Feeds

RTFM! NSA tome reveals THE TRUTH behind spooks on the web

Spies' secrets to harnessing the internet extracted

  • alert
  • submit to reddit

High performance access to file storage

According to Hollywood, spies have access to all sorts of gizmos that mere civilians could only dream of playing with.

But it turns out that American secret agents use Google just like the rest of us. Now we are able to find out exactly how, following the publication of a hush-hush spooks' guide to the internet.

A 651-page tome called Untangling the Web has been published under freedom of information legislation. It is the 12th version of a guide written by experts at the US National Security Agency (NSA) and dates back to 2007.

The book [PDF] may not be a particularly sexed-up dossier, focusing mainly on search tips for secret agents, but contains several clues about the NSA's focus on the Middle East, Russia and China.

It opens with the tale of a Grand Vizier of Persia, Abdul Kassem Ismael, who owned 117,000 books and commissioned a caravan of 400 camels to carry them in alphabetical order - something no self-respecting spy needs to do in the modern age. Latter-day spooks can now use Google to search the "darned big" web, the document insists.

The anonymous author wrote: "After a decade of researching, reading about, using and trying to understand the internet, I have come to accept that it is indeed a Sisyphean task. Sometimes I feel that all I can do is push the rock up to the top of that virtual hill then watch as it rolls back down again."

The most interesting part of the document focuses on Google hacks, which shows spooks how to search for unsecured documents. Potential Google ninjas can learn how to use search terms like "filetype:" or "site:" to look for specific file types on specific websites.

In a nod to practicality, the NSA reminds its staff to try looking for documents or files at the website of China's foreign ministry (rather than its main government website) because there are likely to be more results in English.

It also recommends "URL guessing" by telling agents that Russian websites often use the name of cities in their web addresses.

Agents should also pay attention to cultural differences, advises the NSA's Googler-in-chief, who points out that using an Arabic spelling of Mohammed will return quite different results from using the English spelling.

Similarly, using localised search engines such as Baidu or regionalised Google variations will result in significantly different results than in the USA, says the author, who cites the example of searching for Basque separatist terror group ETA on Spanish search engines and comparing those to US-centric results.

Anyone looking to find out dialling codes for Russia is advised to visit the Russian Brides website as, "after all, these folks are running a business and must provide accurate information about how to contact their clients".

Wikipedia also got its first entry in the dossier, because of its "growing importance". However, the book contains the following advice familiar to any Reg reader (and journalist):

"Do not rely on Wikipedia as as your sole reference or source of information."

Despite the wide variety of search techniques detailed in the book, the NSA is quick to reassure upstanding spooks that nothing he's teaching them is illegal:

"Lest you think I am spilling the beans here, I assure you I am not revealing anything that is not already widely known and used on the internet both by legitimate and illicit Google hackers."

Other insights into the workings of the NSA's online division comes in the admission that agents were "never impressed" with Ask Jeeves, with its "annoying butler icon" and the "unfulfilled promise of answers to natural language queries".

To spies who find themselves stuck on how to use certain technologies or software, the author passes on the following strategy:

"Read the instructions."

®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.