recommended reading

NSA Denies Using Facebook to Hack Into Your Computer

antb/Shutterstock.com

The National Security Agency on Thursday denied using a doppelganger version of Facebook, saying it lacks the ability to do so and only conducts foreign intelligence operations that are "lawful and appropriate."

"NSA does not use its technical capabilities to impersonate U.S. company websites," the agency said in a statement. "Nor does NSA target any user of global Internet services without appropriate legal authority. Reports of indiscriminate computer exploitation operations are simply false."

The maligned federal agency was hit with a renewed wave of flogging Wednesday after a report by First Look Media said the NSA had at times "masqueraded as a fake Facebook server" in order to infect targeted computers with malware. Documents from 2009 provided by former NSA contractor Edward Snowden published in the report detailed a secret program called "Turbine" that was designed to hack into computers and gather data from foreign networks.

Nowhere in the NSA's statement, however, does it definitively state that the agency has never previously posed as another website for surveillance purposes. The agency is known for its carefully worded statements couched in qualifying language.

In response to the story, a Facebook spokesman told National Journal that the NSA could not currently spoof its site in the manner described in the First Look report because the site finished integrating secure communications protocol last year. But Facebook didn't rule out that such exploitation could have occurred in the past, when standard communications protocol was used.

The company additionally denied ever having evidence or knowledge of the spy program.

Earlier on Thursday, Facebook founder Mark Zuckerberg posted a public note on his page that criticized President Obama and his administration for its surveillance programs.

(Image via antb / Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.