RINF Alternative News
The automated system â€“ codenamed TURBINE â€“ is designed to â€œallow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.â€ â€¦
In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. â€¦
In many cases, firewalls and other security measures do not appear to pose much of an obstacle to the NSA. Indeed, the agencyâ€™s hackers appear confident in their ability to circumvent any security mechanism that stands between them and compromising a computer or network. â€œIf we can get the target to visit us in some sort of web browser, we can probably own them,â€ an agency hacker boasts in one secret document.
As I have stated in these pages so often Iâ€™m starting to bore myself repeating it, we â€“ the people who elect and supposedly control our governing bodies â€“ are the ultimate targets of these surveillance operations. It is about developing the ability to identify early signs of dissent, so as to snuff out opposition before it can win large-scale support. I was intrigued by the brief reference in the piece to one programme called â€œOperation Socialistâ€ â€“ interesting to know who were included in that hacking operation.
These programmes are a backstop, designed to deal with the fall-out if our media fail in their struggle to persuade us â€“ given the overwhelming evidence to the contrary â€“ of our leadersâ€™ benign intent and democratic accountability.