Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The NSA's 50-Page Catalog Of Back Door Penetration Techniques Revealed
zero hedge ^ | 12/29/13 | Tyler Durden

Posted on 12/29/2013 5:36:47 PM PST by Nachum

While the world may have become habituated to (and perhaps revels in, thank you social media exhibitionist culture) the fact that the NSA is watching anyone and everyone, intercepting, recording, and hacking every electronic exchange regardless if it involves foreign "terrorists" or US housewives, the discoveries from the Snowden whistleblowing campaign continue. The latest revelation from the biggest wholesale spying scandal since Nixon, exposed by Germany's Spiegel which continues the strategy of revealing Snowden leaks on a staggered, delayed basis, involves a back door access-focused NSA division called ANT, (which supposedly stands for Access Network Technology), described by Spiegel as "master carpenters" for the NSA's TAO (Tailored Access Operations, read more about TAO here). The ANT people have "burrowed into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell." More importantly, thanks to Spiegel (and Snowden of course), the NSA's 50-page catalog of "backdoor penetration" techniques has been revealed.

The details of how the NSA can surmount any "erected" walls, via Spiegel:

These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them.

This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for

(Excerpt) Read more at zerohedge.com ...


TOPICS: Business/Economy; Constitution/Conservatism; Crime/Corruption; Government; News/Current Events
KEYWORDS: catalog; nsas; penetration; techniques
Navigation: use the links below to view more comments.
first 1-2021-4041-53 next last
All of which got Barack reeeaaally excited.
1 posted on 12/29/2013 5:36:47 PM PST by Nachum
[ Post Reply | Private Reply | View Replies]

To: Jet Jaguar; NorwegianViking; ExTexasRedhead; HollyB; FromLori; EricTheRed_VocalMinority; ...

The list, Ping

Let me know if you would like to be on or off the ping list

http://www.nachumlist.com/


2 posted on 12/29/2013 5:37:14 PM PST by Nachum (Obamacare: It's. The. Flaw.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

Reggie too.


3 posted on 12/29/2013 5:38:47 PM PST by Antihero101607
[ Post Reply | Private Reply | To 1 | View Replies]

To: Antihero101607

4 posted on 12/29/2013 5:40:15 PM PST by ClearCase_guy
[ Post Reply | Private Reply | To 3 | View Replies]

To: Nachum

Back door penetration? I thought this was a family-friendly site.


5 posted on 12/29/2013 5:41:45 PM PST by Hoodat (Democrats - Opposing Equal Protection since 1828)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

6 posted on 12/29/2013 5:43:44 PM PST by BenLurkin (This is not a statement of fact. It is either opinion or satire; or both.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

It will take a President that really cares about America and its people to clean the stain called Obama.


7 posted on 12/29/2013 5:46:27 PM PST by jeffc (The U.S. media are our enemy)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BenLurkin; Nachum

That’s just icky.

Poor Nachum.


8 posted on 12/29/2013 5:46:32 PM PST by ROCKLOBSTER (Celebrate "Republicans Freed the Slaves" Month.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Nachum

9 posted on 12/29/2013 5:49:09 PM PST by TigersEye (Stupid is a Progressive disease.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

When will all the you-know-whos at NPR and the other networks come out?


10 posted on 12/29/2013 5:49:59 PM PST by golux
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum
These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives

They're just watching out for all of us to make us safe.

11 posted on 12/29/2013 5:50:01 PM PST by dragnet2
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum
Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.

These guys are seriously overpaying for this stuff!

I made a few 4gb thumb drives that had an extra 4gb of hidden storage and used a cheap crystal oscillator in the VHF region to transmit data. These cost less than 20 dollars each.(this was just an academic exercise) Adding receiver function would have cost an extra 20 or so. A tiny custom SDR (software defined radio) IC would be the proper way to do this and is certainly what NSA does. You can buy a small SDR board for 10 dollars but it's too big to shoehorn into many items, a custom IC would be better.

The real advantage NSA has is they get to use the huge NRO satellites in geo orbit to pick up the weak signals from such devices. Less well-heeled operators need to set up shop close to their targets, and that's a pain.

You must keep in mind that if an incredibly weak rf signal has a slow data rate then it can be reliably read even if it's signal is well below the noise floor...even amateur radio operators can do this now using a PC with the proper software and their radio gear.

I have been warning people for years about firmware tampering on hard drives and other devices. Some drives can update the firmware by simply placing a properly named file in the root directory. i.e. something like updatefw.dat some require access to connections on the HD's controller board and still others need you to run an updating program from the PC.

Name a computer peripheral and there is usually a way to tamper with its firmware code. USB thumb drives, SD cards, drive controllers, external HD's, wifi dongles..etc all of these have a controller on board (tiny computer on-a-chip) that has it's own program running (called its firmware) and all these can be altered.

12 posted on 12/29/2013 5:50:25 PM PST by Bobalu (The true secret to genius is in creativity, not in technical mechanics)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum
Here was my immediate thought based on the headline.
13 posted on 12/29/2013 5:51:14 PM PST by SERKIT ("Blazing Saddles" explains it all.......)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigersEye

That’s downright creepy.


14 posted on 12/29/2013 5:52:09 PM PST by usconservative (When The Ballot Box No Longer Counts, The Ammunition Box Does. (What's In Your Ammo Box?))
[ Post Reply | Private Reply | To 9 | View Replies]

To: Nachum

Apparently we’ve got some pretty smart techies @ the NSA but,

when you consider the combined youth populations of China and India I have heard by numbers alone there will be over 20 times as many gifted kids there as here.

The concern may not be what the NSA can do today but what others will do in the future

I also trust our response to the perceived evils of the NSA will be to bridle ourselves so the competition can catch up


15 posted on 12/29/2013 5:55:28 PM PST by jcon40
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

Ping for later.


16 posted on 12/29/2013 5:57:39 PM PST by NewHampshireDuo
[ Post Reply | Private Reply | To 1 | View Replies]

To: ClearCase_guy

That was 0vomit’s favorite technique!


17 posted on 12/29/2013 5:58:53 PM PST by sheik yerbouty ( Make America and the world a jihad free zone!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Nachum
"Government is not reason, it is not eloquence, it is force;
like fire, a troublesome servant and a fearful master." - George Washington

And that is why we have to limit the government's authority and tools. An unpatriotic leader will certainly use them against the people.

18 posted on 12/29/2013 5:59:41 PM PST by oldbrowser (Constitutional republic > new age feel good free range constitutional kakistocracy)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

LOL! What a horribly written title.


19 posted on 12/29/2013 5:59:43 PM PST by andyk (I have sworn...eternal hostility against every form of tyranny over the mind of man.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bobalu

M4L when L really means L


20 posted on 12/29/2013 6:00:14 PM PST by Scrambler Bob ( Concerning bo -- that refers to the president. If I capitalize it, I mean the dog.)
[ Post Reply | Private Reply | To 12 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-53 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson