• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • February 28th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Cyber Events

Snowden used a cheap software to gather secret NSA files

February 9th, 2014 Pushpa Mishra Cyber Events, Surveillance 0 comments
Snowden used a cheap software to gather secret NSA files
Share on FacebookShare on Twitter

Edward Snowden, the American whistleblower, used a very simple ‘Web crawler’ to collect controversial NSA data, according to a senior intelligence official quoted by The New York Times.

meet-the-cheap-software-that-helped-snowden-gather-secret-nsa-files

He further added that the collection process was ‘quite automated’ and the software did the ‘search, index, and backup’ of files while Snowden went about his daily routine.

  • We do not believe this was an individual sitting at a machine and downloading this much material in sequence,” the official said. 

He only needed the right logins to bypass the internal defenses in place and collect the data automatically. 

Snowden was able to access 1.7 million files including internal NSA networking documents and internal ‘wiki’ materials by setting the right algorithm for the web crawler with appropriate subjects and the extent to which the links should be followed, the report said.

The web crawler Snowden used was similar to the one used by Google to access and download contents of billions of websites for faster search results.

The not so highly sophisticated attacks could have been easily detected by special monitors in place at other NSA headquarters like Fort Meade, but the Hawaii outpost, where he was based as the technology contractor, was not upgraded with the latest security measures. 

But that does not mean that his activities went unnoticed. But he was able to ward off criticisms tactfully. The report noted,

  • In at least one instance when he was questioned, Mr. Snowden provided what were later described to investigators as legitimate-sounding explanations for his activities: As a systems administrator he was responsible for conducting routine network maintenance. That could include backing up the computer systems and moving information to local servers, investigators were told.

Currently, Snowden is a fugitive staying in Moscow, Russia, where is granted political asylum. His leaks have highlighted several unreported NSA and its British counterpart GCHQ operations that have created outrage among civilians as well as affected American international relations with its allies.

  • Tags
  • Edward Snowden
  • NSA
  • PRISM
  • Snowden
  • Software
  • Spy
  • Spying
  • Surveillance
Facebook Twitter LinkedIn Pinterest
Previous article How to Prevent Your Website from Authentication Hacking Attack? (In Depth Analysis)
Next article Dubai Police Official Twitter, LinkedIn and Pinterest accounts Hacked by Anonymous
Pushpa Mishra

Pushpa Mishra

Pushpa is a Dubai based scientific academic editor who worked for Reuters' Zawya business magazine and at the same time a passionate writer for HackRead. From the very first day she has been a blessing for team Hackread. Thanks to her dedication and enthusiasm.

Related Posts
A Ban on Ad Targeting: Why Did EU Regulators Call for It?

A Ban on Ad Targeting: Why Did EU Regulators Call for It?

Court docs show FBI can unlock iPhones, access Signal messages

Court docs show FBI can unlock iPhones, access Signal messages

Generation Z least likely to share their location data with government

Generation Z least likely to share their location data with government

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Microsoft release open-source CodeQL queries to hunt SolarWinds hacks
Microsoft

Microsoft release open-source CodeQL queries to hunt SolarWinds hacks

Hackers using malicious Firefox extension to phish Gmail credentials
Security

Hackers using malicious Firefox extension to phish Gmail credentials

Apple Glass may feature 3D Audio and Self-Cleaning in new patent
Technology News

Apple Glass may feature 3D Audio and Self-Cleaning in new patent

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us