This page has been archived and commenting is disabled.
The Complete Guide To How The NSA Hacked Everything
Two days ago we observed the latest disclosure in the seemingly endless Snowden treasure trove of leaked NSA files, when Spiegel released the broad details of the NSA's Access Network Technology (ANT) catalog explaining how virtually every hardware architecture in the world has been hacked by the US superspies. We followed up with a close up of "Dropout Jeep" - the NSA's project codename for backdoor entry into every iPhone ever handed out to the Apple Borg collective (because it makes you look cool). Today, we step back from Apple and release the full ANT catalog showcasing the blueprints of how the NSA managed to insert a backdoor into virtually every piece of hardware known under the sun.
And so, without further ado, here is the complete slidebook of how the NSA hacked, well, everything.
- 43934 reads
- Printer-friendly version
- Send to friend
- advertisements -


Dell's Twitter Account Apologizes For The 'Inconvenience' Of Helping NSA Install Spyware
http://www.techdirt.com/articles/20131230/17174425718/dells-twitter-acco...
Dell is sorry they have been outed, not for what they done to their customers. Time for class actions against these companies.
<Yawns> the ".gov" has been doing this for years. And some of us knew this for years. Look up "Carnivore" on Google.
This isn't really about combatting "terrorism". It's more about command and control. TPTB are dreadfully concerned about internet-organized revolts.
We should all start encrypting our personal communications.
key swap parties.
Gotta give them points for managing to get one of them codenamed "Howler Monkey". Must have been hidden from the PC censors until it was too established to rename.
Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM , Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC
It used to be so much simplier when it was only shit, piss, fuck, cunt, cocksucker, motherfucker and tits.
Tits, bet you can't eat just one.
SHIT!
Now I know my TV is looking at me.
Having a pretty solid look through this, none is of course surprising, and some systems used are extremely powerful 'hacking' tools, but most are incredibly outdated and i'm guessing superceded several times by now.
Snowden should release or his spillgates should release things that are more applicable to right now.
How long till "Dropout Jeep" is open sourced?
so my qustion is, in light of all this is encryption even worth bothering with?
yes it is. I am hoping this brings forward even better encryption technologies that are not owned/created by the NSA. This should be an open source call to arms.
Virtually none of this is breaking encryption -- it's all bypassing it. All the evidence supports the idea that if you encrypted offline, they would never have access to the information. (preusming your machine hasn't been compromised and then reconnected to the internet.)
browser issues
maybe nsa?
Sorry, I am not following you. Are you saying have two computers, one never connected to the internet, encrypt your data on that machine and then copy the data to another computer from which you send the email?
This assumes the computer not connected to the internet is not comprised at the factory level?
And what about copying the encrypted reply to your computer not connected to the internet? Might the reply be infected and it passes the malware to your machine not connected to the internet just by inserting the usb stick or Bluetooth file share?
Yeh some of that stuff was from a while ago. Hate to think how advanced they are now.
You can assume every piece of hardware, every component if useful to compromise has been.
So the NSA has a massive collection of blackmail data to allow their masters to get people in useful positions to do as they are told. The whole purpose of the NSA is to create a system that allows the control of all decision making.
NSA. You are a bunch of pig fuckers and should be ashamed of yourselves.
Yeah but they are fucking the pigs for our own good not because they like to fuck pigs
What a beautiful christmas gift for all the hackers all over the globe, who will have wonderful opportunities to play with millions of interesting backdoors in systems that were previously secure.
Thank you NSA
uh, NSA, your machines, did you make them yourself or did you buy them to some computer corporation?
...thought so
All I can say is that unless they've secured their own equipment, I hope every hacker on the fucking planet makes sure their RF radiation is a duplex pathway aimed right square at Alexander's nads.
Similtaniously.
At least we know where OUR $8.5T went now.
Is anyone questioning my assertion that the three letter agencies use SMIs now? This is a FACT and it isn't just Dell or Apple that is complicit in the crime.
http://www.zerohedge.com/news/2013-12-31/apple-denies-ever-working-nsa#c...
Could always try poking port 0xb2 randomly and scribbling on every piece of IO-mapped mem in your box to fuzz the fuzz. :p
why 0xb2?
Its one of the standardized methods for triggering SMIs
And if I routinely re-flash my own BIOS?
Then you're threatening the security of the state and are therefore deemed to be a terrorist...
That will not close the backdoor
They will still have you over a barrel, in a 'Pulp Fiction' sort of way
How the hell did this all happen?
Step #1: A handful of Arabs hijacked planes and flew them into buildings killing a couple thousand citizens.
Step#2: And then some even bigger assholes hijacked our country's grief and flew it into Iraq while also taking authority to shit on the 4th Amendment and our Constitution.
Happy New Year, Mr. Snowden. You are a HERO and PATRIOT and it is doubtful that we will rise to the challenges you have warned us of.
But thank you, all the same. Cheers!
"Happy New Year, Mr. Snowden. You are a HERO and PATRIOT"
I used to think that. But now, I'm not so sure. EVERY government would do what the NSA has done if they were capable of it and, in the end, Snowden will have accomplished nothing since this trend will not stop in the US. They are in a black world and all they will need to do is change program names and/or split them into separate programs just as they did with Total Information Awareness.
All Snowden will have accomplished in the end is the destruction of US technology exports out of fear they'll all come pre-hacked. Even if it is claimed that they have stopped doing this, no one will believe them, even if they actually have (which is unlikely). Thus, even though countries like China and various tech exporting EU countries are most likely doing the very same sort of things, it will be the US which is singled out. Forever.
We might as well not know about the illegal activity of our Government " 'cause everyone is doin' it"...niiiiice! Cleary, you need to take the blue pill!
" exports out of fear they'll all come pre-hacked"
Well, they are all pre-hacked. And those "exports" are made in China. And the US citizen Wage-Slaves are none the better off for them being called "USA Export".
Winston, what Snowden did was give us an OPPORTUNITY. It is up to us whether we take it or not...Or whether we come to love Big Brother as you advocate.
Either way, 2014 will be pivotal.
"Winston, what Snowden did was give us an OPPORTUNITY."
Sorry, that opportunity won't be taken just as an opportunity to truly fix our financial system after the 2008 crash wasn't taken. Watch this and his stated, required fixes for any solution to the problem:
https://www.youtube.com/watch?v=b0w36GAyZIA
and you will realize that actually doing anything about it is impossible with technically illiterate executive, judicial, and legislative government branches fully owned by those who economically benefit from this BLACK WORLD network to which most of those government officials don't even have access to let alone the technical expertise to understand. As the speaker said, even default encrytion of ALL internet traffic won't fix this without the cooperation of ALL goverments to end their back door efforts. If you think even ONE of those things will happen, I've got some ocean beach property in Arizona to sell you.
So, back to what I said. All this will result in is serious harm to US technological exports. That's it.
The prices listed for all this stuff are very cheap. Nothing like your standard $600 military toilet seat.
With all the work that went into this spy gear, who is getting the bargain basement prices?