Lindaland
  Global Unity 2.0
  NSA Intercepts Laptop Purchases To Install Malware!

Post New Topic  Post A Reply
profile | register | preferences | faq

UBBFriend: Email This Page to Someone! next newest topic | next oldest topic
Author Topic:   NSA Intercepts Laptop Purchases To Install Malware!
Randall
Webmaster

Posts: 35829
From: Saturn next to Charmainec
Registered: Apr 2009

posted December 29, 2013 01:41 PM     Click Here to See the Profile for Randall     Edit/Delete Message   Reply w/Quote
According to a new report from Der Spiegel based on internal NSA documents, the signals intelligence agency's elite hacking unit (TAO) is able to conduct sophisticated wiretaps in ways that make Hollywood fantasy look more like reality. The report indicates that the NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories in order to implant bugs before they reach their destinations. According to Der Spiegel, the NSA's TAO group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load malware onto the electronics or install malicious hardware that can give US intelligence agencies remote access.

While the report does not indicate the scope of the program, or who the NSA is targeting with such wiretaps, it's a unique look at the agency's collaborative efforts with the broader intelligence community to gain hard access to communications equipment. One of the products the NSA appears to use to compromise target electronics is codenamed COTTONMOUTH, and has been available since 2009; it's a USB "hardware implant" that secretly provides the NSA with remote access to the compromised machine.

This tool, among others, is available to NSA agents through what Der Spiegel describes as a mail-order spy catalog. The report indicates that the catalog offers backdoors into the hardware and software of the most prominent technology makers, including Cisco, Juniper Networks, Dell, Seagate, Western Digital, Maxtor, Samsung, and Huawei. Many of the targets are American companies. The report indicates that the NSA can even exploit error reports from Microsoft's Windows operating system; by intercepting the error reports and determining what's wrong with a target's computer, the NSA can then attack it with Trojans or other malware.

In response to Der Spiegel's report, Cisco senior vice president John Stewart wrote that "we are deeply concerned with anything that may impact the integrity of our products or our customers' networks," and that the company does "not work with any government to weaken our products for exploitation." Other US companies have fired back against reports of NSA tampering in recent months, including Microsoft, which labeled the agency an "advanced persistent threat" over its efforts to secretly collect private user data within the internal networks of Google and Yahoo.

"Sometimes the NSA hops on an FBI jet for high-tech raids"

The Der Spiegel report, which gives a broad look at TAO operations, also highlights the NSA's cooperation with other intelligence agencies to conduct Hollywood-style raids. Unlike most of the NSA's operations which allow for remote access to targets, Der Spiegel notes that the TAO's programs often require physical access to targets. To gain physical access, the NSA reportedly works with the CIA and FBI on sensitive missions that sometimes include flying NSA agents on FBI jets to plant wiretaps. "This gets them to their destination at the right time and can help them to disappear again undetected after even as little as a half hour's work," the report notes.

The NSA currently faces pressure from the public, Congress, federal courts, and privacy advocates over its expansive spying programs. Those programs, which include bulk telephone surveillance of American citizens, are said by critics to violate constitutional protections against unreasonable searches, and were uncovered earlier this year by whistleblower Edward Snowden. Beyond the programs that scoop up data on American citizens, Snowden's documents have also given a much closer look at how the spy agency conducts other surveillance operations, including tapping the phones of high-level foreign leaders.
http://www.theverge.com/2013/12/29/5253226/nsa-cia-fbi-laptop-usb-plant-spy

IP: Logged

juniperb
Moderator

Posts: 7856
From: Blue Star Kachina
Registered: Apr 2009

posted December 29, 2013 05:07 PM     Click Here to See the Profile for juniperb     Edit/Delete Message   Reply w/Quote
quote:
According to Der Spiegel, the NSA's TAO group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load malware onto the electronics or install malicious hardware that can give US intelligence agencies remote access.

Geez, hope us common folks arn`t a target. I would not like them reading my notes to myself

------------------
Christian, Jew, Muslim, Shaman, Zoroastrian, stone, ground, mountain, river, each has a secret way of being with the Mystery, unique and not to be judged.
Rumi

IP: Logged

Catalina
Knowflake

Posts: 1051
From: shamballa
Registered: Aug 2013

posted December 31, 2013 11:17 AM     Click Here to See the Profile for Catalina     Edit/Delete Message   Reply w/Quote
Hardly seems necessary since all devices have cameras (doubling as monitors) already? And lotsa people seem happy to subscribe to remote home security too. Sounds a little creative to me...

IP: Logged

Randall
Webmaster

Posts: 35829
From: Saturn next to Charmainec
Registered: Apr 2009

posted January 01, 2014 10:12 PM     Click Here to See the Profile for Randall     Edit/Delete Message   Reply w/Quote
The biggest producer of malware is the US government.

IP: Logged

All times are Eastern Standard Time

next newest topic | next oldest topic

Administrative Options: Close Topic | Archive/Move | Delete Topic
Post New Topic  Post A Reply
Hop to:

Contact Us | Linda-Goodman.com

Copyright 2000-2014

Powered by Infopop www.infopop.com © 2000
Ultimate Bulletin Board 5.46a