{"id":41259,"date":"2014-03-24T12:00:09","date_gmt":"2014-03-24T12:00:09","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=41259"},"modified":"2015-05-05T21:35:11","modified_gmt":"2015-05-05T20:35:11","slug":"inside-the-nsas-secret-efforts-to-hunt-and-hack-system-administrators","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2014\/03\/inside-the-nsas-secret-efforts-to-hunt-and-hack-system-administrators\/","title":{"rendered":"Inside the NSA\u2019s Secret Efforts to Hunt and Hack System Administrators"},"content":{"rendered":"<div id=\"attachment_41260\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-I-hunt-sys-admins.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-41260\" class=\"size-medium wp-image-41260 \" alt=\"A secret document reveals how the NSA tracks down system administrators for surveillance. Illustration: Josh Begley.\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-I-hunt-sys-admins-300x202.jpg\" width=\"300\" height=\"202\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-I-hunt-sys-admins-300x202.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-I-hunt-sys-admins.jpg 659w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-41260\" class=\"wp-caption-text\">A secret document reveals how the NSA tracks down system administrators for surveillance.<br \/>Illustration: Josh Begley.<\/p><\/div>\n<p>Across the world, people who work as system administrators keep computer networks in order \u2013 and this has turned them into unwitting targets of the National Security Agency for simply doing their jobs. According to <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/03\/20\/hunt-sys-admins\/\" >a secret document<\/a> provided by NSA whistleblower Edward Snowden, the agency tracks down the private email and Facebook accounts of system administrators (or sys admins, as they are often called), before hacking their computers to gain access to the networks they control.<\/p>\n<p>The document consists of several posts \u2013 one of them is titled \u201cI hunt sys admins\u201d \u2013 that were published in 2012 on an internal discussion board hosted on the agency\u2019s classified servers. They were written by an NSA official involved in the agency\u2019s effort to break into foreign network routers, the devices that connect computer networks and transport data across the Internet. By infiltrating the computers of system administrators who work for foreign phone and Internet companies, the NSA can gain access to the calls and emails that flow over their networks.<\/p>\n<p>The classified posts reveal how the NSA official aspired to create a database that would function as an international hit list of sys admins to potentially target. Yet the document makes clear that the admins are not suspected of any criminal activity \u2013 they are targeted only because they control access to networks the agency wants to infiltrate. \u201cWho better to target than the person that already has the \u2018keys to the kingdom\u2019?\u201d one of the posts says.<\/p>\n<p>The NSA wants more than just passwords. The document includes a list of other data that can be harvested from computers belonging to sys admins, including network maps, customer lists, business correspondence and, the author jokes, \u201cpictures of cats in funny poses with amusing captions.\u201d The posts, boastful and casual in tone, contain hacker jargon\u00a0 (pwn, skillz, zomg, internetz) and are punctuated with expressions of mischief. \u201cCurrent mood: devious,\u201d reads one, while another signs off, \u201cCurrent mood: scheming.\u201d<\/p>\n<p>The author of the posts, whose name is being withheld by <i>The Intercept<\/i>, is a network specialist in the agency\u2019s Signals Intelligence Directorate, according to other NSA documents. The same author wrote secret presentations related to the <a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/world\/2013\/oct\/04\/nsa-gchq-attack-tor-network-encryption\" >NSA\u2019s controversial program<\/a> to identify users of the Tor browser \u2013 a privacy-enhancing tool that allows people to browse the Internet anonymously. The network specialist, who served as a private contractor prior to joining the NSA, shows little respect for hackers who do not work for the government. One post expresses disdain for the quality of presentations at Blackhat and Defcon, the computer world\u2019s premier security and hacker conferences:<\/p>\n<p style=\"text-align: center;\">(Click to enlarge)<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-defcon.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-41261\" alt=\"nsa defcon\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-defcon-300x88.png\" width=\"300\" height=\"88\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-defcon-300x88.png 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-defcon.png 984w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>It is unclear how precise the NSA\u2019s hacking attacks are or how the agency ensures that it excludes Americans from the intrusions. The author explains in one post that the NSA scours the Internet to find people it deems \u201cprobable\u201d administrators, suggesting a lack of certainty in the process and implying that the wrong person could be targeted. It is illegal for the NSA to deliberately target Americans for surveillance without explicit prior authorization. But the employee\u2019s posts make no mention of any measures that might be taken to prevent hacking the computers of Americans who work as sys admins for foreign networks. Without such measures, Americans who work on such networks could potentially fall victim to an NSA infiltration attempt.<\/p>\n<p>The NSA declined to answer questions about its efforts to hack system administrators or explain how it ensures Americans are not mistakenly targeted. Agency spokeswoman Vanee\u2019 Vines said in an email statement: \u201cA key part of the protections that apply to both U.S. persons and citizens of other countries is the mandate that information be in support of a valid foreign intelligence requirement, and comply with U.S. Attorney General-approved procedures to protect privacy rights.\u201d<\/p>\n<p>As <i>The Intercept<\/i> <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/article\/2014\/03\/12\/nsa-plans-infect-millions-computers-malware\/\" >revealed last week<\/a>, clandestine hacking has become central to the NSA\u2019s mission in the past decade. The agency is working to aggressively scale its ability to break into computers to perform what it calls \u201ccomputer network exploitation,\u201d or CNE: the collection of intelligence from covertly infiltrated computer systems. Hacking into the computers of sys admins is particularly controversial because unlike conventional targets \u2013 people who are regarded as threats \u2013 sys admins are not suspected of any wrongdoing.<\/p>\n<p>In a post calling sys admins \u201ca means to an end,\u201d the NSA employee writes, \u201cUp front, sys admins generally are not my end target. My end target is the extremist\/terrorist or government official that happens to be using the network some admin takes care of.\u201d<\/p>\n<p>The first step, according to the posts, is to collect IP addresses that are believed to be linked to a network\u2019s sys admin. An IP address is a series of numbers allocated to every computer that connects to the Internet. Using this identifier, the NSA can then run an IP address through the vast amount of signals intelligence data, or SIGINT, that it collects every day, trying to match the IP address to personal accounts.<\/p>\n<p>\u201cWhat we\u2019d really like is a personal webmail or Facebook account to target,\u201d one of the posts explains, presumably because, whereas IP addresses can be shared by multiple people, \u201calternative selectors\u201d like a webmail or Facebook account can be linked to a particular target. You can \u201cdumpster-dive for alternate selectors in the big SIGINT trash can\u201d the author suggests. Or \u201cpull out your wicked Google-fu\u201d (slang for efficient Googling) to search for any \u201cofficial and non-official e-mails\u201d that the targets may have posted online.<\/p>\n<p>Once the agency believes it has identified a sys admin\u2019s personal accounts, according to the posts, it can target them with its so-called <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/03\/12\/one-way-quantum\/\" >QUANTUM hacking techniques<\/a>. The Snowden files reveal that the QUANTUM methods <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/03\/17\/nsa-secretly-masqueraded-facebook-hack-computers-surveillance\/\" >have been used<\/a> to secretly inject surveillance malware into a Facebook page by sending malicious NSA data packets that appear to originate from a genuine Facebook server. This method tricks a target\u2019s computer into accepting the malicious packets, allowing the NSA to infect the targeted computer with a malware \u201cimplant\u201d and gain unfettered access to the data stored on its hard drive.<\/p>\n<p>\u201cJust pull those selectors, queue them up for QUANTUM, and proceed with the pwnage,\u201d the author of the posts writes. (\u201cPwnage,\u201d short for \u201cpure ownage,\u201d is gamer-speak for defeating opponents.) The author adds, triumphantly, \u201cYay! \/throws confetti in the air.\u201d<\/p>\n<p>In one case, these tactics were used by the NSA\u2019s British counterpart, Government Communications Headquarters, or GCHQ, to infiltrate the Belgian telecommunications company Belgacom. As <i>Der Speigel <\/i><a target=\"_blank\" href=\"http:\/\/www.spiegel.de\/international\/world\/ghcq-targets-engineers-with-fake-linkedin-pages-a-932821.html\" >revealed last year<\/a>, Belgacom\u2019s network engineers were targeted by GCHQ in a QUANTUM mission named \u201cOperation Socialist\u201d \u2013 with the British agency hacking into the company\u2019s systems in an effort to monitor smartphones.<\/p>\n<p>While targeting innocent sys admins may be surprising on its own, the \u201chunt sys admins\u201d document reveals how the NSA network specialist secretly discussed building a \u201cmaster list\u201d of sys admins across the world, which would enable an attack to be initiated on one of them the moment their network was thought to be used by a person of interest. One post outlines how this process would make it easier for the NSA\u2019s specialist hacking unit, Tailored Access Operations (TAO), to infiltrate networks and begin collecting, or \u201ctasking,\u201d data:<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-go-CNE.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-41262\" alt=\"nsa go-CNE\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-go-CNE-300x76.png\" width=\"300\" height=\"76\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-go-CNE-300x76.png 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-go-CNE.png 981w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Aside from offering up thoughts on covert hacking tactics, the author of these posts also provides a glimpse into internal employee complaints at the NSA. The posts describe how the agency\u2019s spies gripe about having \u201cdismal infrastructure\u201d and a \u201cBig Data Problem\u201d because of the massive volume of information being collected by NSA surveillance systems. For the author, however, the vast data troves are actually something to be enthusiastic about.<\/p>\n<p>\u201cOur ability to pull bits out of random places of the Internet, bring them back to the mother-base to evaluate and build intelligence off of is just plain awesome!\u201d the author writes. \u201cOne of the coolest things about it is <i>how much<\/i> data we have at our fingertips.\u201d<\/p>\n<p><i>Documents published with this article:<\/i><\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/03\/20\/hunt-sys-admins\/\" >I Hunt Sys Admins<\/a><\/li>\n<\/ul>\n<p>_________________________________<\/p>\n<p><i>Peter Maass has written about war, media and national security for<\/i><em> The New York Times Magazine<\/em><i>, <\/i><em>The New Yorker<\/em><i> and <\/i><em>The Washington Post<\/em><i>. He reported on the conflicts in Iraq and Afghanistan, covering the civilian as well as combatant sides of the fighting. He is the author of <\/i><em>Love Thy Neighbor: A Story of War<\/em><i>, an award-winning memoir about the conflict in Bosnia, and he wrote <\/i><em>Crude World: The Violent Twilight of Oil<\/em><i>. Peter, awarded a Guggenheim Fellowship in 2012, has focused most recently on government and corporate surveillance, and is working on a book about surveillance for Alfred A. Knopf. He has taught writing at Princeton and Columbia universities, and he has been awarded fellowships at the Shorenstein Center at Harvard and the American Academy in Berlin. He is on the advisory boards of the Solutions Journalism Network, and the Program for Narrative and Documentary Practice at Tufts Univeristy. A graduate of the University of California at Berkeley, he lives in New York City.<\/i><\/p>\n<p><i>Ryan Gallagher is a Scottish journalist whose work at <\/i><em>The Intercept<\/em><i> is focused on government surveillance, technology, and civil liberties. His journalism has appeared in publications including <\/i><em>Slate<\/em><i>, the<\/i><em> Guardian<\/em><i>, <\/i><em>Ars Technica<\/em><i>, <\/i><em>Huffington Post<\/em><i>, the <\/i><em>Sydney Morning Herald<\/em><i>, the <\/i><em>Financial Times<\/em><i>, the <\/i><em>Independent<\/em><i>, and the <\/i><em>New Statesman<\/em><i>. Since 2011, Ryan has broken a series of national and international stories about controversial surveillance technologies, shining a light on spy agencies and uncovering links between Western technology firms and governments in repressive countries. He took home an award for his reporting at the 2013 Information Security Journalism Awards and he has received acclaim for his writing on a diverse range of subjects, encompassing everything from the FBI\u2019s attempted infiltration of WikiLeaks to mass protests in Madrid and homelessness in England. Most recently, Ryan has been reporting from Rio de Janerio on the cache of secret files leaked by former National Security Agency contractor Edward Snowden.<\/i><\/p>\n<p><i>Micah Lee contributed to this report.<\/i><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/article\/2014\/03\/20\/inside-nsa-secret-efforts-hunt-hack-system-administrators\/\" >Go to Original \u2013 firstlook.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to a secret document provided by Edward Snowden, the NSA tracks down the private email and Facebook accounts of system administrators (or sys admins, as they are often called), before hacking their computers to gain access to the networks they control.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-41259","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/41259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=41259"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/41259\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=41259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=41259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=41259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}