+ Post New Thread
Results 1 to 6 of 6
IT News Thread, NSA Catalog of tools in Other News; Wow: How the NSA hacks PCs, phones, routers, hard disks 'at speed of light': Spy tech catalog leaks Ben...
  1. #1

    plexer's Avatar
    Join Date
    Dec 2005
    Location
    Norfolk
    Posts
    13,614
    Thank Post
    747
    Thanked 1,707 Times in 1,520 Posts
    Rep Power
    437

    NSA Catalog of tools


  2. #2


    Join Date
    Feb 2007
    Location
    51.403651, -0.515458
    Posts
    9,620
    Thank Post
    250
    Thanked 2,904 Times in 2,137 Posts
    Rep Power
    829
    I think I have watched too many Hollywood movies to be surprised by any of the devices in the NSAs catalogue. They are impressive from a technical perspective though.

    • NSA can hack WiFi devices from eight miles away « Engadget

      ... the NSA's big box of tools includes Nightstand, a custom device that can compromise WiFi networks for the sake of inserting spy software. The Linux-powered device can exploit Windows systems from up to eight miles away; it's unlikely that you'll catch agents wardriving in the parking lot. Nightstand may not see significant use today given that it dates back to 2008, but its existence suggests that the NSA also has newer, more advanced WiFi surveillance gear at its disposal.
    • NSA can reportedly bug computer equipment before it reaches buyers « Engadget

      The leak suggests that the targeted manufacturers aren't aware of what's happening; Cisco and other firms tell Spiegel they don't coordinate with the NSA. These hardware interceptions are also limited in scope next to remote surveillance programs. The agency isn't confirming any specifics, but it maintains that TAO is focused on exploiting foreign networks. Whether or not that's true, the discoveries show that the NSA's surveillance can reach the deepest levels of many networks.
    • Report: NSA Intercepting Laptops Ordered Online, Installing Spyware « Forbes

      The latest report, this time via Der Spiegel and based on internal NSA documents, reveals that the NSA, in conjunction with the CIA and FBI, has begun intercepting laptops purchased online in order to install (quite literal) spyware and even hardware on the machines. The NSA terms this “interdiction.” Agents divert shipments to secret warehouses, carefully open the packages, install the software and/or hardware, and send them on their way.
    • Inside TAO: Documents Reveal Top NSA Hacking Unit « Spiegel

      Once TAO teams have gathered sufficient data on their targets' habits, they can shift into attack mode, programming the QUANTUM systems to perform this work in a largely automated way. If a data packet featuring the email address or cookie of a target passes through a cable or router monitored by the NSA, the system sounds the alarm. It determines what website the target person is trying to access and then activates one of the intelligence service's covert servers, known by the codename FOXACID.

      This NSA server coerces the user into connecting to NSA covert systems rather than the intended sites. In the case of Belgacom engineers, instead of reaching the LinkedIn page they were actually trying to visit, they were also directed to FOXACID servers housed on NSA networks. Undetected by the user, the manipulated page transferred malware already custom tailored to match security holes on the target person's computer.

  3. #3
    XiJ
    XiJ is offline

    Join Date
    Mar 2013
    Location
    Sheffield
    Posts
    237
    Thank Post
    12
    Thanked 46 Times in 43 Posts
    Rep Power
    11
    I find this both highly exciting and impressive and utterly terrifying.

  4. #4

    Join Date
    Jan 2013
    Location
    Romford
    Posts
    177
    Thank Post
    61
    Thanked 34 Times in 27 Posts
    Rep Power
    9
    I watched the keynote and do agree with him on a certain point: how many terrorists ACTUALLY use Solaris? Scary the out comings of what was released, not surprised, but scared that this type of technology is in active use by none other than the government.

    Seems if you ever needed an excuse to move away from Yahoo!, this is a better reason than any.

  5. #5


    Join Date
    Feb 2007
    Location
    51.403651, -0.515458
    Posts
    9,620
    Thank Post
    250
    Thanked 2,904 Times in 2,137 Posts
    Rep Power
    829
    The following sounds very sci-fi.

    Your USB cable, the spy: Inside the NSA’s catalog of surveillance magic « Ars Technica

    The NSA also uses some fairly exotic tools to grab computer video, keyboard strokes, and even audio from inside more difficult-to-reach places by using passive electronic devices that are actually powered by radar. These devices, charged by a specially tuned continuous wave radio signal sent from a portable radar unit (operating at as little as 2W up to as much as 1kW of power in the 1-2GHz range), send back a data stream as a reflected signal, allowing the NSA’s operators to tune in and view what’s happening on a computer screen or even listen to what’s being said in the room as they paint the target with radio frequency energy—as well as giving a relative rough location of devices within a building for the purposes of tracking or targeting.
    NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware « Leak Source

    Some of the equipment available is quite inexpensive. A rigged monitor cable that allows “TAO personnel to see what is displayed on the targeted monitor,” for example, is available for just $30. But an “active GSM base station” — a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones — costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.

  6. #6


    Join Date
    Feb 2007
    Location
    51.403651, -0.515458
    Posts
    9,620
    Thank Post
    250
    Thanked 2,904 Times in 2,137 Posts
    Rep Power
    829
    I wonder if the NSA can do this?




SHARE:
+ Post New Thread

Similar Threads

  1. Replies: 2
    Last Post: 22nd February 2012, 03:19 AM
  2. Replies: 0
    Last Post: 13th February 2012, 03:34 PM
  3. Need a screen grab of Vista running IE7 tool bar
    By HodgeHi in forum Windows Vista
    Replies: 7
    Last Post: 28th October 2009, 01:12 AM
  4. Replies: 9
    Last Post: 24th October 2008, 07:34 PM
  5. Replies: 2
    Last Post: 30th June 2008, 02:10 PM

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •