The latest documents leaked by Edward Snowden have hit the wire, and as expected, it's worse than previously thought on some levels. Moreover, NSA analysts seem to take great pleasure in mirroring the actions of the very criminals that security professionals fight on a regular basis.\tThe bombshell is that the NSA has developed programs that enabled "industrial-scale exploitation" of computer networks. The automated process, part of an initiative called "Owning the Net" allows the TAO to manage massive amounts of malware installs automatically.\tThe types of malware managed, or implants as they're called, range from general keylogging software, to malware that monitors a computer's camera or microphone, or malware designed to monitor network traffic and capture credentials.\tWorse, the malware itself is designed to bypass protections such as encryption, and the TAO operators have a high-degree of confidence that they'll get their mark when he\/she is selected.\t"If we can get the target to visit us in some sort of web browser, we can probably own them. The only limitation is the \u2018how'," one NSA analyst bragged in a document tagged as secret.\tSo does all of that sound like the NSA is running their own government sanctioned botnet? It should, because that's exactly what they do\tOn top of automated malware control, the NSA also reported co-opting 140,000 bots. So in addition to the endpoints they compromised themselves, the NSA will take the endpoints compromised by criminals too.\tA project called QUANTUMBOT takes control of idle IRC bots, and finds computers that belong to botnets in order to hijack them as well. According to the leaked documents, the project started in 2007, it's ongoing, and has been highly successful. [I wonder what the government salary is for a botmaster anyway?]\tAs always, the NSA maintains that these programs are used to monitor terrorists and extremists. However, according to one NSA presentation leaked by Snowden, that isn't entirely true:\t\t\tThe internal post \u2013 titled \u201cI hunt sys admins\u201d \u2013 makes clear that terrorists aren\u2019t the only targets of such NSA attacks. Compromising a systems administrator, the operative notes, makes it easier to get to other targets of interest, including any \u201cgovernment official that happens to be using the network some admin takes care of.\u201d\tThe irony here being that Edward Snowden was a Systems Admin for the NSA when he obtained the documents he later leaked.\tOops.\tThe full story is worth reading, as are the slides.