Jump to content

NSA has backdoors into numerous devices including those produced by Samsung, Dell, and Cisco

HexaGuy

According to Spiegel:  

Specialists at the intelligence organization succeeded years ago in penetrating the company's digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.

A 50-Page Catalog

These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them.

This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000.

In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive "across reboots and software upgrades." In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH "has been deployed on many target platforms."

 

Master Carpenters

The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet.

Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.

 What do you guys think?

 

Source: http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html

Sorry for the convoluted speech pattern.

Link to comment
Share on other sites

Link to post
Share on other sites

I think we are all f*cked.

Case: Corsair 460X RGB bby, CPU: I5 8600K, Motherboard: MSI B360M PRO-VDH, RAM: 8GB Hyper X 2400MHz , Graphics Card: GTX1060 6GB, PSU: Corsair RM750x,

Cooler: BEQuiet!  Pure Rock Slim SSD: Kingston 240GB, HDD: 2TB Seagate Barracuda

 

Link to comment
Share on other sites

Link to post
Share on other sites

Wow, why am I not surprised?

Personal Rig


i7 4790K | Asus Z97I-WiFi | CM 280L | Sapphire R9 290X Tri-X | Kingston ValueRAM 2 x 8GB | 128GB Samsung 840 Pro | 2TB Seagate SSHD | Seasonic Platinium 660W | Bitfenix Prodigy

Link to comment
Share on other sites

Link to post
Share on other sites

Said it before. Only a very small handful of people seem to care. The rest of the US is reporting on stupid crap like twerking or Duck Dynasty gay controversy instead of real issues that need serious attention.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Industrial espionage, courtesy of the NSA.

Intel i7 5820K (4.5 GHz) | MSI X99A MPower | 32 GB Kingston HyperX Fury 2666MHz | Asus RoG STRIX GTX 1080ti OC | Samsung 951 m.2 nVME 512GB | Crucial MX200 1000GB | Western Digital Caviar Black 2000GB | Noctua NH-D15 | Fractal Define R5 | Seasonic 860 Platinum | Logitech G910 | Sennheiser 599 | Blue Yeti | Logitech G502

 

Nikon D500 | Nikon 300mm f/4 PF  | Nikon 200-500 f/5.6 | Nikon 50mm f/1.8 | Tamron 70-210 f/4 VCII | Sigma 10-20 f/3.5 | Nikon 17-55 f/2.8 | Tamron 90mm F2.8 SP Di VC USD Macro | Neewer 750II

Link to comment
Share on other sites

Link to post
Share on other sites

The NSA can spy on me all they want, I work a boring job and lead a boring life, I wouldnt give a shit if I knew I was being watched 24/7

Link to comment
Share on other sites

Link to post
Share on other sites

stick with open sourced software then

dd-wrt/Tomato on your router  PFsense for businesses

format your phone and install an AOSP based android (CM for example)

if you have a laptop just reformat your OS thats what i do anyways because of the bloat  etc

 

try to never use centralized services (buy a raspberry pi and install arkOS to have your own server for mail etc)

 

 

 

wear thicker tin hat foil :P

If your grave doesn't say "rest in peace" on it You are automatically drafted into the skeleton war.

Link to comment
Share on other sites

Link to post
Share on other sites

We should create a sub forum just for talk about the NSA,

 

Otherwise soon half of the news will be about the NSA.

^^

This!

 

"AntiNSATechTips sub forum"

Motherboard - ASUS P6X58D-E Processor - Intel i7 930 Bloomfield OC'd @ 4.01Ghz, 1.28v | RAM - 12GB Corsair Dominator @ 8-8-8-12, 1600mhz | Graphics Card - EVGA Geforce GTX660 SC 3GB @ +75mhz core, +500mhz mem | Power Supply - Seasonic X650 Gold

CPU Cooler, Fans - Corsair H-90 w/ Noctua FN14 push/pull, Gelid Wings UV Blue  | Case - Fractal Design Arc MIDI R2 |

 

Link to comment
Share on other sites

Link to post
Share on other sites

stick with open sourced software then

dd-wrt/Tomato on your router  PFsense for businesses

format your phone and install an AOSP based android (CM for example)

if you have a laptop just reformat your OS thats what i do anyways because of the bloat  etc

 

try to never use centralized services (buy a raspberry pi and install arkOS to have your own server for mail etc)

 

 

 

wear thicker tin hat foil :P

You realize open source software is the easiest thing to hack since the source is out there. . .

Finally my Santa hat doesn't look out of place

Link to comment
Share on other sites

Link to post
Share on other sites

You realize open source software is the easiest thing to hack since the source is out there. . .

not exactly true

opensource is a double-edged sword

1.its hard/near impossible to "add" a back door (since it can be seen by anyone) and exploits can be fixed very quickly when found

2.hackers can find bad code and take advantage of it.

 

Pfsense is based of FreeBSD one of the most secure operating systems 

 

the idea is

are you willing to depend on a closed source software that governments can easily put back doors in?

there are many examples of this

If your grave doesn't say "rest in peace" on it You are automatically drafted into the skeleton war.

Link to comment
Share on other sites

Link to post
Share on other sites

When you think about it, the NSA is the new TSA. Hell, the TSA doesnt look half as bad when compared to the NSA.

Link to comment
Share on other sites

Link to post
Share on other sites

I don't care if they spy on me because I'm not doing anything illegal, and when I am, I make sure I leave no trails behind. Let them waste their time.

Mobo: Z97 MSI Gaming 7 / CPU: i5-4690k@4.5GHz 1.23v / GPU: EVGA GTX 1070 / RAM: 8GB DDR3 1600MHz@CL9 1.5v / PSU: Corsair CX500M / Case: NZXT 410 / Monitor: 1080p IPS Acer R240HY bidx

Link to comment
Share on other sites

Link to post
Share on other sites

I don't care if they spy on me because I'm not doing anything illegal, and when I am, I make sure I leave no trails behind. Let them waste their time.

 

It is impossible to leave no trace of your online behaviour.

Intel i7 5820K (4.5 GHz) | MSI X99A MPower | 32 GB Kingston HyperX Fury 2666MHz | Asus RoG STRIX GTX 1080ti OC | Samsung 951 m.2 nVME 512GB | Crucial MX200 1000GB | Western Digital Caviar Black 2000GB | Noctua NH-D15 | Fractal Define R5 | Seasonic 860 Platinum | Logitech G910 | Sennheiser 599 | Blue Yeti | Logitech G502

 

Nikon D500 | Nikon 300mm f/4 PF  | Nikon 200-500 f/5.6 | Nikon 50mm f/1.8 | Tamron 70-210 f/4 VCII | Sigma 10-20 f/3.5 | Nikon 17-55 f/2.8 | Tamron 90mm F2.8 SP Di VC USD Macro | Neewer 750II

Link to comment
Share on other sites

Link to post
Share on other sites

Put tin foil hats on your tin foil hats, we need level 2 protection

cpu: intel i5 4670k @ 4.5ghz Ram: G skill ares 2x4gb 2166mhz cl10 Gpu: GTX 680 liquid cooled cpu cooler: Raijintek ereboss Mobo: gigabyte z87x ud5h psu: cm gx650 bronze Case: Zalman Z9 plus


Listen if you care.

Cpu: intel i7 4770k @ 4.2ghz Ram: G skill  ripjaws 2x4gb Gpu: nvidia gtx 970 cpu cooler: akasa venom voodoo Mobo: G1.Sniper Z6 Psu: XFX proseries 650w Case: Zalman H1

Link to comment
Share on other sites

Link to post
Share on other sites

no one worried about china doing the same thing? So many devices and components are manufactured there.

Link to comment
Share on other sites

Link to post
Share on other sites

So do people want our enemies that intend us harm (and there are many more then you think, don't ever kid yourself), to be able to hide behind code. Or would you like to be just a tad bit safer?

 

Do you think it might be important for the NSA to be able to gain access, and to monitor, say terrorist cells, Nation States that sponsor terrorism that are working actively to gain nuclear arms, Nation States that sponsor terrorism that have had and have used chemical weapons?

Link to comment
Share on other sites

Link to post
Share on other sites

WHY? WHY? WHY? WHY? WHY? WHY?

ヽ༼ຈل͜ຈ༽ノ raise your dongers ヽ༼ຈل͜ຈ༽ノ


It feels as though no games ever leave the BETA stage anymore, until about 3 years after it officially releases. - Shd0w2 2014

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×