snowden
Topic Started: Oct 26 2013, 08:07 AM (323 Views)
coder
NSA worthy
[ *  *  *  *  *  * ]
Quote:
 
According to sources familiar with the organisation's operations, TAO has been enormously successful over the past 12 years in covertly inserting highly sophisticated spyware into the hard drives of over 80,000 computer systems around the world, although this number could be much higher. And according to the sources, these implants are designed in such a way that they cannot be detected by currently available commercial computer security software.


This is an extract from Fortuna's Corner where there is more information on the activities of spy agencies that Snowden hasn't mentioned (yet).
Edited by coder, Oct 26 2013, 08:48 AM.
quot homines tot sententić
Offline Profile Quote Post Goto Top
 
mok-kong shen
NSA worthy
[ *  *  *  *  *  * ]
Snowden was only one of the numerous employees of the contractors of NSA. While his collection of surprising materials is seemingly surprisingly huge, that's certainly only a part of the relevant whole, if not the tip of the eisberg. (BTW, by chance I learned today from a not very new book that there are software publically available to monitor communications of mobile phones, which are certainly albeit inferior counterparts of what NSA has and employs today.)
Edited by mok-kong shen, Oct 26 2013, 04:53 PM.
Offline Profile Quote Post Goto Top
 
novice
Super member
[ *  *  *  * ]
Thanks coder for an interesting reference.

Fortuna
 
But the most sensitive of these clandestine techniques, and by far the most productive to date, is to covertly hack into targeted computers and copy the documents and message traffic stored on these machines before they are encrypted,


Often the simple approach is the most effective..
Offline Profile Quote Post Goto Top
 
mok-kong shen
NSA worthy
[ *  *  *  *  *  * ]
novice
Oct 27 2013, 01:41 PM
Often the simple approach is the most effective..
What leads you to consider "to covertly hack into targeted computers" is a simple approach?
Edited by mok-kong shen, Oct 27 2013, 08:31 PM.
Offline Profile Quote Post Goto Top
 
1 user reading this topic (1 Guest and 0 Anonymous)
« Previous Topic · News · Next Topic »
Add Reply