Lettori fissi

martedì 17 febbraio 2015

the NSA spying on us through the hard drives?

The spy story infinite: the NSA spying on us through the hard drives?
cor_42-21682531


A cybergang tied American Agency monitors countless computers around the world. That's how they get the hard drive.
As in a film: the NSA is able to enter the hard drive of our computer and discover all of our lives. Even if he does not, maybe. This was reported today (17 February) Reuters, which reveals that the National Security Agency has found a way to thread so unexpected a spy software built into hard drives from Western Digital, IBM, Micron, Samsung, Seagate, Toshiba and other houses. It means having access to almost every computer on the planet.

THE counterspies. Were some researchers and former employees of the agency to reveal, confirming another survey of Kaspersky Lab, the Russian institute that is analyzing a series of cyber-espionage operations. During this research, to Kaspersky found that in 30 different countries, many personal computers were infected by various spying programs, particularly in Iran, Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria. It is pc of government, military and energy agencies, telecommunications, banking, nuclear researchers, media activists.

THE LINK TO THE NSA. Kaspersky will not disclose the country from which the attacks, but makes it clear that these are the same that have developed Stuxnet virus developed by the US government (during the presidency of George W. Bush) in collaboration with the Israelis, to sabotage the nuclear plant at Natanz, Iran. It has been used the software Fanny, a worm of the most harmful of the history, considered the forerunner of Stuxnet, and used to identify the PC "sensitive" of the Iranian central, and infect them.

CODES AND CRYPTOGRAPHY. The program seems active since 2011, is very complex, using various trojans and other virtual instruments infiltration and manages to nestle in the codes of the firmware of computers by infecting then the main disk (access is preferred by hackers to spy on a PC). You can then copy files and monitor a user's activities on the computer. According to Kaspersky the authors have had many resources available, have developed a sophisticated equation and encryption, to identify system vulnerabilities, must necessarily have had access to proprietary source code that controls the hard disk. Given its capacity and the curriculum "prestigious", this team is nicknamed The Equation group, already been labeled as the most dangerous gang of cyber criminals in history.








EYE OF THE STORM. How did the NSA to get these codes? The manufacturers of the discs claim that he had never provided. Former employees of the agency told instead that maybe they did, more or less consciously, because "if you want to become a technology provider for organizations of defense, you have to provide all the information requested."

In addition to seeing stripped its strategic surveillance system (which still does not stop), the NSA suffers another blow after the revelations of Edward Snowden and their political consequences. How will they react as China, Russia and other countries bugged? "There could be very negative effects for American interests," said Peter Swire, one of five members of the Review Group on Intelligence and Communications Technology referring to President Obama













1 commento: