Privacy News NSA's Hacking Group Hacked! Bunch of Private Hacking Tools Leaked online

Logethica

Level 13
Verified
Top Poster
Well-known
Jun 24, 2016
636
" that humanity could not be trusted with its own freedom. What we did not realize was that if you tried to take that freedom, they resist. The war taught us much. Humanity needed to surrender its freedom willingly. "
"... a world so chaotic that humanity is finally ready to sacrifice its freedom to gain its security."
Yes..
The Character Dr. Arnim Zola also said...
"...secretly feeding crises, reaping war. And when history did not cooperate, history was changed".

1907: Indiana became the first of many US States to pass Eugenics,forced sterilisation Laws.
1910: The US Eugenics Records Office was created.
1927: The Kaiser Wilhelm Institute for Anthropology (KWIA), an organization which concentrated on physical and social anthropology as well as human genetics, was founded in Berlin with significant financial support from the American philanthropic group, the Rockefeller Foundation.German professor of medicine, anthropology and eugenics, Eugen Fischer, was the director of this organization, a man whose work helped provide the scientific basis for the Nazis' eugenic policies.
 

Tony Cole

Level 27
Verified
May 11, 2014
1,639
The main issue: we all hear the bad, never does the FBI, NSA, CIA or MI5 and GCHQ state which terror plots they've stopped (for good reason) we must also remember they do not just use these tools for terrorism, but also drug trackers and tracking/catching paedophiles. If Snowden was so cock-sure he'd have the guts to return to the States and answer questions under oath; apparently he has enough supporters to oppose the death penalty, or has he given Russia classified info, about the NSA and GCHQ programs that he's not released? I find it very odd for a person who first stated he had destroyed all documents in Hong Kong, so he could not hand anything to the Russian, now more surface.
 
Last edited by a moderator:

NekoHr

Level 3
Verified
Well-known
Feb 5, 2016
139
I find it very odd for a person who first stated he had destroyed all documents in Hong Kong, so he could not hand anything to the Russian, now more surface.

As far as we know he gave all documents to press and they now decide when to publish something new.

If Snowden was so cock-sure he'd have the guts to return to the States and answer questions under oath

You really think he would get fair trial? Whether he was found guilty or not he revealed some misuse and abuse of system, what happened in response to this? More obfuscation, more secrets... Looks something is wrong with system and procedures.

we all hear the bad, never does the FBI, NSA, CIA or MI5 and GCHQ state which terror plots they've stopped (for good reason) we must also remember they do not just use these tools for terrorism, but also drug trackers and tracking/catching paedophiles.

Why don't they say that they were successful? Are they hiding success form bad guys? They know if they have been stopped, so it looks like they are hiding it from rest of us. Why? They don't need to share how they did it, tools and procedures just final result. Maybe presenting how successful they are would deter new attempts.

At the end, you can't fight terrorism just by preventing attacks and hope to win, cause one successful attack and you fail (it's like 99,9% effective signature AV, every once in a while one will get through).
Only by curing cause of terrorism you can win and even if successful in that it will take time to remove terrorism form this world.
 
  • Like
Reactions: Logethica

Exterminator

Level 85
Verified
Top Poster
Well-known
Oct 23, 2012
12,527
Whether or not this is actually legitimate remains to be seen.On the surface it appears that it very well could be and if so it would be a detrimental leak of information used to combat Cyber Security and Terrorism.
It would be advisable not to read too much into this and head down the off topic track.
Every government has a group dedicated to hacking.I imagine this is better than war where young men and women are the casualties.Pawns if you will.
I sleep like a baby at night,trust me the average citizen is not the focus of government spying.At least from where I sit.
 
  • Like
Reactions: Logethica
F

ForgottenSeer 19494

At the end, you can't fight terrorism just by preventing attacks and hope to win, cause one successful attack and you fail (it's like 99,9% effective signature AV, every once in a while one will get through).
Only by curing cause of terrorism you can win and even if successful in that it will take time to remove terrorism form this world.
Yes, you have to cure the reasons for their creation, not only the imminent threats. But the latter is still very important, you can't stop the creation of terrorists without fighting the current ones. Also, i can't understand why they even do this. By killing innocent people they make the people hate Islam, and in fact less people will become muslims. Jihad??? Nah, that's not even close to Jihad. Noone will like your religion if you kill innocent people. So it seems that this is not the reason for the killings. They want to conquer Europe? They want to conquer Asia? Africa? USA? Even if you kill thousands of people they will not succeed in this. You cannot conquer a country by killing its people. You will have an empty territory then, but they cannot battle with countries. Kill people? Oh yes, everyone can do that. But when they try fighting with real armies they will all die, no matter the price of the fallen soldiers. And they know that. The only thing terrorists can do is to kill people. They are weak and they are not capable of anything more than this. In one word, crazy people.
 

Like a Western!

Level 9
Verified
Well-known
Apr 6, 2016
440
Documents from the Edward Snowden archive prove that the malware and exploits dumped on the public internet on Monday originated from the NSA.

Among the files leaked by whistleblower Snowden in 2013 is a draft NSA manual on how to redirect people's web browsers using a man-in-the-middle tool called SECONDDATE. This piece of software meddles with connections in real-time so targets quietly download malware from NSA-controlled servers.

The guide instructs snoops to track SECONDDATE deployments using a 16-character identification string: ace02468bdf13579.

Earlier this week, hackers calling themselves the Shadow Brokers briefly leaked on GitHub an archive of code, claiming the tools were stolen from the Equation Group – which is understood to be a computer surveillance wing of the NSA. It was hard to tell at the time if the software collection was a carefully constructed spoof, or if it truly belonged to the US spying agency.

Read Full Article here: Click
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top