PDA

View Full Version : Catalog Reveals NSA Has Back Doors for Numerous Devices.




DamianTV
12-30-2013, 03:58 PM
http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html


Editor's note: This article accompanies our main feature story on the NSA's Tailored Access Operations unit. You can read it here (http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html).

When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online PR copy, the company's products are "ideal" for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class." Despite these assurances, though, there is one attacker none of these products can fend off -- the United States' National Security Agency.

Specialists at the intelligence organization succeeded years ago in penetrating the company's digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.

A 50-Page Catalog

These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them.

This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000.

In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive "across reboots and software upgrades." In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH "has been deployed on many target platforms."

Master Carpenters

The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet.

Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.

'Persistence'

The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on.

This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access.

Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of the latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.

Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are "remotely installable" -- in other words, over the Internet. Others require a direct attack on an end-user device -- an "interdiction," as it is known in NSA jargon -- in order to install malware or bugging equipment.

There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. "Cisco does not work with any government to modify our equipment, nor to implement any so-called security 'back doors' in our products," the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company "respects and complies with the laws of all countries in which it operates."

Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it's not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be "pursued for a future release."

HOLLYWOOD
12-30-2013, 04:07 PM
Whata 'WHITE TAMALE'... ;)


Ben Swann covered this yesterday: http://benswann.com/nsas-spy-gear-ant-is-a-secret-weapon-that-hacks-electronics-worldwide/

Just think of it... your tax dollars are buying USB "Spy Port HW" at $20,000 a pop... that and all the "Activ Spoofing" ...some very wealthy individuals out there, beside the violations of the US Constitution.


From Samsung smartphones to Dell computers, Americans are being tracked by the NSA via electronic spy gear. Last week Snowden warned (http://benswann.com/video-edward-snowden-sends-christmas-day-message/#ixzz2otZrCV00) Americans in a Christmas message that big brother is watching. “We have sensors in our pockets that track us everywhere we go,” he said. Now Snowden has leaked the document that proves his claim.
One of the documents Snowden has reportedly leaked is a product catalog for spies and hackers at the NSA.
http://benswann.com/wp-content/uploads/2013/12/nsa-can-access-smartphone-data.jpg (http://benswann.com/wp-content/uploads/2013/12/nsa-can-access-smartphone-data.jpg)According to SPIEGEL (http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html), “a product catalog reveals that an NSA division called ANT (Access Network Technology) has burrowed its way into nearly all the security architecture made by the major players in the industry — including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.”
The article claims that ANT specialists at the NSA’s department for Tailored Access Operations (http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html) can remotely access, monitor, and manipulate data in electronics around the world. Electronic devices that cannot be attacked via the internet are intercepted and manually bugged. In some cases, the NSA actually intercepts packages (http://gizmodo.com/the-nsa-actually-intercepted-packages-to-put-backdoors-1491169592?utm_campaign=socialflow_gizmodo_faceboo k&utm_source=gizmodo_facebook&utm_medium=socialflow) to put “backdoors” in electronics.
SPIEGEL explains, “These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives — from computing centers to individual computers, from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA’s specialists seem already to have gotten past them.”

ANT specialists can choose spy gear from a 50-page catalog to assist them in spying operations.
Some of the listed items are:


Rigged monitor cable – $30 – Allows “TAO personnel to see what is displayed on the targeted monitor.
GSM base station – $40,000 – Mimics mobile phone tower and allows cell phone monitoring.
Computer bugging devices (50 pack) - $1 million – Disguised as normal USB plugs, it is capable of sending and receiving data via radio undetected.

SPIEGEL states that these American technology companies are not aware that the NSA has hacked their systems.
“Cisco does not work with any government to modify our equipment, nor to implement any so-called security ‘back doors’ in our products,” the company said in a statement.

Last week, Ben Swann, reported that U.S. District Judge William H. Pauley III ruled it was legal for the NSA to collect bulk meta-data (http://benswann.com/federal-judge-rules-nsa-spying-is-legal-strange-ruling-cites-emotion-sept-11-and-edward-snowden-spawning-mischief/) of American’s phone records.
“One could argue that the ruling by a Federal Judge that the NSA spying program is legal was not only a horrible ruling, but based on his personal view and not grounded at all in law,” Swann said (http://benswann.com/federal-judge-rules-nsa-spying-is-legal-strange-ruling-cites-emotion-sept-11-and-edward-snowden-spawning-mischief/).
The lawsuit argues that the phone surveillance program violates both the First Amendment rights of free speech and association, and the Fourth Amendment’s protections against unreasonable searches and seizures. At least three other lawsuits challenging bulk data collection are pending in other federal courts. Attorney Brett Max Kaufman said the ACLU will appeal Friday’s ruling. (http://reason.com/24-7/2013/12/27/aclu-to-appeal-ruling-that-nsa-telephone)
The newly leaked documents are striking, though. As the NSA revelations keep on coming, it could provide more evidence for civil liberty lawsuits.





It's been out for over a day on all the secondary and foreign reporting systems... ZERO COVERAGE on ANT by the corporatist Infotainment TV channels; ABC, CBS, CNN, FOX NEWS, MSNBC, NBC, Al JaStrokeOff.

aGameOfThrones
12-30-2013, 04:19 PM
NSA can hack WiFi devices from eight miles away (video)


The NSA may have the ability to intercept data from around the world, but we now know that it has some impressive (and intimidating) equipment for snooping on nearby targets. Security guru Jacob Appelbaum told those at the Chaos Communications Congress this weekend that the NSA's big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The Linux-powered device can exploit Windows systems from up to eight miles away; it's unlikely that you'll catch agents wardriving in the parking lot. Nightstand may not see significant use today given that it dates back to 2008, but its existence suggests that the NSA also has newer, more advanced WiFi surveillance gear at its disposal.

http://www.engadget.com/2013/12/30/nsa-can-hack-wifi-devices-from-eight-miles-away/



http://www.youtube.com/watch?v=b0w36GAyZIA

DamianTV
12-30-2013, 05:43 PM
And what will the Real Terrorists do in order to overcome all this Technologically Enabled Spying? Stop using Technology as a means of Communication.

NSA continues shooting themselves in their own foot.

aGameOfThrones
12-30-2013, 05:45 PM
This is what the "terrorist" are doing...


http://9thcivic.com/gallery/albums/post/popcorn.gif

HOLLYWOOD
12-30-2013, 05:52 PM
http://www.youtube.com/watch?v=b0w36GAyZIA

US/UK governments have become so radical and extremists, that they are attempting their menacing movement of the 'goal posts' all the way, by converting real journalism into not only crime/espionage, but into actual TERRORISM.

Here's your moment of Zen...
That speech at the conference by Wikileaks worker, Sarah Harrison says it all, " ...the UK government has defined, "the disclosure of classified documents with the intent of influencing government behavior, as TERRORISM."

There you go... UK government are your Nazis of the new era... Always remember, Internal/National Security is the age old cry of the oppressors.

There's your 'Holy Shit' story of the day.