Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ¤ IT Firms Lose Billions After NSA Scandal ::
- http://www.independent.co.uk/life-style/gadgets-and-tech/news/it-firms-lose-billions-after-nsa-scandal-exposed-by-whistleblower-edward-snowden-9028599.html
- ---------------------------------------
- ¤ Apple Claims They Know Nothing About Backdoors ::
- http://www.infowars.com/apple-says-it-knows-nothing-about-your-iphone-spying-on-you/
- ¤ Apple Inc. Lying Exposed ::
- Logs from a properly air-gapped Mac OSX show
- the system attempting to access the Airport -
- yet the Airport card was physically disconnected.
- http://pastebin.jity.de/view/f3610334
- ---------------------------------------
- ¤ Dell Inc. Apologizes for the ‘Inconvenience’
- of Helping NSA Install Backdoors ::
- http://www.techdirt.com/articles/20131230/17174425718/dells-twitter-account-apologizes-inconvenience-helping-nsa-place-hidden-bios-bug.shtml
- http://www.infowars.com/dells-twitter-account-apologizes-for-the-inconvenience-of-helping-nsa-install-spyware/
- ---------------------------------------
- ¤ Jacob Appelbaum Explains New NSA Leaks ::
- https://www.youtube.com/watch?v=b0w36GAyZIA
- Mirror » http://fileb.ag/xwcp0jrewk2o
- ¤ Jacob’s NSA Slides @ioerror (ZIP) ::
- http://cryptome.org/2013/12/nsa-catalog.zip
- ¤ Documents Reveal Top NSA Hacking Unit ::
- The NSA’s TAO hacking unit is considered
- to be the intelligence agency’s top secret
- weapon. It maintains its own covert network,
- infiltrates computers around the world and
- even intercepts shipping deliveries to plant
- back doors in electronics ordered by those
- it is targeting. ... ...
- http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html
- The insert method and other variants of
- QUANTUM are closely linked to a shadow
- network operated by the NSA alongside the
- Internet, with its own, well-hidden
- infrastructure comprised of “covert”
- routers and servers. It appears the NSA
- also incorporates routers and servers
- from non-NSA networks into its covert
- network by infecting these networks with
- “implants” that then allow the government
- hackers to control the computers remotely.
- In this way, the intelligence service seeks
- to identify and track its targets based on
- their digital footprints. These identifiers
- could include certain email addresses or
- website cookies set on a person’s computer.
- Of course, a cookie doesn’t automatically
- identify a person, but it can if it includes
- additional information like an email address.
- In that case, a cookie becomes something
- like the web equivalent of a fingerprint.
- ---------------------------------------
- ¤ NSA QUANTUM Theory (FOXACID) ::
- http://cryptome.org/2013/12/nsa-quantumtheory.pdf
- ¤ NSA/GCHQ QUANTUM Tasking Techniques ::
- “YahooBcookie’s are unique to a specific
- computer and can hold other <yahoo> addresses
- that are being logged into on that computer
- as long as the user does not clear browser
- cookies.”
- http://cryptome.org/2013/12/nsa-quantum-tasking.pdf
- ¤ NSA QFIRE Packet Injection Attacks ::
- http://cryptome.org/2013/12/nsa-qfire.pdf
- ---------------------------------------
- ¤ NSA Catalog for Hardware Backdoors ::
- The specialists at ANT, which presumably
- stands for Advanced or Access Network Technology,
- could be described as master carpenters for
- the NSA’s department for Tailored Access
- Operations (TAO). In cases where TAO’s usual
- hacking and data-skimming methods don’t suffice,
- ANT workers step in with their special tools,
- penetrating networking equipment, monitoring
- mobile phones and computers and diverting or
- even modifying data. Such implants, as they are
- referred to in NSA parlance, have played a
- considerable role in the intelligence agency’s
- ability to establish a global covert network
- that operates alongside the Internet.
- Some of the equipment available is quite
- inexpensive. A rigged monitor cable that
- allows “TAO personnel to see what is displayed
- on the targeted monitor,” for example, is
- available for just $30. But an “active GSM
- base station” -- a tool that makes it possible
- to mimic a mobile phone tower and thus monitor
- cell phones -- costs a full $40,000. Computer
- bugging devices disguised as normal USB plugs,
- capable of sending and receiving data via radio
- undetected, are available in packs of 50 for
- over $1 million.
- The ANT division doesn’t just manufacture
- surveillance hardware. It also develops software
- for special tasks. The ANT developers have a
- clear preference for planting their malicious
- code in so-called BIOS, software located on a
- computer’s motherboard that is the first thing
- to load when a computer is turned on.
- This has a number of valuable advantages: an
- infected PC or server appears to be functioning
- normally, so the infection remains invisible
- to virus protection and other security programs.
- And even if the hard drive of an infected
- computer has been completely erased and a new
- operating system is installed, the ANT malware
- can continue to function and ensures that new
- spyware can once again be loaded onto what is
- presumed to be a clean computer. The ANT
- developers call this “Persistence” and believe
- this approach has provided them with the
- possibility of permanent access.
- Another program attacks the firmware in
- hard drives manufactured by Western Digital,
- Seagate, Maxtor and Samsung, all of which,
- with the exception of latter, are American
- companies. Here, too, it appears the US
- intelligence agency is compromising the
- technology and products of American companies.
- http://cryptome.org/2013/12/nsa-tao-ant-pdf.pdf
- http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html
- http://gizmodo.com/the-nsa-actually-intercepted-packages-to-put-backdoors-1491169592
- http://www.theguardian.com/world/2013/dec/29/der-spiegel-nsa-hacking-unit-tao
- https://www.wsws.org/en/articles/2013/12/31/snow-d31.html
- ¤ NSA Cisco / Juniper Router Backdoors ::
- http://cryptome.org/2013/12/nsa-ant-firewalls.pdf
- http://cryptome.org/2013/12/nsa-ant-router.pdf
- ¤ NSA Computer Monitor Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-bildschirm.pdf
- ¤ NSA PCI Bus Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-rechner.pdf
- ¤ NSA Motherboard Backdoor (#BadBIOS) ::
- http://cryptome.org/2013/12/nsa-ant-server.pdf
- ¤ NSA Keyboard Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-tastatu.pdf
- ¤ NSA Apple iPhone Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-handys.pdf
- ¤ NSA WiFi Card / Apple Airport Backdoors ::
- http://cryptome.org/2013/12/nsa-ant-mobilfunk.pdf
- ¤ NSA Active 802.11 Netcard Backdoor ::
- http://cryptome.org/2013/12/nsa-ant-w-lan.pdf
- ¤ NSA USB Backdoor to Bridge Air-gaps ::
- http://cryptome.org/2013/12/nsa-ant-usb.pdf
- ¤ NSA Alternative SIGINT Hunter ::
- http://cryptome.org/2013/12/nsa-ant-raumuber.pdf
- ¤ NSA Keystroke, Screenshot & SIGINT Hunting ::
- http://cryptome.org/2013/12/greenwald-13-1231.pdf
- http://truth-out.org/news/item/20948-glenn-greenwald-the-nsa-can-literally-watch-every-keystroke-you-make
- _______________________________________
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement