Military Review

Media: NSA can inflict a retaliatory cyber-attack on Russia

45
After hacking into the servers of the US Democratic Party, the National Security Agency (NSA) may attempt to retaliate a cyber attack on Russian government departments, reports Life.ru Post Channel ABC News.




According to the interlocutor of the channel, behind the attack, most likely, there are Russian hackers, and in order to accurately establish this fact, the option of response hacking is being considered.

“From the point of view of the external intelligence mission, one of the things we have to do is try to understand who did the hacking, who is responsible for the violations. We will use the authority of the NSA to conduct foreign intelligence, to understand who did it and get an attribution. This is hard work, but this is one of our responsibilities, ”said NSA staff member Robert Joyce.

Recall, recently, the FSB announced that it was infected with computer spyware about 20 by Russian departments of organizations.

According to the FSB, “computers of state authorities, scientific and military institutions, defense industry enterprises and other objects of the country’s critical infrastructure were subjected to infection.”

“After being introduced into the system, the malicious program loads the necessary modules and then can intercept network traffic, wiretap, take screenshots of the screen, independently enable webcams and microphones, mobile devices, record audio and video, as well as keystroke data,” explained in the power department.

It is noted that the FSB specialists, together with other agencies, "carried out a set of measures to identify all the" victims "of the malicious program in Russia, as well as localize the threats and minimize the consequences caused by its spread."
Photos used:
REUTERS / Kacper Pempel
45 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. ImPerts
    ImPerts 1 August 2016 08: 58
    +9
    After hacking the servers of the US Democratic Party, the National Security Agency (NSA) may attempt a retaliatory cyber attack against Russian government departments, ABC News reports to Life.ru.

    Who argues. They can. And then we'll see)))
    1. dauria
      dauria 1 August 2016 09: 05
      +24
      Who argues. They can. And then we'll see)


      The key word here is "reciprocal" ... They say, everything has been proven, and Trump is Moscow's protege. wink And Clinton's "affairs" go into the shadows.
      1. ImPerts
        ImPerts 1 August 2016 09: 29
        +11
        Quote: dauria
        Like, everything is already proven

        So no one dealt with the Malaysian Boeing. Immediately blamed.
        Understand, do not understand, anyway, they will blame. And even if they figure it out and realize that they have blamed it indiscriminately, they will forget to apologize. hi
        1. _Vladislav_
          _Vladislav_ 1 August 2016 09: 36
          +14
          Quote: ImPerts
          So no one dealt with the Malaysian Boeing. Immediately blamed.

          When I ask the Ukrainians living in Kiev, who shot down the Boeing in your opinion? They clearly answer me - Russia. I say, how is it so, and dispatchers' negotiations are objective control data, and black boxes and the nature of the damage on a downed liner?
          They answer me - get out, svovoloch, Putin's propagandist, cattle, Muscovite, suitcase station Russia.

          Something like this))) winked

          PS
          The benefit of talking remotely, on the censor) And then they would have killed)
          1. DimerVladimer
            DimerVladimer 1 August 2016 12: 31
            -7
            Quote: _Vladislav_
            When I ask the Ukrainians living in Kiev, who shot down the Boeing in your opinion? They clearly answer me - Russia. I say, how is it so, and dispatchers' negotiations are objective control data, and black boxes and the nature of the damage on a downed liner?
            They answer me - get out, svovoloch, Putin's propagandist, cattle, Muscovite, suitcase station Russia.


            I have no words -
            "According to the data officially confirmed by the Ukrainian side, as of February 4, 2015, as a result of the armed conflict in the east of the country, the Ukrainian air forces and ground forces lost 11 aircraft from enemy fire (1 An-30, 1 An-26, 1 Il-76, 2 Su-24, 2 MiG-29, 4 Su-25), 7 helicopters (3 Mi-8 and 4 Mi-24) and two jet unmanned aerial vehicles Tu-143. "

            The residents of Krains are talking - they themselves beat their MiG-29 An-30 An-26 Su-25 with their Bukami,
            and Boeing CAM fell ....
            1. _Vladislav_
              _Vladislav_ 1 August 2016 13: 32
              +2
              Quote: DimerVladimer
              Ukrainian air forces and ground forces lost 11 aircraft from enemy fire (1 An-30, 1 An-26, 1 Il-76, 2 Su-24, 2 MiG-29, 4 Su-25), 7 helicopters (3 Mi- 8 and 4 Mi-24) and two jet unmanned aerial vehicles Tu-143. "

              Ayayay, Ayayay ....
              Then I look ukroiny no longer use aviation against militias. Apparently decently fed lol )))
              It finally arrived that there was no need to fly. Although it comes to them for a long time, like sheep.)
            2. Blackgrifon
              Blackgrifon 1 August 2016 15: 24
              +2
              Quote: DimerVladimer
              The residents of Krains are talking - they themselves beat their MiG-29 An-30 An-26 Su-25 with their Bukami,
              and Boeing CAM fell ....

              But nothing that all the downed combat and military transport planes and helicopters were significantly BELOW civilian air corridors?
              Is it okay that Ukraine turned out to be the main "beneficiary"?
              Nothing fired from the front line?
              How does the movement of APU air defense systems in the Donbass correlate with all this?
              Logic sometimes needs to be included, and not everything that is given.
          2. twviewer
            twviewer 1 August 2016 12: 53
            +2
            Then the people, I see, with their hats decided to throw an opponent, criminal naivety. Americans have been cyber espionage for a long time and at the system level, which includes using the largest IT corporations to their advantage. The collection and processing of seemingly insignificant information can improve its quality level. Having high-quality information is much easier to infiltrate in the victim’s information field, for example, for intelligence or obtaining critical commercial information (obtaining non-market advantages, industrial espionage). What corporations themselves are already interested in. Thus, the cooperation of special services with corporations becomes mutually beneficial. So that. And here you are with caps.
            1. ImPerts
              ImPerts 1 August 2016 13: 50
              +1
              Who is arguing ?! Only we can be fancied in such a way that everyone who is in grief, who is out of laughter) will fall)))
        2. Lukich
          Lukich 1 August 2016 10: 07
          +5
          Quote: ImPerts
          Understand, do not understand, still blame

          so how much was the main drunk of the outskirts with a piece of iron from the bus running. such evidence ...
        3. WKS
          WKS 1 August 2016 11: 14
          +4
          There is no need to put different winds there on "computers of state authorities, scientific and military institutions, enterprises of the military-industrial complex and other objects of the country's critical infrastructure." You need your own operating systems.
      2. NIKNN
        NIKNN 1 August 2016 10: 11
        +2
        One of the activities of counterintelligence is to deceive the enemy. I think their viruses are allowed to penetrate into the "necessary" databases.
  2. Monos
    Monos 1 August 2016 08: 59
    +21
    “After being introduced into the system, the malicious program loads the necessary modules and then can intercept network traffic, wiretap, take screenshots of the screen, independently enable webcams and microphones, mobile devices, record audio and video, as well as keystroke data,” explained in the power department.


    Nehren at work on porn sites to climb. Do business.
    1. Masya masya
      Masya masya 1 August 2016 09: 14
      +9
      Why did you decide that porn sites? Cartoons they watch!
      1. Alexanast
        Alexanast 1 August 2016 09: 32
        +12
        Not only, but also sitting on topwar ... let them read
  3. Masya masya
    Masya masya 1 August 2016 09: 04
    +7
    “In terms of the foreign intelligence mission, one of the things we have to do is try to understand who did the hack, who is responsible for the violations. We will use the NSA's power to conduct foreign intelligence to understand who did it and get attribution. This is hard work, but this is one of our responsibilities ", well, bureaucracy in action ... It should be easier - we want to, but we cannot !!! And this is impotence ... lol
    1. Alex_Tug
      Alex_Tug 1 August 2016 17: 26
      +1
      It’s easier to be, we want, but we can’t !!! And this is impotence.


      Do not throw hats for nothing. About what no one can write. And how the computers of Iran’s nuclear program were disabled. And how they listened to Merkel. It becomes known only with leaks.
  4. Coconut
    Coconut 1 August 2016 09: 07
    +7
    I don’t understand one thing ... why is it necessary to crack the server of the American Democrats in Russia? .. Russia has Hilary Clinton, she herself dumps everything to us with sms and doesn’t strain good
  5. rotmistr60
    rotmistr60 1 August 2016 09: 08
    +5
    probablyare Russian hackers

    Something too modest for an American. Clinton, without any evidence, has already said "luminevo" means "luminevo". For some reason, I recall one very active Ukrainian figure who was the initiator of the seizure of Orthodox churches and the main detractor of the Moscow Patriarchate. He ended up being struck by lightning. This I mean that sooner or later, but for all the evil that I have done will have to answer.
    1. Amurets
      Amurets 1 August 2016 09: 28
      +5
      Quote: rotmistr60
      . This I mean, sooner or later, but for all the evil that I did I will have to answer.

      That's right! God marks the assault!
      1. rotmistr60
        rotmistr60 1 August 2016 09: 50
        0
        Here you are right countryman. And we will hope that more than one (huck) marks.
  6. GELEZNII_KAPUT
    GELEZNII_KAPUT 1 August 2016 09: 09
    +1
    Monitor do not splatter, perverts! laughing
  7. Siberian
    Siberian 1 August 2016 09: 11
    +4
    All this is pure pre-election populism. In this case, from the Democrats. Playing the card with Russia for "literate" and obedient voters. Hillary - Russia is a terrible enemy - (be afraid), but I can protect you from him. Trump - Russia is not so bad, ISIS is evil (be afraid), but I can protect you from it. And in practice, it does not matter whoever wins the vector of politics will remain unchanged - the United States is a superpower, and the rest should be its vassals and nothing else.
  8. There are a lot of us
    There are a lot of us 1 August 2016 09: 12
    +1
    The US wants to turn into a radioactive desert ...
    1. mr.redpartizan
      mr.redpartizan 1 August 2016 19: 04
      0
      And glass at the same time.
  9. avg-mgn
    avg-mgn 1 August 2016 09: 15
    +2
    “Computers were infected government bodies, scientific and military institutions, enterprises of the military-industrial complex and other critical infrastructure facilities in the country. ”

    I admit that the computer network of these organizations that have access to public networks, they could hit (although, probably without much damage to them). Internal networks are unlikely, since they do not have access to public networks (even the ports are closed to insert a flash drive or drive).
  10. Mountain shooter
    Mountain shooter 1 August 2016 09: 18
    +3
    And I did not understand, Kaspersky is with us, or with them? Regarding the fact that their NSA will begin to "spoil our lives," and what, they were shy before? It seems to me that these are empty promises ...
  11. NEXUS
    NEXUS 1 August 2016 09: 32
    +4
    “From the point of view of the external intelligence mission, one of the things we have to do is try to understand who did the hacking, who is responsible for the violations. We will use the authority of the NSA to conduct foreign intelligence, to understand who did it and get an attribution. This is hard work, but this is one of our responsibilities, ”said NSA staff member Robert Joyce.

    Here is another component of modern war, cyber war. And the NSA is not sitting on those "wooden" Khokhlyad cyber warriors, but experts in their field and this must be understood. I think such a statement can be regarded as an official declaration of cyber war on us.
    1. Alex_Tug
      Alex_Tug 1 August 2016 17: 30
      0
      as an official announcement to us of cyber war.


      This is not announced. And they are not announcing that she’s going either. Remember that the screws already come from the factory with embedded viruses.
  12. Banishing liberoids
    Banishing liberoids 1 August 2016 09: 32
    0
    Let our hackers break into everything they reach out to in the USA !!! These rotten staff members were scorched!
  13. skeptic
    skeptic 1 August 2016 09: 35
    +4
    Well, then it’s time to really show what Russian hackers are (that would not be confused later).
  14. BOB044
    BOB044 1 August 2016 09: 36
    0
    NSA may inflict retaliation cyberdar on Russia
    No matter how painful they get in return. This NSA.
    1. Alex_Tug
      Alex_Tug 1 August 2016 17: 32
      0
      No matter how painful they get in return. This NSA.


      NSA don't care. They do not cut funding.
  15. HAM
    HAM 1 August 2016 09: 41
    +3
    It is high time to call things by their proper names: the Yankees blame Russia for all sins (existing and imaginary), and our services show unnecessary correctness - "..... a FOREIGN state is behind cyber attacks ..", TO HANG ON THE STAFF OF "ALL DOGS" - Let them justify themselves. Penguins perceive good manners in relationships as weakness. They are not ashamed of anything - and outright lies, and abductions, and even murders ..
  16. Altona
    Altona 1 August 2016 10: 11
    0
    A cyber attack on the servers of another state is generally equivalent to military operations. Apparently, the American corvettes in Middle-earth will have to repeat what the Russians can do with them.
  17. sergeyzzz
    sergeyzzz 1 August 2016 10: 33
    0
    Let them attack, our training will not hurt, we assume that these are exercises that are as close as possible to combat laughing
  18. prior
    prior 1 August 2016 11: 04
    0
    The "perpetrators" have been appointed.
    There is little to do: to catch another "Bout" in Thailand, to sue and to jail.
    The methods of our "partners" are "democratic" and unchanging.

    They wanted to isolate - the tape was not enough. Now the Pokemon will launch.
  19. 1536
    1536 1 August 2016 11: 17
    0
    In my opinion, they are stuffing their own price. And if not, where did the billions of dollars to protect the information allocated by Congress to the NSA go? Are Americans really as dumb as they seem, or are all their bullshit servers?
    Perhaps this provocation has a deeper foundation. In general, forbid the Russians to go abroad, and those who are already there, catch and throw in concentration camps! Exaggerate! Then the Americans, indeed, will not seem enough. But still, our special services still need to tighten control over the US Embassy in Moscow and the consulates of this country of terrorists in our large cities and individuals with an American passport.
  20. Wildfox
    Wildfox 1 August 2016 11: 48
    +1
    Come on, you come up with foam, the Russian Federation simply winds up the response campaign of the NSA and the CIA as an enemy.
    If it is necessary to really influence the Ministry of Economic Development, a brochure will be issued for HSE alumni. The point is to bathe with viruses if there are direct "levers" in the form of people.
    In the Ministry of Defense, I think they can only hack public access servers and steal the "combed"
    appeals in the press, in my opinion they always had their own internal network.
    They maintain normal vigilance of citizens (and this is good) so that they first think and then do. Do not fight in hysteria, we observe and wait for a climax (choice in the Duma of the Russian Federation and the US President) and, of course, the denouement, warming / cooling of relations.
  21. Stinger
    Stinger 1 August 2016 11: 53
    +1
    Democracy is developing. Previously, at least the test tubes were shaken at the UN, but now one idiot just blurted out about the guilt of Russia, and now he is a "retaliatory" blow.
  22. gridasov
    gridasov 1 August 2016 12: 26
    0
    Theoretically and practically, there are no such information resources located in information media that could not be opened for access. Therefore, a fool will always blame others for his own inability to protect himself. The smart one will seek methods and means of such protection. Therefore, the modern fundamental principles of placing basic sources of information, such as a code, cannot ensure secrecy and inaccessibility. In a linear recording of sequentially placed codes there is always a preceding code and a subsequent one, which constitutes a practical opportunity to detect hidden "records". However, when a mathematical code is written radially, each such code will represent a chain of algorithmically written codes, always in contact with several conjugate codes in a radius. Therefore, the "digital fortress" will always be impregnable for a whole range of factors that will ensure its secrecy with complete openness and work in the network.
  23. mikh-korsakov
    mikh-korsakov 1 August 2016 12: 47
    +1
    The American writes - I quote: most likely, Russian hackers are behind the attack, and in order to establish this fact precisely, the option of a return hack is being considered. I didn’t understand the logic, that is, the author seems to be saying, for example, if I’m not sure which of the neighbors in the communal apartment I gave me soup, I need to put in the soups those whom I suspect! Idiocy.
    1. Alex_Tug
      Alex_Tug 1 August 2016 17: 37
      0
      I do not understand the logic


      To crow the logic is not needed. There would be a reason. Like a rooster: morning - Kukareku !!!
  24. Shuttle
    Shuttle 1 August 2016 15: 25
    -1
    Could attack - would attack long ago.

    These woodpeckers still do not understand that they can carry out an attack on those organs that are connected to their tyrnets. Truly dangerous or of interest to them systems, we not only specifically check and specifically investigate (yes, it’s called Special Inspection and Special Investigation), but we don’t connect to the Internet at all. For nefig!
  25. Bochik
    Bochik 1 August 2016 20: 55
    0
    "From the point of view of the foreign intelligence mission, one of the things we have to do is try to understand who did the break-in, who is responsible for the violations."

    They will blame Russia again, and instead of evidence they will say that they exist, but are terribly classified.