Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Report: NSA intercepts computer deliveries to plant spyware
PC World ^ | 12/29/13 | Jeremy Kirk

Posted on 12/30/2013 3:21:36 AM PST by SoFloFreeper

A special hacking unit of the U.S. National Security Agency intercepts deliveries of new computer equipment en route to plant spyware, according to a report on Sunday from Der Spiegel, a German publication.

The method, called “interdiction,” is one of the most successful operations conducted by the NSA’s Office of Tailored Access Operations (TAO), which specializes in infiltrating computers, wrote the publication, citing a top-secret document.

”If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops,” Der Spiegel wrote.

(Excerpt) Read more at pcworld.com ...


TOPICS: Constitution/Conservatism; Government; News/Current Events; Politics/Elections
KEYWORDS: nsa; nsalaptops; nsaspying; obama; privacy
Navigation: use the links below to view more comments.
first 1-2021-39 next last
A "target" person might include a Ted Cruz contributor, a Tea Party member, a conservative Republican or someone who watches Duck Dynasty.

Muslim extremists, predators, liberals are to be left alone.

1 posted on 12/30/2013 3:21:36 AM PST by SoFloFreeper
[ Post Reply | Private Reply | View Replies]

To: SoFloFreeper

I’m afraid you are right....sadly.


2 posted on 12/30/2013 3:31:17 AM PST by Halgr (Once a Marine, always a Marine - Semper Fi)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SoFloFreeper

This just validates my standard practice of building my own computers.


3 posted on 12/30/2013 3:31:44 AM PST by markomalley (Nothing emboldens the wicked so greatly as the lack of courage on the part of the good -- Leo XIII)
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

Do you perform a LLF on the hard drive from a perfectly clean known good PC? Are you really sure? I could see them infiltrating large suppliers so as to trawl this industry too. Lord knows they have arseloads of money to throw at resources to do this.


4 posted on 12/30/2013 3:37:09 AM PST by jurroppi1
[ Post Reply | Private Reply | To 3 | View Replies]

To: jurroppi1

This stuff is most likely on the BIOS - Look up Lo-jack for PC’s to get an idea of what can be done.


5 posted on 12/30/2013 3:40:35 AM PST by NY.SS-Bar9 (Those that vote for a living outnumber those that work for one.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: jurroppi1

Next up...infiltrating local computer fix stores.


6 posted on 12/30/2013 3:42:26 AM PST by spokeshave (OMG.......Schadenfreude overload is not covered under Obamacare :-()
[ Post Reply | Private Reply | To 4 | View Replies]

To: markomalley

How about your own routers, access points and NICs? That’s where the most successful hacking occurs.


7 posted on 12/30/2013 3:44:36 AM PST by Justa
[ Post Reply | Private Reply | To 3 | View Replies]

To: NY.SS-Bar9

Many of the main OSes have back doors written into them, which has been all but directly admitted to by the manufacturers.

I wouldn’t doubt that all of the routers and cable modems also have them.


8 posted on 12/30/2013 3:49:13 AM PST by jurroppi1
[ Post Reply | Private Reply | To 5 | View Replies]

To: jurroppi1
Do you perform a LLF on the hard drive from a perfectly clean known good PC?

Sort of. I always repartition a new hard drive and LLF the partition where the OS is loaded...not for paranoia reasons, but to make sure that I don't have any bad sectors from the get-go. And that from a live distro on an optical disk.

Having said that, there are any number of things that could happen...they could hack the firmware on any board with a processor, and so on...but I was talking about the subject of this article (specific PCs being targeted with specific software).

9 posted on 12/30/2013 3:49:35 AM PST by markomalley (Nothing emboldens the wicked so greatly as the lack of courage on the part of the good -- Leo XIII)
[ Post Reply | Private Reply | To 4 | View Replies]

To: SoFloFreeper
All you got to do is walk into Best Buy, swipe your credit card, and walk out with your new Dell laptop, router, or switch. Or does the NSA infect every single chip sold? If they do, how do they analyze all the data? How do they even get the data? The whole Internet would be saturated if they were monitoring everyone.
10 posted on 12/30/2013 3:56:09 AM PST by Steely Tom (If the Constitution can be a living document, I guess a corporation can be a person.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Steely Tom

I would bet there are back doors in Windows/Mac software.

Or even back doors in the BIOS chips.

The NSA just needs to activate the ones they want access to.

Intercepting the computer delivery sounds like way too much work, and it would involve too many other people.


11 posted on 12/30/2013 4:01:55 AM PST by ltc8k6
[ Post Reply | Private Reply | To 10 | View Replies]

To: markomalley

If its on a computer it is most likely not 100% secure. Not from criminals or the NSA.


12 posted on 12/30/2013 4:03:14 AM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Steely Tom

“If they do, how do they analyze all the data? How do they even get the data? The whole Internet would be saturated if they were monitoring everyone.”

It used to seem impossible for phone calls, yet the capture it all.

All the NSA has succeeded in doing is to destroy the US high-tech industry.

I wouldn’t do business with a US company if I had something confidential or trade secrets.

The US is completely compromised in every way.


13 posted on 12/30/2013 4:03:17 AM PST by RFEngineer
[ Post Reply | Private Reply | To 10 | View Replies]

To: Steely Tom

How do they get the data? They have direct links to the major internet providers.

How do they analyze the data? They are have built and are building huge data centers to house the thousands of servers needed to store and analyze the data.


14 posted on 12/30/2013 4:04:50 AM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: jurroppi1
Do you perform a LLF on the hard drive from a perfectly clean known good PC?

You can't really do a true low-level format on a modern hard drive with consumer equipment.
15 posted on 12/30/2013 4:14:26 AM PST by Dr. Sivana (There's no salvation in politics.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Dr. Sivana
You can't really do a true low-level format on a modern hard drive with consumer equipment.

True that. You can't do a low-level format outside of the manufacturer's facility. Anything could be hidden in a modern hard drive, there is a whole other computer there busy running the drive and whatever else...

16 posted on 12/30/2013 4:20:49 AM PST by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: ltc8k6; RFEngineer; driftdiver
I would bet there are back doors in Windows/Mac software.

And no one at Microsoft or Apple has ever spilled the beans. Riight.

It used to seem impossible for phone calls, yet the capture it all.

They don't "capture it all." The capture - at most - all the metadata. Time of call, number called from, number called to, maybe GPS coordinates if that feature happens to be enabled on the caller's phone.

I'm not saying that's innocuous, by the way. I think it's part of a creeping police state. But they are not capturing voice data, at least not according to their court testimony.

How do they get the data? They have direct links to the major internet providers.

How do they analyze the data? They are have built and are building huge data centers to house the thousands of servers needed to store and analyze the data.

And no one has talked about the installation and maintenance of these direct links? Wired, CNET, BuzzFeed, Slashdot, Gizmodo, TechCrunch, Ars Technica, The Register, any of the hacking sites, all are clueless or have dummied up, no one has blabbed to any of them.

Ed Snowden walked out of his NSA job site with gigabytes of classified information, but nothing about ubiquitous chip-level, bios-level infiltration has made it into the tech blog world?

Doubtful.

I'm not saying they won't try it, but how do they keep it secret? And if it's not secret, how effective is it?

17 posted on 12/30/2013 4:28:28 AM PST by Steely Tom (If the Constitution can be a living document, I guess a corporation can be a person.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: SoFloFreeper
The NSA did a bang up job stopping the Boston Bombers who were all over the internet./S
It's not about stopping anything accept perceived Republican political enemies.
18 posted on 12/30/2013 4:35:51 AM PST by MaxMax (Pay Attention and you'll be pissed off too! FIRE BOEHNER, NOW!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Steely Tom
I would bet there are back doors in Windows/Mac software.
And no one at Microsoft or Apple has ever spilled the beans. Riight.
Beans have been plenty spilled on this for the past 15 years. See _NSAKEY for a comprehensive treatment.

I was working at a major CS research lab in the '90s and was asked if I wanted to work on something called "Carnivore". This was a project to suck up all the data at the big switches for the internet and forward it to No Such Agency. Serious business.

19 posted on 12/30/2013 4:38:40 AM PST by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Mycroft Holmes

I remember Carnivore.

I’m not saying they haven’t tried anything, and I’m not even saying they haven’t done some of it.

But keeping it all a secret? I find that hard to believe.

Encryption software is inexpensive and widely available. It takes a lot of CPU cycles to decrypt a 1024-bit encrypted message. Yes, I know NSA has a lot of bandwidth, but decrypting anything more than a tiny sliver of all the traffic on the internet? Again, hard to believe.

Here’s another angle. If everyone’s computers are hacked, there must be millions of computers owned by the banking, securities, and retailing industries. Where’s the widespread hacking of the financial system? I doubt that the NSA can keep it’s own house when it comes to weeding out employees that would take advantage of that kind of access if they had it.

It only takes one penetration incident to blow their cover.

And I know about the Target case. There’s a few of those every year, often around the Christmas holidays. I’m talking about penetration of Morgan Stanley or Solomon Brothers, Citibank, or Chase Manhattan. Hundreds of billions missing.


20 posted on 12/30/2013 4:50:28 AM PST by Steely Tom (If the Constitution can be a living document, I guess a corporation can be a person.)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-39 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson