Preface When the Government, Telecommunications companies and Internet Service Providers, implant secret spying equipment in your home without your knowledge or consent under the guise of something else, then use that equipment to infect your computers and spy on your private network activity (not the internet), we believe you have a right to know. It is not possible to make these claims without actual proof and without naming the actual companies involved. These events coincide with the global surveillance systems recently disclosed and they further confirm the mass scale of the surveillance and how deeply entrenched the Governments are in our personal lives without our knowledge. The methods we disclose are a violation of security and trust. Good Information Security (InfoSec) dictates that when we discover such back doors and activity, we analyze, understand, publicize and fix/patch such security holes. Doing otherwise is morally wrong. What is revealed here is the missing piece to the global surveillance puzzle, that answers key InfoSec questions which include: How do the NSA/GCHQ perform Computer Network Exploitation? We reveal the actual methods used by the NSA/GCHQ and others that allows them to instantly peer into your personal effects without regard for your privacy, without your knowledge and without legal due process of law, thus violating your Human Rights, simply because they can. Disclosures The risks taken when such activity is undertaken is "Being Discovered" and the activity being "Publicly Exposed", as well as the "Loss of Capability". ▶Anonymous 06/21/16 (Tue) 12:19:43 09d44b No.6407074 >>6407070 6 Uncovered ­ //NONSA//NOGCHQ//NOGOV - CC BY-ND Source of this Information "The simple knowledge that we may be clandestinely observed in our own homes provided the determination to find the truth, which we did." This information is not the result of any knowledge of classified documents or leaks, but based on information in the public domain and our own fact finding mission due to Forensic and Network Analysis Investigations of private SOHO networks located in the UK. As we detail the methods used, you will see that information was uncovered fairly, honestly and legally and on private property using privately owned equipment. Our Laws There is no law that we are aware of that grants to the UK Government the ability to install dual use surveillance technology in millions of homes and businesses in the UK. Furthermore, there is no law we are aware of that further grant the UK Government the ability to use such technology to spy on individuals, families in their own homes on the mass scale that this system is deployed. If there are such hidden laws, the citizens of the UK are certainly unaware of them and should be warned that such laws exist and that such activity is being engaged in by their own Government. All of the evidence presented is fully reproducible. It is our belief that this activity is NOT limited to the UK. ▶Anonymous 06/21/16 (Tue) 12:19:59 09d44b No.6407077>>6407080 7 Uncovered ­ //NONSA//NOGCHQ//NOGOV - CC BY-ND Companies BT are directly responsible for covertly embedding secret spy equipment in millions of homes and businesses within the UK as our evidence will demonstrate. BT have directly enabled Computer Network Exploitation (CNE) of all its home and business customers. Technical Nature of this Information The information described here is technical, this is because, in order to subvert technology, the attackers need to be able to fool and confuse experts in the field and keep them busy slowing them down, but regardless, the impact and effect can be understood by everybody. Your main take away from this disclosure is to understand conceptually how these attacks work, you can then put security measures in place to prevent such attacks. ▶Anonymous 06/21/16 (Tue) 12:20:22 09d44b No.6407080>>6407086 >>6407077 8 Uncovered ­ //NONSA//NOGCHQ//NOGOV - CC BY-ND Credibility of this Research We first made our discoveries in June 2013 and kept silent so that we could research the capabilities without being detected. As more Edward Snowden disclosures were published it became crystal clear that what we discovered is a major component of the surveillance system. Those who wish to discredit our evidence, feel free to do so, but do so on a technical level, simply claiming it "it's not true" or performing some social attack simply re-enforces it and identifies the "discreditor" as an agent of the NSA/GCHQ or an agent of the global surveillance system. Our evidence is based on public available UNMODIFIED firmware images. To verify our claims using UNMODIFIED images requires connecting a USB to serial port to the modem motherboard board which allows you to login (admin/admin) and verify yourself. As most people will find this difficult, we provided a link to third party MODIFIED images based on official BT release GNU source code that allow you to telnet to the device (192.168.1.1), this modified version includes the same backdoor. These can be found here: http://huaweihg612hacking.wordpress.com/ and http://hackingecibfocusv2fubirevb.wordpress.com/ The MODIFIED images have been publicly available since August, 2012, long before the Edward Snowden disclosures. The methods we published, allows confirmation without having to open the device. However if you are suspicious of the MODIFIED firmware from August 2012, simply connect to the USB serial port of your own existing unmodified modem and login to verify, either way the results will be the same. ▶Anonymous 06/21/16 (Tue) 12:20:25 dd24c2 No.6407082>>6407087 the