{"id":20193,"date":"2013-05-09T10:34:41","date_gmt":"2013-05-09T15:34:41","guid":{"rendered":"http:\/\/quotulatiousness.ca\/blog\/?p=20193"},"modified":"2013-06-07T08:18:43","modified_gmt":"2013-06-07T13:18:43","slug":"the-nsas-guide-to-hacking-google-searches","status":"publish","type":"post","link":"https:\/\/quotulatiousness.ca\/blog\/2013\/05\/09\/the-nsas-guide-to-hacking-google-searches\/","title":{"rendered":"The NSA&#8217;s guide to hacking Google searches"},"content":{"rendered":"<p><em>Wired<\/em>&#8216;s <a href=\"http:\/\/www.wired.com\/threatlevel\/2013\/05\/nsa-manual-on-hacking-internet\/\" target=\"_blank\">Kim Zetter<\/a> on how the NSA recommends its own analysts get the best intelligence use out of Google and other online tools:<\/p>\n<blockquote><p>There\u2019s so much data available on the internet that even government cyberspies need a little help now and then to sift through it all. So to assist them, the National Security Agency produced a book to help its spies uncover intelligence hiding on the web.<\/p>\n<p>The 643-page tome, called <a href=\"http:\/\/www.nsa.gov\/public_info\/_files\/Untangling_the_Web.pdf\" target=\"_blank\"><em>Untangling the Web: A Guide to Internet Research<\/em><\/a> (.pdf), was just released by the NSA following a FOIA request filed in April by <a href=\"https:\/\/www.muckrock.com\/about\/\" target=\"_blank\"><em>MuckRock<\/em><\/a>, a site that charges fees to process public records for activists and others.<\/p>\n<p>The book was published by the Center for Digital Content of the National Security Agency, and is filled with advice for using search engines, the Internet Archive and other online tools. But the most interesting is the chapter titled \u201cGoogle Hacking.\u201d<\/p>\n<p>[. . .]<\/p>\n<p>Stealing intelligence on the internet that others don\u2019t want you to have might not be illegal, but it does come with other risks, the authors note: \u201cIt is critical that you handle all Microsoft file types on the internet with extreme care. Never open a Microsoft file type on the internet. Instead, use one of the techniques described here,\u201d they write in a footnote. The word \u201chere\u201d is hyperlinked, but since the document is a PDF the link is inaccessible. No word about the dangers that Adobe PDFs pose. But the version of the manual the NSA released was last updated in 2007, so let\u2019s hope later versions cover it.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Wired&#8216;s Kim Zetter on how the NSA recommends its own analysts get the best intelligence use out of Google and other online tools: There\u2019s so much data available on the internet that even government cyberspies need a little help now and then to sift through it all. So to assist them, the National Security Agency [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[15,13],"tags":[476,328,129,58,913],"class_list":["post-20193","post","type-post","status-publish","format-standard","hentry","category-technology","category-usa","tag-espionage","tag-google","tag-hack","tag-internet","tag-nsa"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p2hpV6-5fH","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/posts\/20193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/comments?post=20193"}],"version-history":[{"count":2,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/posts\/20193\/revisions"}],"predecessor-version":[{"id":20578,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/posts\/20193\/revisions\/20578"}],"wp:attachment":[{"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/media?parent=20193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/categories?post=20193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/tags?post=20193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}