Feeds

RTFM! NSA tome reveals THE TRUTH behind spooks on the web

Spies' secrets to harnessing the internet extracted

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

According to Hollywood, spies have access to all sorts of gizmos that mere civilians could only dream of playing with.

But it turns out that American secret agents use Google just like the rest of us. Now we are able to find out exactly how, following the publication of a hush-hush spooks' guide to the internet.

A 651-page tome called Untangling the Web has been published under freedom of information legislation. It is the 12th version of a guide written by experts at the US National Security Agency (NSA) and dates back to 2007.

The book [PDF] may not be a particularly sexed-up dossier, focusing mainly on search tips for secret agents, but contains several clues about the NSA's focus on the Middle East, Russia and China.

It opens with the tale of a Grand Vizier of Persia, Abdul Kassem Ismael, who owned 117,000 books and commissioned a caravan of 400 camels to carry them in alphabetical order - something no self-respecting spy needs to do in the modern age. Latter-day spooks can now use Google to search the "darned big" web, the document insists.

The anonymous author wrote: "After a decade of researching, reading about, using and trying to understand the internet, I have come to accept that it is indeed a Sisyphean task. Sometimes I feel that all I can do is push the rock up to the top of that virtual hill then watch as it rolls back down again."

The most interesting part of the document focuses on Google hacks, which shows spooks how to search for unsecured documents. Potential Google ninjas can learn how to use search terms like "filetype:" or "site:" to look for specific file types on specific websites.

In a nod to practicality, the NSA reminds its staff to try looking for documents or files at the website of China's foreign ministry (rather than its main government website) because there are likely to be more results in English.

It also recommends "URL guessing" by telling agents that Russian websites often use the name of cities in their web addresses.

Agents should also pay attention to cultural differences, advises the NSA's Googler-in-chief, who points out that using an Arabic spelling of Mohammed will return quite different results from using the English spelling.

Similarly, using localised search engines such as Baidu or regionalised Google variations will result in significantly different results than in the USA, says the author, who cites the example of searching for Basque separatist terror group ETA on Spanish search engines and comparing those to US-centric results.

Anyone looking to find out dialling codes for Russia is advised to visit the Russian Brides website as, "after all, these folks are running a business and must provide accurate information about how to contact their clients".

Wikipedia also got its first entry in the dossier, because of its "growing importance". However, the book contains the following advice familiar to any Reg reader (and journalist):

"Do not rely on Wikipedia as as your sole reference or source of information."

Despite the wide variety of search techniques detailed in the book, the NSA is quick to reassure upstanding spooks that nothing he's teaching them is illegal:

"Lest you think I am spilling the beans here, I assure you I am not revealing anything that is not already widely known and used on the internet both by legitimate and illicit Google hackers."

Other insights into the workings of the NSA's online division comes in the admission that agents were "never impressed" with Ask Jeeves, with its "annoying butler icon" and the "unfulfilled promise of answers to natural language queries".

To spies who find themselves stuck on how to use certain technologies or software, the author passes on the following strategy:

"Read the instructions."

®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.