[HacktionLab] This is mental part 2

Mick - Clearerchannel.org mickfuzz at clearerchannel.org
Thu Jul 17 17:04:56 UTC 2014


Darlene Storm
<http://blogs.computerworld.com/user/darlene-storm>


      Darlene Storm

<http://blogs.computerworld.com/user/darlene-storm>
Most security news is about insecurity, hacking and cyber threats,
bordering on scary. But when security is done right, it's a beautiful
thing...sexy even. Security IS sexy.
Follow @SecurityIsSexy <http://twitter.com/SecurityIsSexy>
By Darlene Storm <http://blogs.computerworld.com/user/darlene-storm>
July 16, 2014 1:22 PM EDT
http://blogs.computerworld.com/privacy/24145/leaked-gchq-catalog-exploit-tools-manipulation-and-mass-surveillance
inShare <javascript:void(0);>1

Just as civil liberties groups challenge the legality
<http://www.bbc.com/news/uk-28286105> of the UK intelligence agency’s
mass surveillance programs, a catalog of exploit tools for monitoring
and manipulation is leaked online.

The Joint Threat Research Intelligence Group (JTRIG), a department
within the Government Communications Headquarters (GCHQ), “develops the
majority of effects capabilities” for UK’s NSA-flavored intelligence
agency. First Look Media
<https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/>
first published the Snowden-leaked Wikipedia-like document full of
covert tools used by GCHQ for surveillance and propaganda. JTRIG tools
and techniques help British spies “seed the internet with false
information, including the ability to manipulate the results of online
polls,” monitor social media posts, and launch attacks ranging from
denial of service, to call bombing phones, to disabling users' accounts
on PCs.

Devil’s Handshake, Dirty Devil, Reaper and Poison Arrow are but a few
vicious-sounding JTRIG system tools, but the naming convention for
others are just inane like Bumblebee Dance, Techno Viking and Jazz
Fusion. Perhaps the British spies were hungry when coming up with Fruit
Bowl, Spice Island, Nut Allergy, and Berry Twister?  

Most of the tools are "fully operational, tested and reliable,”
according to the 2012 JTRIG Manual
<https://firstlook.org/theintercept/document/2014/07/14/jtrig-tools-techniques/>,
but "Don't treat this like a catalog. If you don't see it here, it
doesn't mean we can't build it." Like the previously leaked
<http://blogs.computerworld.com/cybercrime-and-hacking/23195/leaked-slide-shows-nsa-hackers-secretly-infected-50000-computer-networks-malware>
TAO exploits
<http://blogs.computerworld.com/cybercrime-and-hacking/23347/17-exploits-nsa-uses-hack-pcs-routers-and-servers-surveillance>,
it’s an eye-opener as to exploits that GCHQ can deploy.


Some of the especially invasive tools that are “either ready to fire or
very close to being ready” include:

  *         Angry Pirate can “permanently disable a target’s account on
    their computer.”
  *         Stealth Moose can “disrupt” a target’s “Windows machine.
    Logs of how long and when the effect is active.”
  *         Sunblock can “deny functionality to send/receive email or
    view material online.”
  *         Swamp Donkey “silently” finds and encrypts all predefined
    types of files on a target’s machine.
  *         Tracer Fire is an “Office document that grabs the targets
    machine info, files, logs, etc and posts it back to GCHQ.”
  *         Gurkhas Sword is a tool for “beaconed Microsoft Office
    documents to elicit a targets IP address.”
  *        Tornado Alley is a delivery system aimed at Microsoft Excel
    "to silently extract and run an executable on a target's machine."
  *         Changeling provides UK spies with the “ability to spoof any
    email address and send email under that identity.”
  *         Glassback gets a target’s IP by “pretending to be a spammer
    and ringing them. Target does not need to answer.”

*Denial of Service*:

  *         Rolling Thunder uses P2P for distributed denial of service.
  *         Predators Face is used for “targeted denial of service
    against web servers.”
  *         Silent Movie provides “targeted denial of service against
    SSH services.”

Other JTRIG exploits include Screaming Eagle, “a tool that processes
Kismet <http://www.kismetwireless.net/> data into geolocation
information” and Chinese Firecracker for “overt brute login attempts
against online forums.” Hacienda is a “port scanning tool designed to
scan an entire country or city” before identifying IP locations and
adding them to an “Earthling database.”

*Messing with cellphones*:

  *         Burlesque can “send spoofed SMS text messages.”
  *         Cannonball can “send repeated text messages to a single target.”
  *         Concrete Donkey can “scatter an audio message to a large
    number of telephones, or repeatedly bomb a target number with the
    same message.”
  *         Deer Stalker provides a way to silently call a satellite and
    GSM phone “to aid geolocation.”
  *         Imperial Barge can connect two target phones together in a call.
  *         Mustang “provides covert access to the locations of GSM cell
    towers.”
  *         Scarlet emperor is used for denial of service against
    targets’ phones via call bombing.
  *         Scrapheap Challenge provides “perfect spoofing of emails
    from BlackBerry targets.”
  *         Top Hat is “a version of Mustang and Dancing Bear techniques
    that allows us to pull back cell tower and Wi-Fi locations targeted
    against particular areas.”
  *         Vipers Tongue is another denial of service tool but it’s
    aimed at satellite or GSM phone calls.

*Manipulation and propaganda *

Bomb Bay can “increase website hits/rankings.” Gateway can “artificially
increase traffic to a website;” Slipstream can “inflate page views on
websites.” Underpass “can change the outcome of online polls.” Badger
can mass deliver email messages “to support an Information Operations
campaign.” Gestator can amplify a “given message, normally video, on
popular multimedia websites” like YouTube. The “production and
dissemination of multimedia via the web in the course of information
operations” can be accomplished with Skyscraper. There are also various
tools to censor or report “extremist” content.

*Online surveillance of social networks*

Godfather collects public data from Facebook. While Spring Bishop finds
private photos of targets on Facebook, Reservoir allows the collection
of various Facebook information. Clean Sweep can “masquerade Facebook
wall posts for individuals or /entire countries/.”

Birdstrike monitors and collects Twitter profiles. Dragon’s Snout
collects Paltalk group chats. Airwolf collects YouTube videos, comments
and profiles. Bugsy collects users’ info off Google+. Fatyak is about
collecting data from LinkedIn. Goodfella is a “generic framework to
collect public data from online social networks.” Elate monitors a
target's use of UK's eBay. Mouth finds, collects and downloads a user’s
files from achive.org. Photon Torpedo can “actively grab the IP address
of an MSN messenger user.” Pitbull is aimed at large scale delivery of
tailored messages to IM services.

Miniature Hero is about exploiting Skype. The description states,
“Active Skype capability. Provision of real time call records (SkypeOut
and SkypetoSkype) and bidirectional instant messaging. Also contact lists.”

If that’s not enough mass-scale surveillance and manipulation to irk
you, there are more weaponized tricks and techniques in the JTRIG Manual
<https://firstlook.org/theintercept/document/2014/07/14/jtrig-tools-techniques/>.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.aktivix.org/pipermail/hacktionlab/attachments/20140717/9b958b9e/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: Darelene-Storm-full.png
Type: image/png
Size: 16008 bytes
Desc: not available
URL: <https://lists.aktivix.org/pipermail/hacktionlab/attachments/20140717/9b958b9e/attachment-0001.png>


More information about the HacktionLab mailing list