This page has been archived and commenting is disabled.

The NSA's 50-Page Catalog Of Back Door Penetration Techniques Revealed

Tyler Durden's picture




 

While the world may have become habituated to (and perhaps revels in, thank you social media exhibitionist culture) the fact that the NSA is watching anyone and everyone, intercepting, recording, and hacking every electronic exchange regardless if it involves foreign "terrorists" or US housewives, the discoveries from the Snowden whistleblowing campaign continue. The latest revelation from the biggest wholesale spying scandal since Nixon, exposed by Germany's Spiegel which continues the strategy of revealing Snowden leaks on a staggered, delayed basis, involves a back door access-focused NSA division called ANT, (which supposedly stands for Access Network Technology), described by Spiegel as "master carpenters" for the NSA's TAO (Tailored Access Operations, read more about TAO here). The ANT people have "burrowed into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell." More importantly, thanks to Spiegel (and Snowden of course), the NSA's 50-page catalog of "backdoor penetration" techniques has been revealed.

The details of how the NSA can surmount any "erected" walls, via Spiegel:

These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them.

 

This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000.

Nothing quite like an extensive, taxpayer funded catalog listing back-door entry strategy imaginable. Say you wanted to have some backdoor fun with Juniper Networks, the world's second largest network equipment manufacturer (which claims the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class.")

In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive "across reboots and software upgrades." In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH "has been deployed on many target platforms."

It gets better, because when simple penetration is not enough, the NSA adds "implants."

In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet.

So what exactly is to be found in the 50-page catalog?

Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.

 

The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on.

 

This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access.

 

Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.

 

Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are "remotely installable" -- in other words, over the Internet. Others require a direct attack on an end-user device -- an "interdiction," as it is known in NSA jargon -- in order to install malware or bugging equipment.

The conclusion here is an easy one, and one we have repeated ever since before the Snowden revelations: Big Brother is bigger and badder than ever, he knows exactly what you've been doing, and the second the NSA wants to nuke your computer out of orbit and/or destroy your digital life, it can do so in a millisecond.  What is more amusing is that with each passing disclosure, it is increasingly clear that the NSA has gotten its inspiration for its dealings with the US public from a Danielle Steel book at best, or a Vivid Video bootlegged tape at worst.

 

- advertisements -

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
Sun, 12/29/2013 - 18:18 | 4283852 palmereldritch
palmereldritch's picture

Nice take by Webster Tarpley here on how to spot a Limited Hangout (@ ~ 19:30)...and yes Ed Snowden, he's talking about you...something to consider

http://www.youtube.com/watch?v=oEmbmfgbo_M&feature=youtu.be

http://www.youtube.com/watch?v=Aae_RHRptRg

Mon, 12/30/2013 - 22:25 | 4287191 MontgomeryScott
MontgomeryScott's picture

Tarpley's O.K., I suppose.

I have always thought of him as a crypto-socialist, however.

He is 'stuck in the molasses' of the training he recieved as a younger man in his 'edumacation', I have always believed. Check his 'higher education' for further understanding. Realize that Italy, when he was younger, was (and STILL IS) a Catholic socialist state. You see how well THEY are doing right now, don't you?

http://en.wikipedia.org/wiki/Webster_Tarpley

 

He has seen the totality of what those in the so-called west call 'free market capitalism' (actually, bankster-controlled totalitarianism, but who's looking, or even aware?). He's pretty 'smart' and 'well-informed', but lacks a spiritual 'rudder' (so to speak); in order to guide his statements (other than blatant communications of naked, hopeless reality).  He fails to realize the duplicity, and total complicity, of all other 'disciplines', as they are being used against the population of the Earth by their so-called 'masters', and as such, lacks the ability to critically analyze the information facets that he DOES know in the larger picture of what most would consider 'reality' (if they could or would hang up their I-phones and turn off their televisions and STOP letting OTHERS do their thinking for them).

The term 'stuck in the molasses' was first brought to my attention back in 1976, when I read about the sailors aboard the U.S.S. Eldritch that were subjected to massive timed attenuated EMP, in an experiment in 'practical invisibility', as recorded during 1944 in the Philadelphia Naval Yards. I read a BOOK, you see, that quoted interviews with several members of the crew. CRAZY SHIT, I think (like the H.A.A.R.P. 'experimental station' in Gakona, Alaska, or the Russian 'Woodpecker' stuff).

Tarpley is still trying to graduate from Third Grade.

Sun, 12/29/2013 - 18:14 | 4283854 Dollar Bill Hiccup
Dollar Bill Hiccup's picture

Go , Go N - S - A

Record my data feed today!

Goooo spooky, goooo spoooky

Yay!

Disclaimer : I give neither implicit nor explicit authority for the spooks to invalidate my 4th amendment rights.

Sun, 12/29/2013 - 18:34 | 4283904 bozzy
bozzy's picture

Get America out of our faces. Screw the state machine - you owe it to yourselves.

Fork and dangle for chrissakes, nothing else will do it.

Sun, 12/29/2013 - 18:36 | 4283916 kchrisc
kchrisc's picture

I feel "back door penetrated" alright. Right thru my Constitution and right into my Bill of Rights.

 

"Happiness is a warm head in a basket."

Sun, 12/29/2013 - 18:39 | 4283919 ThisIsBob
ThisIsBob's picture

I will mention again that it is no accident that Apple and other laptops permit remote access to the camera and microphone without the user's knowledge.

Sun, 12/29/2013 - 20:15 | 4284068 logicalman
logicalman's picture

You can do wonders, in this regard, with handy household items.

Small tab of masking tape over camera.

Tape with a layer of foil, a layer of tissue and another layer of tape over the mic.

Yes, I'm paranoid.

Yes, I know they are out to get anyone who steps too far out of line.

Cell phone? Are you fucking crazy. Pay someone to put a tracking device in your pocket??? WTF?

 

Sun, 12/29/2013 - 23:09 | 4284356 chemystical
chemystical's picture

By placing tape over the lens, you are assuming that the only signal is visible light, while the fact of the matter is that IR and other regions are impinging on it.  The missing piece is the translator, and I wouldn't assume anything about what's in your laptop's camera.    (P.S. the translator needn't be in your laptop.  In fact it would make little sense to put it there.  A record of the signals is the only thing that anyone needs, then the remaining activity is remote)

Foil, tissue, and tape will dampen but will not eliminate the 20-20kHz 'audible' portions of of your speech.  Don't assume that when you talk to your wife the only signal you emit is in the ~ 20-20KHz band.  You emit more than that and the emisions correlate with the words you speak.  All you've accomplished is to slightly 'encrypt' your words to someone who 'listens' only to that region of the spectrum. 

You need to think out of the box;  they do.  For a few decades public science has been trying to correlate brain activity to specific thoughts.  That's already been accomplished such that "blue" or "ball", for example, have been identified.  One issue is (or at least was) that your activity for blue differs from mine.  Consider, however, that via your years of viewing your tv and pc you've already potentially established a catalog of "Bob's brain reads like this when he sees a dog, and like this when he sees a naked lady, and like this when he's frightened, and like this when he's angry, and...."    And we all would have established that personal catalog.

We're rarely told of such things in the Big Brother world until they're old hat for the spooks*.  If we all know that 'blue' can be read via direct contact, then I'll assume that it can be read remotely too. 

* the first we heard of Global Hawk successfully flying a passenger jet by remote control from CA to HI was around March 2001.  How is it that Operation Northwoods in the early 60's detailed plans to remote control fly a dummy passenger airliner (duplicate of a real one) and shoot it down over the Gulf of Mex and claim that Russian MIGS from Cuba did it and killed all of the passengers (who'd already been diverted elsewhere while the dummy resumed their flight plan).  Ironically, the first time the DOD admitted to the existence of Operation Northwoods was also in 2001.  A few months later we had 9/11.  Global Hawk + Operation Northwoods = 911

 

Mon, 12/30/2013 - 21:02 | 4287030 MeelionDollerBogus
MeelionDollerBogus's picture

just look up CCD's and see what they are ready to do. Special CCD's are made for infrared, for x-ray, etc., and normal cheap mass-production laptop CCD's don't go very far into it, aren't meant to operate there.
Cover with clear plastic, cloth, foil, tape, in that order.

Sun, 12/29/2013 - 18:41 | 4283923 Mareka
Mareka's picture

How is it that the NSA ensures that only non-American citizens end up being spied on with these infected devices?...

Or have they stopped trying to maintain that particular lie?

Sun, 12/29/2013 - 18:53 | 4283943 BlueCheeseBandit
BlueCheeseBandit's picture

Boboman is coming in through the back door with his equipmunk

Sun, 12/29/2013 - 18:58 | 4283957 MsCreant
MsCreant's picture

You are living in an Orwellian novel. What are you doing?

Sun, 12/29/2013 - 19:19 | 4283990 sunnyside
sunnyside's picture

Masturbating to a lot of internet porn.

Sun, 12/29/2013 - 19:09 | 4283973 MsCreant
MsCreant's picture

Now that is what I call "jobs creation." Journalists going for years, keeping magazines and editors in material.

Mon, 12/30/2013 - 07:06 | 4284741 gratefultraveller
gratefultraveller's picture

Awesome link, that second one, thanks! I had been wondering whether such a tally with a global view existed.

Sun, 12/29/2013 - 19:09 | 4283976 A Lunatic
A Lunatic's picture

I'm almost pissed enough to.........yeah, that. America is dead, long live 'merica (land of the fat, lazy, apathetic, emasculated, fucking morons). How fucking low can we go...........??!?

Sun, 12/29/2013 - 19:25 | 4283994 sunnyside
sunnyside's picture

We RE- elected Barry.   That was the sign it was over.

Mon, 12/30/2013 - 03:13 | 4284646 Clowns on Acid
Clowns on Acid's picture

The machines re-elected Barry.

Sun, 12/29/2013 - 19:20 | 4283987 proLiberty
proLiberty's picture

Yet another sign that government is just too big. Infinite money enables infinite government.

One of the few peaceful avenues left is to call a Convention to Consider Amendments and to redefine the role and powers of the federal government. Mark Levin's book is just one roadmap for such a convention. Up until now, many people have worried that a Convention would endanger their rights. It is becoming more clear how many rights are endangered by the present trajectory not only of the political side of government, but by the entrenched bureaucracy like the NPS and EPA.

One thing that is certain to me is that a government that can print its own money is a government that doesn't need to ask for the taxpayer's permission for a new law or a new takeover of something else, like airboat operations or like health care.

Sun, 12/29/2013 - 19:37 | 4284013 el Gallinazo
el Gallinazo's picture

A constitutional convention would simply erase what is left of the Bill of Rights.  Nothing wrong with the Constitution.  It's just that all three branches of government are inhabited almost exclusively with traitorous, evil assholes.  Just look at this federal district judge Pauley.  How is a convention going to fix that?

Sun, 12/29/2013 - 20:04 | 4284058 mydogisprettier...
mydogisprettierthanyou's picture

there is nothing wrong with our constitution now.....as long as we abide by it.

 

 

Sun, 12/29/2013 - 22:27 | 4284313 DonFromWyoming
DonFromWyoming's picture

Q. How is a convention going to fix that?

1.  Enact an amendment that narrowly defines the commerce clause to allow only for actual interstate commerce, not imagined commerce, to be regulated by the federal government.

2.  Enact term limits for CONgress.  2 terms for Senators.  3 terms for Representatives.

3.  Repeal the 17th amendment (ie. the direct election of Senators).

4.  Enact an amendment that allows the state legislatures to directly amend The Constitution with a 2/3 majority without any involvement of CONgress.

5.  Enact an amendment that specifically prohibits the federal government from regulating or giving any money directly or to states for education.

6.  Enact an amendment that specifically prohibits the federal government from regulating health insurance or any medical practice or commerce.

7.  Enact an amendment that prohibits the continuation of or creation of a new central bank (ie. it abolishes the Fed), and that specifically allows savings and commerce using competing currencies without any negative tax consequences.

Sun, 12/29/2013 - 19:34 | 4284011 devo
devo's picture

Does anyone have a copy of the 50 page catalog?

Sun, 12/29/2013 - 19:40 | 4284017 sunnyside
sunnyside's picture

I think it is on Vivid's website.

Sun, 12/29/2013 - 20:28 | 4284096 SilverRhino
SilverRhino's picture

Looking for that as well.  Call it professional curiosity. 

 

Sun, 12/29/2013 - 19:44 | 4284021 logicalman
logicalman's picture

On ZH recently - The Internet Is Now Weaponized, And You Are The Target - can't find the link right now, but definitely worth the read.

I'm sure someone can help with that.

Very informative.

 

Sun, 12/29/2013 - 23:44 | 4284461 Money Squid
Money Squid's picture

any email, text, kiddy porn can be placed on your computer so "law enforcement" can find it and claim through parallel evidence construction that you are guilty of a crime. Best to keep quiet, pay your taxes, and oh, be sure to contribute to your local police association when you receive those flyers. Or else.

Mon, 12/30/2013 - 03:40 | 4284654 John_Coltrane
John_Coltrane's picture

You're assuming you operate from a fixed internal disc.  Bad assumption.  No hacker uses an internal bootable disc or a standard operating system like those from microsoft.  If you don't know the operating system you are trying to hack you have no hope to control it as the command you issue will be meaningless to your machine.  So, you use systems that are at least a decade old.   Always boot  an independent external media which can be hidden separating from the computer.  And encrypt it using truecypt with a hidden (invisible) file directory for an extra layer of security if found. 

If you want the ultimate in security just disconnect your ethernet cable. 

An amusing aspect of all the NSA efforts is that all their plans (and the internet itself) fail with one good coronal mass ejection (CME).  Then you'll be glad you have cash, fuel and food stored up. 

Sun, 12/29/2013 - 20:37 | 4284108 goldhedge
goldhedge's picture

Alex Jones you are not crazy.

INSTEAD IT IS WE DUMB SHEEP.

 

Sun, 12/29/2013 - 23:39 | 4284456 Money Squid
Money Squid's picture

Alex just sounds crazy.

Sun, 12/29/2013 - 21:35 | 4284210 are we there yet
are we there yet's picture

If the government would only hire super hot cheerleader women to monitor us, I think I could learn to like being stalked.

Sun, 12/29/2013 - 21:49 | 4284232 Quinvarius
Quinvarius's picture

They paid to have those backdoors coded in.  It isn't like talent was involved.  Now all the Chinese have to do is find them.  Which I think they already did.  If you look at their military equipment, it looks exactly like ours.  The NSA screwed us by making us less secure. 

Sun, 12/29/2013 - 21:59 | 4284253 Clowns on Acid
Clowns on Acid's picture

The Duck Dynasty guy was right. Back door penetration is outlawed in the Bible, and should not be encouraged by the Gaystappo.

 

Sun, 12/29/2013 - 22:32 | 4284326 kiwidor
kiwidor's picture

If 'security' agencies start stuffing people's computers, there's nothing better than a concrete cutter to relieve them of their high-bandwidth connections.

Major telco installations are easy to target...everything that goes in has to come out somewhere.  open manhole cover, start your stihl, and chop away at the cables.   20 to 30 locations will cause enough of a commercial problem that the agencies will be reigned in to keep the money flowing.  Imagine if you get major bank cables in the process.  oops.  disgruntled payment infrastructure is not what they want.  but it is a lovely policy-change lever.

Remember that most western governments are as dependent on I.T. as individuals...and as we know, they aren't great at security.  with virtualization, you only need one or two passwords to DELETE VM a few hundred times and oops, they haven't done restore/DR drills in how long?  years probably.  wait for that sysop to go home, then put a gun to his head and get him to log in remotely.  

how long does it take to restore 200 VM's when you only have 1 or 2 tape library? OOPS.

meanwhile, huge chunks of interdependent systems don't function because they all have to share information.  anyone around who remembers how to do paperwork/manual systems?  oh they've all retired. shame.

if you want to add to the chaos, merely take out a power station or two.  nothing a few chains and steel rods won't fix...throw into substation using catapault and fry , baby fry.  chain reaction?

But none of this really matters.  the real issue is that so called intelligence and security agencies, with the exception of those in russia, china, iran and israel, are completely out of touch with HUMINT and consistently hire the wrong people as analysts.  two or three major personality types all following instructions and lacking imagination.  shit left on someone's computer is quite irrelevant when a real OP is being conducted.  we don't use email, txt, phones, or anything so easily tracked.  one-time pads and a few kids on bicycles or  a letter to grandma with a dot somewhere on the envelope is as good as you need.  walkbys.  blue shirt/red shirt/striped shirt .  draw curtains in lounge @ 4pm.  signal signal signal out in the open and totally undecodeable without massive resources.  

so where are the rebels going to strike first?  emergency-services microwave backbones?  power stations?  cables accidentally dragged up?  tie a chain around the satellite antenna and drive off with it attached to their F250?  and with each successive neutralization the resources to prevent others are diminished.  and with each up-guarding the target is advertised.

I could conclude that there is no enemy at all and places like the alphabet soup agencies are just a way to soak up sociopaths and perverts and give them something to do, because with so many open easy targets, the lack of attacks(over time) makes the risk profile absurdly low, such that massive spying on citizens with nothing useful to say can only give a negative ROI. 

Anyhoo.  encryption is worthless .  why hide what you can imply openly without discovery?

And Bob, I know you're reading me;   meet me at midnight in the usual place...and don't forget to bring the money.

Mon, 12/30/2013 - 20:51 | 4287012 MeelionDollerBogus
MeelionDollerBogus's picture

And as a side-bonus that would prove that bitcoin can't survive rebellion either since rebellion needs to go off-grid & survival of good people requires rebellion.

Sun, 12/29/2013 - 22:37 | 4284342 Atticus Finch
Atticus Finch's picture

..." it appears the US intelligence agency is compromising the technology and products of American companies."

 

Oh, so American companies fuck over American workers and the NSA fucks over American companies.

This must be a patriotic effort!

Sun, 12/29/2013 - 23:28 | 4284428 Money Squid
Money Squid's picture

Obviously the NSA brainiacs never messed with CH1 and his TOR network. Or, "Satoshi Nakamoto" and his double hash.

Mon, 12/30/2013 - 01:00 | 4284557 Asok Asus
Asok Asus's picture

The implanted interception software in the Cisco and Juniper switches isn't malware. NSA paid these companies to include this interception software, just like the NSA paid RSA to sell deliberately weakened security software.

Mon, 12/30/2013 - 01:24 | 4284580 GumbyMe
GumbyMe's picture

Only a matter of time before the US tech sector implodes and once companies like Google begin massive layoffs, we'll learn more from disgruntled ex-employees, which will even further accelerate the downfall. In the meantime, focus on open source platforms and if you can't monitor the source code yourself, then hope it's not monitored by NSA drones. Wonder how long before "NSA Code Free" labels take hold?

In the meantime, enjoy Firefox with NoScript, AdBlock, and Yandex.com as your default search engine. Although not completely NSA free, it makes it a little more inconvenient for the NSA bugs to track you.

Mon, 12/30/2013 - 03:51 | 4284662 Number 156
Number 156's picture

This reminds me of a situation I ran into in a company I worked for.

We had one PC that was was acting strangely on the network. sending out netBIOS packets in a way that looked malicious. We suspected a virus or malware. This was a DELL optiplex, totally identical to the other hundreds of DELL PCs on the network.

So, my workmate and I took the PC, wiped the drive and reinstalled windows. After Plugging it back into the network, It STILL kept doing the same thing.

We ended up scrapping it.

Mon, 12/30/2013 - 10:54 | 4285002 bh2
bh2's picture

It seems likely NSA will eventually render US equipment manufacturers parias on the world market. When "full spectrum domination" is the goal, no price is too high to remain "secure", even if it is destruction of a major industry.

Tue, 12/31/2013 - 13:08 | 4286423 Blue Horshoe Lo...
Blue Horshoe Loves Annacott Steel's picture
The NSA is trying to penetrate everyone's back door?  Not surprised. What a bunch of homos.
Do NOT follow this link or you will be banned from the site!