Some 6 years old hacking tools of the NSA simplified
Here are a
few outdated NSA tools and products, explaining how they used to work over half
a decade ago !…Now however, judging from the Snowden files… these below stated
products seem to have become a bunch of Mickey Mouse tools for hobby
investigators… But nevertheless simplifying some of theses older products,
could well give some of us a picture of the "modus operandi"….that some may find
interesting.
TYPHON
HX: Fake cell towers – You think your cell has connected to a typical provider (Bell,
AT&T, Orange…or other equivalents of these companies in China or Europe..) this type of hacking was spotted in action by the Ecuadorian
embassy shortly after Julian Assange arrive as a house guest. The embassy’s
staff started getting welcome messages from Uganda Telecom on their mobile
because the British intelligence services hadn’t reconfigured their data
slurping base-station correctly from a previous operation… so if you suddenly
get an obscure messages from China on some Happy New Year message… be relative
sure, you are flagged..
QUANTUMINSERT:
Fake duplicate websites – You THINK you signing into Yahoo.com or CNN.com, but you are really
signing into an NSA managed clones of Yahoo or CNN (or other sites…)
COTTONMOUTH:
Wireless transmitter in an USB cable The
NSA apparently developed these cables to broadcast data being sent through a
USB cable to an NSA truck, just down the road.
RAGEMASTER:
Wireless transmitter in a Monitor (VGA) cable – The NSA can watch what is happening on the
screen in their monitoring truck parked just down the road.
HOWLERMONKEY:
a tiny unit that sits in your network (Ethernet) port – This can be used to inject data
into your network traffic, monitor the network traffic or disrupt network
traffic
BULLDOZER:
A wireless network card – You may say what good it that, well, if you have your WiFi turned
off, this one is always on, and always broadcasting to… you guessed it… the NSA
monitoring truck just down the street
IRATEMONK:
Firmware for your Hard Drive – Yes, this is BELOW the operating system right in the physical
workings of the Disk. Apparently it works on Western Digital, Seagate,
Maxtor and Samsung disks (98% of the disks) and more to track what the computer
is doing. It will stay even if the disk is wiped out, repartitioned
and/or reformatted
TURBINE
– The active surveillance of a wiretap on the cable between North
America and the rest of the world – The vast majority of international
communication runs through a single cable SEA-ME-WE-4 in the Atlantic Oceans
floor between New York and the UK and then on to Pakistan, India and far east.
DROPOUTJEEP:
An Apple iPhone software hack – With a claimed 100% success rate leading
some notable security analysts to speculate that Apple was involved in
developing the hack. Apple, of course, denies this.
.......Now make
your own thoughts .
Comments