Some 6 years old hacking tools of the NSA simplified


 

Here are a few outdated NSA tools and products, explaining how they used to work over half a decade ago !…Now however, judging from the Snowden files… these below stated products seem to have become a bunch of Mickey Mouse tools for hobby investigators… But nevertheless simplifying some of theses older products, could well give some of us a picture of the "modus operandi"….that some may find interesting.

TYPHON HX: Fake cell towers – You think your cell has connected to a typical provider (Bell, AT&T, Orange…or other equivalents of these companies in China or Europe..)  this type of hacking was spotted in action by the Ecuadorian embassy shortly after Julian Assange arrive as a house guest. The embassy’s staff started getting welcome messages from Uganda Telecom on their mobile because the British intelligence services hadn’t reconfigured their data slurping base-station correctly from a previous operation… so if you suddenly get an obscure messages from China on some Happy New Year message… be relative sure, you are flagged..

QUANTUMINSERT: Fake duplicate websites – You THINK you signing into Yahoo.com or CNN.com, but you are really signing into an NSA managed clones of Yahoo or CNN (or other sites…)

COTTONMOUTH: Wireless transmitter in an USB cable  The NSA apparently developed these cables to broadcast data being sent through a USB cable to an NSA truck, just down the road.

RAGEMASTER: Wireless transmitter in a Monitor (VGA) cable – The NSA can watch what is happening on the screen in their monitoring truck parked just down the road.

HOWLERMONKEY: a tiny unit that sits in your network (Ethernet) port – This can be used to inject data into your network traffic, monitor the network traffic or disrupt network traffic

BULLDOZER: A wireless network card – You may say what good it that, well, if you have your WiFi turned off, this one is always on, and always broadcasting to… you guessed it… the NSA monitoring truck just down the street

IRATEMONK: Firmware for your Hard Drive – Yes, this is BELOW the operating system right in the physical workings of the Disk.  Apparently it works on Western Digital, Seagate, Maxtor and Samsung disks (98% of the disks) and more to track what the computer is doing.  It will stay even if the disk is wiped out, repartitioned and/or reformatted

TURBINE – The active surveillance of a wiretap on the cable between North America and the rest of the world – The vast majority of international communication runs through a single cable SEA-ME-WE-4 in the Atlantic Oceans floor between New York and the UK and then on to Pakistan, India and far east.

DROPOUTJEEP: An Apple iPhone software hack – With a claimed 100% success rate leading some notable security analysts to speculate that Apple was involved in developing the hack.  Apple, of course, denies this.

.......Now make your own thoughts .

Comments

Anonymous said…
dropoutjeep had its coming out during the so called "Fappening"

Popular posts from this blog

The Sanctions

Chaldoran 1514 AD

Wikihoax on Iran