START A PETITION 25,136,189 members: the world's largest community for good
START A PETITION
x
1,259,435 people care about Politics

The NSA is Hacking Our Hardware Too

The NSA is Hacking Our Hardware Too

We’ve known since June that the National Security Agency (NSA)  has been engaged in mass surveillance programs enabling it to access information from global phone and internet networks. The German newsmagazine Der Spiegel recently reported that the NSA’s surveillance activities go beyond exploiting vulnerabilities in computer software. The agency has actually “modified the firmware of computers and network hardware — including systems shipped by Cisco, Dell, Hewlett-Packard, Huawei, and Juniper Networks — to give its operators both eyes and ears inside the offices the agency has targeted,” says Ars Technica.

According to Der Spiegel, the NSA has been intercepting laptops purchased online in a method called “interdiction.” After sending them to its own “secret workshops,” it then installs “malicious hardware” that gives the agency remote access. While Der Spiegel does not say how extensive this program is or who is being targeted, the report sheds quite a bit more light on how a U.S. government agency is acting in a very Big Brotherish mode, working with the intelligence community and accessing hardware all with the intention of remotely checking in on what someone is doing.

A “Catalogue” of Surveillance Tools

If that sounds troubling, and more the sort of thing that would be part of a science fiction spy thriller, you’ll only be more wary on reading about the NSA’s “fantastical collection of surveillance tools” that range from “back doors installed in computer network firmware and software to passively powered bugs installed within equipment.” The agency’s use of these extends to 2007 and it is not known if they are still in use or not.  Each has given the NSA the means to harvest data for long periods of time and without being noticed.

Der Spiegel’s documents “appear to be pages” from nothing less than “a catalogue of capabilities” for NSA’s Tailored Access Operations (TAO) division. Some tools involve “ordinary” Windows exploits designed to use parts of a laptop’s operating system to “phone home” to the NSA with data. Ars Technica details a number of the NSA’s hacks and implants whose code names (DEITYBOUNCE, IRONCHEF, SIERRAMONTANA, BULLDOZER, GINSU, SOMBERKNAVE, DROPOUTJEEP, MONKEYCALENDAR, CANDYGRAM) hint that someone has been investing their creative energies in these activities.

Installing the hardware- and firmware-based back doors requires that someone have physical access to these components, meaning that NSA operators somehow divert laptop and other hardware “during shipping to ‘load stations’ where the surveillance components are installed.  According to Der Spiegel, the C.I.A. and the F.B.I. have been known to give NSA agents some assistance in giving rides “on FBI jets to plant wiretaps.”

U.S. Companies Such As Cisco Could Now Face More Scrutiny

It’s to be noted that these practices are “no different from what other countries (including China, Russia, and France) try to do to the United States and other countries via their intelligence organizations,” Ars Technica observes. The NSA does have some extra capacities, as it is able access far more technical resources and, due to the number of tech companies in the United States, to insert itself into the “supply chain for technology flowing to the rest of the world.”

These covert practices are precisely what U.S. officials have suspected that the Chinese government is doing with hardware from companies such as Huawei, which has been connected to surveillance activities by the Chinese military, Ars Technica points out. Accordingly, American companies such as Cisco and Juniper named in Der Spiegel‘s report are likely to face scrutiny similar to what Huawei has been subjected to.

In the wake of Der Spiegel‘s claims, and along with more recent reports about the NSA seeking to build a quantum computer that could break “nearly every kind of encryption used to protect banking, medical, business and government records around the world” and not saying that it is not “spying” on members of Congress, you can bet that we’ll be hearing plenty more about the NSA in 2014.

Read more: , , , , , , ,

Photo from Thinkstock

have you shared this story yet?

some of the best people we know are doing it

127 comments

+ add your own
3:49PM PST on Feb 4, 2014

fbi hacking is one form of 'gaslighting.'


*The Gaslighting Phenomenon





http://neworleans.indymedia.org/news/2014/02/18930.php




http://sosbeevfbi.ning.com/profiles/blogs/the-gaslighting-of-mankind-as-perpetuated-by-fbi-cops?xg_source=activity


http://sosbeevfbi.ning.com/forum/topics/fbicia-methods-to-torture-and




http://www.sosbeevfbi.com/mystory.html







Spanish:




http://barcelona.indymedia.org/newswire/display/479050/index.php




*

http://en.wikipedia.org/wiki/Gaslighting





Evil:



http://seekingalpha.com/instablog/436163-geral-sosbee/1992682-fbi-cia-nsa-congress-courts-destroy-united-states-of-America



Covert Intel operations seek to end lives:


http://sosbeevfbi.ning.com/profiles/blogs/my-message-to-fellow-humans-under-attack?xg_source=activity

9:15PM PST on Jan 15, 2014

Do these "games" make you tired of our government and the games governments around the World play? Get a clue guys and gals... if we start a big war we will all die this time.

11:12AM PST on Jan 14, 2014

I don't mind if NSA is really doing the right thing to stop crime, terrorists and so forth. It seems that the higher the technology, the more crime because we don't know what kind of people are working for the NSA whether they spy into people's account and steal or share unnecessary information to their friends that caused a crime and stealing network. All laws are created by humans, if we all live our lives with dignity and respect, a lot of stupid laws should not exist. There are always good and bad in every era and we just have to live the right way and there's not much we can do.

6:41AM PST on Jan 14, 2014

Crazy. I don't want to believe it... How sad that I must.

2:56AM PST on Jan 14, 2014

i can't see what the big deal is...privacy has been a thing of the past for a long time...

4:06AM PST on Jan 13, 2014

Strewth!

12:06PM PST on Jan 12, 2014

LOLOL David and if Bush had signed the bill you would be calling it a wonderful too to fight terrorism with. More Bullshit Obama hate from you. I dodnt like the bill BTW. But YOU would have if Ronnie or Bush had signed it.

3:21AM PST on Jan 12, 2014

And you know I used 'my' computer to leave this comment....

3:20AM PST on Jan 12, 2014

This computer informs me it is about to report to 'mother' each time it has 'updates'...

3:14AM PST on Jan 12, 2014

Of course they do........

add your comment



Disclaimer: The views expressed above are solely those of the author and may not reflect those of
Care2, Inc., its employees or advertisers.

ads keep care2 free

meet our writers

Kristina Chew Kristina Chew teaches ancient Greek, Latin and Classics at Saint Peter's University in New Jersey.... more
Story idea? Want to blog? Contact the editors!
ads keep care2 free

more from causes

Animal Welfare

Causes Canada

Causes UK

Children

Civil Rights

Education

Endangered Wildlife

Environment & Wildlife

Global Development

Global Warming

Health Policy

Human Rights

LGBT rights

Politics

Real Food

Trailblazers For Good

Women's Rights




Select names from your address book   |   Help
   

We hate spam. We do not sell or share the email addresses you provide.