This page has been archived and commenting is disabled.

The Complete Guide To How The NSA Hacked Everything

Tyler Durden's picture




 

Two days ago we observed the latest disclosure in the seemingly endless Snowden treasure trove of leaked NSA files, when Spiegel released the broad details of the NSA's Access Network Technology (ANT) catalog explaining how virtually every hardware architecture in the world has been hacked by the US superspies. We followed up with a close up of "Dropout Jeep" - the NSA's project codename for backdoor entry into every iPhone ever handed out to the Apple Borg collective (because it makes you look cool). Today, we step back from Apple and release the full ANT catalog showcasing the blueprints of how the NSA managed to insert a backdoor into virtually every piece of hardware known under the sun.

And so, without further ado, here is the complete slidebook of how the NSA hacked, well, everything.

 

- advertisements -

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
Tue, 12/31/2013 - 19:30 | 4289810 I am Jobe
I am Jobe's picture

Dell's Twitter Account Apologizes For The 'Inconvenience' Of Helping NSA Install Spyware

http://www.techdirt.com/articles/20131230/17174425718/dells-twitter-acco...

Tue, 12/31/2013 - 21:53 | 4290100 Overdrawn
Overdrawn's picture

Dell is sorry they have been outed, not for what they done to their customers.  Time for class actions against these companies.

Tue, 12/31/2013 - 20:23 | 4289906 Bohemond
Bohemond's picture

<Yawns> the ".gov" has been doing this for years.  And some of us knew this for years. Look up "Carnivore" on Google.

This isn't really about combatting "terrorism". It's more about command and control. TPTB are dreadfully concerned about internet-organized revolts.

We should all start encrypting our personal communications.

 

Wed, 01/01/2014 - 12:10 | 4290785 sleigher
sleigher's picture

key swap parties.  

Tue, 12/31/2013 - 20:55 | 4289982 icanhasbailout
icanhasbailout's picture

Gotta give them points for managing to get one of them codenamed "Howler Monkey". Must have been hidden from the PC censors until it was too established to rename.

Tue, 12/31/2013 - 21:22 | 4290037 Free Wary
Free Wary's picture

Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM , Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC

Tue, 12/31/2013 - 21:38 | 4290065 Dewey Cheatum Howe
Dewey Cheatum Howe's picture

It used to be so much simplier when it was only shit, piss, fuck, cunt, cocksucker, motherfucker and tits.

Tue, 12/31/2013 - 23:28 | 4290262 WmMcK
WmMcK's picture

Tits, bet you can't eat just one.

Tue, 12/31/2013 - 21:31 | 4290052 Joebloinvestor
Joebloinvestor's picture

SHIT!

 

Now I know my TV is looking at me.

Tue, 12/31/2013 - 21:49 | 4290089 jimzjamz
jimzjamz's picture

Having a pretty solid look through this, none is of course surprising, and some systems used are extremely powerful 'hacking' tools, but most are incredibly outdated and i'm guessing superceded several times by now.

 

Snowden should release or his spillgates should release things that are more applicable to right now.

Tue, 12/31/2013 - 23:18 | 4290242 MollyHacker
MollyHacker's picture

How long till "Dropout Jeep" is open sourced?

Tue, 12/31/2013 - 23:24 | 4290256 laosuwan
laosuwan's picture

so my qustion is, in light of all this is encryption even worth bothering with?

Wed, 01/01/2014 - 12:13 | 4290791 sleigher
sleigher's picture

yes it is.  I am hoping this brings forward even better encryption technologies that are not owned/created by the NSA.  This should be an open source call to arms.

Wed, 01/01/2014 - 13:55 | 4291013 seek
seek's picture

Virtually none of this is breaking encryption -- it's all bypassing it. All the evidence supports the idea that if you encrypted offline, they would never have access to the information. (preusming your machine hasn't been compromised and then reconnected to the internet.)

Wed, 01/01/2014 - 23:25 | 4292188 laosuwan
laosuwan's picture

 

 

Wed, 01/01/2014 - 23:24 | 4292195 laosuwan
laosuwan's picture

 

Wed, 01/01/2014 - 23:24 | 4292381 laosuwan
laosuwan's picture

browser issues

 

maybe nsa?

 

Wed, 01/01/2014 - 23:21 | 4292385 laosuwan
laosuwan's picture

Sorry, I am not following you. Are you saying have two computers, one never connected to the internet, encrypt your data on that machine and then  copy the data to another computer from which you send the email?

 

This assumes the computer not connected to the internet is not comprised at the factory level?

 

And what about copying the encrypted reply to your computer not connected to the internet? Might the reply be infected and it passes the malware to your machine not connected to the internet just by inserting the usb stick or Bluetooth file share?

 

Tue, 12/31/2013 - 23:31 | 4290263 Kina
Kina's picture

Yeh some of that stuff was from a while ago. Hate to think how advanced they are now.

You can assume every piece of hardware, every component if useful to compromise has been.

 

So the NSA has a massive collection of blackmail data to allow their masters to get people in useful positions to do as they are told. The whole purpose of the NSA is to create a system that allows the control of all decision making.

Wed, 01/01/2014 - 00:52 | 4290370 kurt
kurt's picture

NSA. You are a bunch of pig fuckers and should be ashamed of yourselves. 

Wed, 01/01/2014 - 14:11 | 4291011 headhunt
headhunt's picture

Yeah but they are fucking the pigs for our own good not because they like to fuck pigs

Wed, 01/01/2014 - 00:57 | 4290373 Carmagnole
Carmagnole's picture

What a beautiful christmas gift for all the hackers all over the globe, who will have wonderful opportunities to play with millions of interesting backdoors in systems that were previously secure.

Thank you NSA

 

uh, NSA, your machines, did you make them yourself or did you buy them to some computer corporation?

...thought so

Wed, 01/01/2014 - 03:42 | 4290480 WillyGroper
WillyGroper's picture

All I can say is that unless they've secured their own equipment, I hope every hacker on the fucking planet makes sure their RF radiation is a duplex pathway aimed right square at Alexander's nads.

Similtaniously.

Wed, 01/01/2014 - 11:13 | 4290687 Absinthe Minded
Absinthe Minded's picture

At least we know where OUR $8.5T went now.

Wed, 01/01/2014 - 01:09 | 4290377 Captain Benny
Captain Benny's picture

Is anyone questioning my assertion that the three letter agencies use SMIs now?  This is a FACT and it isn't just Dell or Apple that is complicit in the crime.

http://www.zerohedge.com/news/2013-12-31/apple-denies-ever-working-nsa#c...

Wed, 01/01/2014 - 11:44 | 4290730 GMadScientist
GMadScientist's picture

Could always try poking port 0xb2 randomly and scribbling on every piece of IO-mapped mem in your box to fuzz the fuzz. :p

Wed, 01/01/2014 - 13:55 | 4291006 headhunt
headhunt's picture

why 0xb2?

Wed, 01/01/2014 - 14:46 | 4291108 Captain Benny
Captain Benny's picture

Its one of the standardized methods for triggering SMIs

Wed, 01/01/2014 - 11:35 | 4290717 GMadScientist
GMadScientist's picture

And if I routinely re-flash my own BIOS?

Wed, 01/01/2014 - 13:06 | 4290903 Rory_Breaker
Rory_Breaker's picture

Then you're threatening the security of the state and are therefore deemed to be a terrorist...

Wed, 01/01/2014 - 13:54 | 4291002 headhunt
headhunt's picture

That will not close the backdoor

They will still have you over a barrel, in a 'Pulp Fiction' sort of way

Wed, 01/01/2014 - 12:36 | 4290861 novictim
novictim's picture

How the hell did this all happen?  

Step #1:  A handful of Arabs hijacked planes and flew them into buildings killing a couple thousand citizens.  

Step#2: And then some even bigger assholes hijacked our country's grief and flew it into Iraq while also taking authority to shit on the 4th Amendment and our Constitution.

 

Happy New Year, Mr. Snowden.  You are a HERO and PATRIOT and it is doubtful that we will rise to the challenges you have warned us of.

But thank you, all the same.  Cheers!

Wed, 01/01/2014 - 14:49 | 4291099 Winston Smith 2009
Winston Smith 2009's picture

"Happy New Year, Mr. Snowden.  You are a HERO and PATRIOT"

I used to think that. But now, I'm not so sure. EVERY government would do what the NSA has done if they were capable of it and, in the end, Snowden will have accomplished nothing since this trend will not stop in the US. They are in a black world and all they will need to do is change program names and/or split them into separate programs just as they did with Total Information Awareness.

All Snowden will have accomplished in the end is the destruction of US technology exports out of fear they'll all come pre-hacked. Even if it is claimed that they have stopped doing this, no one will believe them, even if they actually have (which is unlikely). Thus, even though countries like China and various tech exporting EU countries are most likely doing the very same sort of things, it will be the US which is singled out. Forever. 

Wed, 01/01/2014 - 15:54 | 4291250 novictim
novictim's picture

We might as well not know about the illegal activity of our Government " 'cause everyone is doin' it"...niiiiice!  Cleary, you need to take the blue pill!

" exports out of fear they'll all come pre-hacked"

Well, they are all pre-hacked.  And those "exports" are made in China.  And the US citizen Wage-Slaves are none the better off for them being called "USA Export".

 

Winston, what Snowden did was give us an OPPORTUNITY.  It is up to us whether we take it or not...Or whether we come to love Big Brother as you advocate.

Either way, 2014 will be pivotal.

Wed, 01/01/2014 - 18:07 | 4291558 Winston Smith 2009
Winston Smith 2009's picture

"Winston, what Snowden did was give us an OPPORTUNITY."

Sorry, that opportunity won't be taken just as an opportunity to truly fix our financial system after the 2008 crash wasn't taken. Watch this and his stated, required fixes for any solution to the problem:

https://www.youtube.com/watch?v=b0w36GAyZIA

and you will realize that actually doing anything about it is impossible with technically illiterate executive, judicial, and legislative government branches fully owned by those who economically benefit from this BLACK WORLD network to which most of those government officials don't even have access to let alone the technical expertise to understand. As the speaker said, even default encrytion of ALL internet traffic won't fix this without the cooperation of ALL goverments to end their back door efforts. If you think even ONE of those things will happen, I've got some ocean beach property in Arizona to sell you.

So, back to what I said.  All this will result in is serious harm to US technological exports. That's it.

Thu, 01/02/2014 - 11:19 | 4293132 unununium
unununium's picture

The prices listed for all this stuff are very cheap.  Nothing like your standard $600 military toilet seat.

With all the work that went into this spy gear, who is getting the bargain basement prices?

Do NOT follow this link or you will be banned from the site!