NSA spied on Pakistani civil-military leadership

It released a slew of never-before-published documents provided by NSA whistleblower Edward Snowden


News Desk August 21, 2016
It released a slew of never-before-published documents provided by NSA whistleblower Edward Snowden. PHOTO: AFP

The United States’ National Security Agency (NSA) hacked Pakistan’s National Telecommunications Corporation (NTC) to spy on Pakistani civilian and military leadership, online publication The Intercept reported on Saturday.

It released a slew of never-before-published documents provided by NSA whistleblower Edward Snowden with the report, including an April 2013 NSA presentation which ‘boasts’ of successful attacks against computer systems in Pakistan.

This Snowden-designed device can alert if your iPhone is being snooped upon

According to the presentation, NSA hackers used SECONDDATE – a tool designed to intercept web requests and redirect browsers on target computers to an NSA web server – to breach targets in NTC’s VIP division. It said the targets contained documents pertaining to “the backbone of Pakistan’s Green Line communications network used by its civilian and military leadership.”

Snowden documents show NSA leak is real: report

Another document, a newsletter for the NSA’s Special Source Operations division, also describes how NSA software other than SECONDDATE was used to repeatedly direct targets in Pakistan to malware web servers, eventually infecting the targets’ computers. The servers, known as FOXACID, were described in in previously released Snowden documents.

Published in The Express Tribune, August 21st, 2016.

COMMENTS (23)

Hello There | 7 years ago | Reply What was the "world's best intelligence agency" doing?
M.S. | 7 years ago | Reply The point Is not about spying as everyone does it. The point is that why have sour civil and military relationship.
VIEW MORE COMMENTS
Replying to X

Comments are moderated and generally will be posted if they are on-topic and not abusive.

For more information, please see our Comments FAQ