• Health
  • Science
  • U.S.
  • Technology
  • Business
  • World
  • Politics
  • Entertainment
  • Sports

Building a Better World

News and information

  • Home
  • Privacy Policy
  • Contact Us
  • Our Team

You won’t believe what the NSA just said about their hacking practices

January 30, 2016 By Sam Catherman

You won’t believe what the NSA just said about their hacking practices

A top NSA hacker has revealed some stunning secrets about the way the agency hacks.

The National Security Agency has come under much scrutiny in recent years over their surveillance policies, but the agency recently provided a shocking look at how some of its best hackers operate. According to a report from ABC News, the NSA employs some of the world’s best computer hackers to break into networks around the globe.

The Tailored Access Operations cell (TAO) functions under secretive terms, but the department’s chief recently revealed some truly amazing secrets about how the nation’s top hackers operate.

“I will admit that it’s very strange, to be in that position and up her on a stage in front of a group of people,” said Rob Joyce, the head of the NSA’s TAO. Joyce was speaking to an audience at the Usenix Enigma security conference held in San Francisco this Wednesday. “I’m in a unique position in that we produce, in TAO, foreign intelligence for a wide range of missions to include advice for informing policymakers, protecting the nation’s warfighters 24/7 and in that space we’re doing nation-state exploitation. My talk today is to tell you, as a nation-state exploiter, what you can do to defend yourself, to make my life hard.”

Joyce explained how to make it difficult for the NSA to keep tabs on people, and the steps taken by TAO when they have a target in sight. Joyce revealed that there are six steps to taking down a hacker: reconnaissance, initial exploitation, persistence, tool installation, lateral movement, and collection and analysis of data.

How does all of this translate into something you should be concerned about? To the NSA, no network is impenetrable. The reconnaissance phase identifies weak points in a network’s architecture, and NSA hackers typically learn a network inside and out before even trying to breach it.

Once they know what they’re up against, a hacker can use any number of tricks to gain access to a network, including tricking a user into entering information in an unsecure field or getting them to click a phony link. After they have gained access, hackers can install small programs that will allow for further manipulation with more sophisticated tools. The TAO chief declined to provide further details into the specific tools NSA hackers use.

From this point, hackers employ a number of tactics that help them access the types of data they’re looking for specifically. Lateral movement from one part of the network to another allows a hacker to search for valuable information.

The good news is that hacking can take time. “A lot of people think the nation states, they’re running on these engines of zero days. You go out with your master skeleton key and unlock the door and you’re in. It’s not that. Take these big corporate networks, these large networks, I will tell you that persistence and focus will get you in, will achieve that exploitation without the zero days. There are so many more vectors that are easier, less risky, and quite often more productive,” said Joyce.

Joyce reiterated that well-run networks are the best defense against hackers, and companies and individuals can take certain precautions to limit their exposure. They can limit access to data to only the people who need to access it. Administrators can also segment networks and remain vigilant against anomalies and other strange things going on. “Penetration testers” can help big organizations test their security procedures before a hacker does it for them.

Joyce closed with a question and answer session, expanding on the legal rights of the NSA to hack and defend against attacks from other nation-states. “It’s amazing the amount of lawyers that the Department of Homeland Security, FBI, and NSA have. So if the government is saying that we have positive attribution too, you ought to book it. Attribution is really, really hard. So when the government’s saying it, we’re using the totality of the sources and methods we have to help inform that. But because those advanced persistent threats aren’t going away… we can’t bring all that information to the fore and be fully transparent about everything we know and how we know it.”

Sharing

Facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

Filed Under: Front Page, Technology

Comments

  1. tfhr says

    January 31, 2016 at 12:31 am

    Thomas Stines,

    You said, “Those that fail to abide by the agency’s demands are exposed….”

    Is that so? What are the agency’s “demands”? Who have they been exposing? Who within the NSA is making those “demands”? Is it Admiral Rodgers? Is he the “power broker” you speak of? He’s not really “behind the scenes”, as you put it, since he runs the NSA, so is there some secret cabal of GS-14s, some other military officers, or the pilots of the black helicopters that haunt your dreams?

    You’re attacks on NSA and what you think you know about it are both paranoid and ignorant, a condition that does well to undermine those that work hard to protect us from very real threats.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow Us

Facebookrss

Search:

Recent Posts

  • NASA’s InSight spacecraft makes important course correction May 26, 2018
  • Scientists outraged at latest Trump decision May 15, 2018
  • Huge uproar erupts over major incident at Utah park May 13, 2018
  • Incredible moon discovery stuns scientists May 12, 2018
  • Authorities shocked by discovery about common painkiller May 6, 2018
  • Outrageous crocodile experiment stuns scientists May 5, 2018
  • Great Barrier Reef is too quiet, scientists say May 1, 2018
  • Massive Hiroshima bomb discovery shocks scientists May 1, 2018
  • Earth will be slammed by massive asteroid April 29, 2018
  • Teens are doing something incredibly alarming in schools April 29, 2018
  • Huge discovery in Tasmania stuns scientists April 28, 2018
  • Shocking discovery in New Jersey stuns authorities April 22, 2018
  • Huge volcanic explosion could wipe out the United States April 21, 2018
  • Huge controversy erupts over world’s hottest pepper April 15, 2018
  • SpaceX is about to do something astonishing April 15, 2018

Copyright © 2021 Jones Kilmartin Group, LLC · Metro Pro Theme On Genesis Framework · WordPress