TURBINE (US Government Project)
   HOME

TheInfoList



OR:

TURBINE is the codename of an automated system which enables the United States National Security Agency (NSA) automated management and control of a large surveillance network. The NSA has built an infrastructure which enables it to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. This system places and controls implants – a form of remotely transmitted malware on selected individual computer devices or in bulk on tens of thousands of devices. As quoted by '' The Intercept'', TURBINE is designed to "allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually." The NSA has shared many of its files on the use of implants with its counterparts in the so-called Five Eyes surveillance alliance – the United Kingdom, Canada, New Zealand, and Australia. Among other things due to TURBINE and its control over the implants the NSA is capable of: * breaking into targeted computers and to siphoning out data from foreign Internet and phone networks * infecting a target's computer and exfiltrating files from a hard drive * covertly recording audio from a computer's microphone and taking snapshots with its webcam * launching cyberattacks by corrupting and disrupting file downloads or denying access to websites * exfiltrating data from removable flash drives that connect to an infected computer The TURBINE implants are linked to, and relies upon, a large network of clandestine surveillance "sensors" that the NSA has installed at locations across the world, including the agency's headquarters in Maryland ( Fort George G. Meade) and eavesdropping bases used by the agency in Misawa, Japan ( Misawa Air Base) and Menwith Hill, England ( RAF Menwith Hill). Codenamed as TURMOIL, the sensors operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or "tips" to TURBINE, enabling the initiation of a malware attack. To identify surveillance targets, the NSA uses a series of data "selectors" as they flow across Internet cables. These selectors can include
email address An email address identifies an email box to which messages are delivered. While early messaging systems used a variety of formats for addressing, today, email addresses follow a set of specific rules originally standardized by the Internet Enginee ...
es,
IP address An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
es, or the unique " cookies" containing a username or other identifying information that are sent to a user's computer by websites such as
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
,
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
, Hotmail,
Yahoo Yahoo (, styled yahoo''!'' in its logo) is an American web portal that provides the search engine Yahoo Search and related services including My Yahoo, Yahoo Mail, Yahoo News, Yahoo Finance, Yahoo Sports, y!entertainment, yahoo!life, an ...
, and
Twitter Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
, unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a
Windows Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
computer crashes or updates.


See also

* Global surveillance disclosures (2013–present) * PRISM (surveillance program) * Law Enforcement Information Exchange


References

Counterterrorism in the United States Crime in the United States Espionage Human rights in the United States Mass surveillance National Security Agency Privacy in the United States Privacy of telecommunications Secret government programs Surveillance scandals United States national security policy War on terror Computer surveillance American secret government programs {{US-gov-stub