Tue Dec 31, 2013, 01:39 PM
n2doc (44,678 posts)
Your USB cable, the spy: Inside the NSA’s catalog of surveillance magic
by Sean Gallagher
A diagram of an NSA BIOS-based attack, brought to you by sneakernet.
The National Security Agency’s sophisticated hacking operations go way beyond using software vulnerabilities to gain access to targeted systems. The agency has a catalog of tools available that would make James Bond’s Q jealous, providing NSA analysts access to just about every potential source of data about a target.
In some cases, the NSA has modified the firmware of computers and network hardware—including systems shipped by Cisco, Dell, Hewlett-Packard, Huawei, and Juniper Networks—to give its operators both eyes and ears inside the offices the agency has targeted. In others, the NSA has crafted custom BIOS exploits that can survive even the reinstallation of operating systems. And in still others, the NSA has built and deployed its own USB cables at target locations—complete with spy hardware and radio transceiver packed inside.
Documents provided by former NSA contractor Edward Snowden to Der Spiegel reveal a fantastical collection of surveillance tools dating back to 2007 and 2008 that gave the NSA the power to collect all sorts of data over long periods of time without detection. The tools, ranging from back doors installed in computer network firmware and software to passively powered bugs installed within equipment, give the NSA a persistent ability to monitor some targets with little risk of detection. While the systems targeted by some of the “products” listed in the documents are over five years old and are likely to have been replaced in some cases, the methods and technologies used by all the exploit products could easily still be in use in some form in ongoing NSA surveillance operations.
2 replies, 1170 views
Always highlight: 10 newest replies | Replies posted after I mark a forum
Replies to this discussion thread
Your USB cable, the spy: Inside the NSA’s catalog of surveillance magic (Original post)
Response to n2doc (Original post)
Tue Dec 31, 2013, 02:11 PM
friendly_iconoclast (13,841 posts)