According to The Intercept, the National Security Agency has the ability to automatically infect millions of computers with malware. The malware, which comes with a variety of operational names, is designed to let the agency obtain files, record from the machine's microphone, take photos with the webcam, track usernames and passwords and keep a tab of websites visited.
The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes.
One implant, codenamed UNITEDRAKE, can be used with a variety of ?plug-ins? that enable the agency to gain total control of an infected computer.
An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer?s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer?s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.
The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That?s because the NSA?s malware gives the agency unfettered access to a target?s computer before the user protects their communications with encryption.
It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
|What's the Sudden Big Deal with Government Spying, Anyway?|
|"One thing sits at the heart of what many consider a surveillance state within the US today."|
|“Keeping trust is glorious and breaking trust is disgraceful.”|
|How Privacy Vanishes Online|
|Your Affairs, Your Abortions, Your Secrets: What Telephone Metadata Reveals About You|
|“It’s taking orders for a real-life flying motorcycle powered by five modified jet engines.”|
|“Without ads, how does Netflix manage to make money?”|
|“By day, she visits morgues, observes autopsies, and studies pictures of crime scenes.”|
|What Nothing Really Means in Seinfeld|
|CaptchaTweet: Write Tweets in Captcha Form|
|U.S.S. Enterprise Owner's Manual|
|How to Avoid Jury Duty|
|The (Very Scary) People of Public Transit|
|Fake Name Generator|
|There Are Plastic Islands in the Pacific Ocean You Can Walk On|
|Where Drones Bark|
|“How easy it is for anyone who tracks our digital activities to gain insight into our personalities.”|