The news you're not supposed to know...

Austrian Economics: Understand Economics, Understand the World
The Century of the Self: The Untold History of Controlling the Masses Through the Manipulation of Unconscious Desires
The Disappearing Male: From Virility to Sterility

The Obama Deception: The Mask Comes Off
Operation Gladio: The Hidden History of U.S. Sponsored False Flag Terrorism in EuropeThe New American Century: The Untold History of The Project for the New American Century
Article posted Dec 29 2013, 11:28 PM Category: Big Brother/Orwellian Source: Common Dreams Print

NSA Intercepting Laptops Bought Online to Install Spy Malware

The NSA's TAO hacking unit is considered to be the intelligence agency's top secret weapon

This National Security Agency complex in San Antonio, Texas, located in a former Sony chip factory, is one of the central offices of the intelligence agency's Tailored Access Operations, the NSA's top operative unit. It's something like a squad of plumbers that can be called in when normal access to a target is blocked.

Germany's Der Spiegel is reporting Sunday that the US National Security Agency (NSA), working with the CIA and FBI, has been intercepting laptops and other electronics bought online before delivery to install malware and other spying tools.

According to Der Spiegel, the NSA diverts shipping deliveries to its own "secret workshops" to install the software before resending the deliveries to their purchasers.

Elite hackers working for the NSA's Tailored Access Operations (TAO) division are considered to be the intelligence agency's top secret weapon.

The NSA's TAO reportedly has backdoor access to many hardware and software systems from major tech companies such as Cisco, Dell, and Western Digital and others. The NSA exploits Microsoft Windows error reports to find weak spots in compromised machines in order to install Trojans and other viruses.

The Der Spiegel report also notes that the NSA has successfully tapped into some of the massive, under-sea fiber-optic cables that connect the global data infrastructure, in particular the “SEA-ME-WE-4″ cable system.

“This massive underwater cable bundle connects Europe with North Africa and the Gulf states and then continues on through Pakistan and India,” Der Spiegel reports, ”all the way to Malaysia and Thailand. The cable system originates in southern France, near Marseille. Among the companies that hold ownership stakes in it are France Telecom, now known as Orange and still partly government-owned, and Telecom Italia Sparkle.”

From Der Spiegel:
To conduct those types of operations, the NSA works together with other intelligence agencies such as the CIA and FBI, which in turn maintain informants on location who are available to help with sensitive missions. This enables TAO to attack even isolated networks that aren't connected to the Internet. If necessary, the FBI can even make an agency-owned jet available to ferry the high-tech plumbers to their target. This gets them to their destination at the right time and can help them to disappear again undetected after even as little as a half hour's work.

Responding to a query from SPIEGEL, NSA officials issued a statement saying, "Tailored Access Operations is a unique national asset that is on the front lines of enabling NSA to defend the nation and its allies." The statement added that TAO's "work is centered on computer network exploitation in support of foreign intelligence collection." The officials said they would not discuss specific allegations regarding TAO's mission.

Sometimes it appears that the world's most modern spies are just as reliant on conventional methods of reconnaissance as their predecessors.

Take, for example, when they intercept shipping deliveries. If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called "load stations," agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer.

These minor disruptions in the parcel shipping business rank among the "most productive operations" conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain access to networks "around the world."

Even in the Internet Age, some traditional spying methods continue to live on.

Latest Big Brother/Orwellian
- Drudge on AJ: Copyright Laws Will Destroy the Internet
- Homeland Security Detains Stockton Mayor, Forces Him to Hand Over His Passwords
- GCHQ's Karma Police: Tracking and Profiling Every Web User, Every Web Site
- Senate Intelligence Committee Ends Efforts To Turn Social Media Companies Into Government Spies
- Mandatory Breathalyzers Could Soon Be in Every Car If Feds Have Their Way
- Glenn Greenwald Debates Former NSA Director Keith B. Alexander At HP Conference
- NY Pushing for Black Boxes in Your Car That Records Everything About Your Driving
- DHS Targets Library for Supporting Anonymous Internet Browsing

Comments Add Comment Page 1 of 1
Nickel's 2bits

Posted: Dec 30 2013, 11:52 PM

7147 I think this is nonsense. Why wouldn't NSA simply have its fawning lapdog corporations install it for them?

In fact, now that I think about it, it probably already comes preinstalled on every PC by the O/S manufacturer.

Add Comment


Verification *
Please Enter the Verification Code Seen Below

Please see our About Page, our Disclaimer, and our Comments Policy.

This site contains copyrighted material the use of which in some cases has not been specifically authorized by the copyright owner. Such material is made available for the purposes of news reporting, education, research, comment, and criticism, which constitutes a 'fair use' of such copyrighted material in accordance with Title 17 U.S.C. Section 107. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. It is our policy to respond to notices of alleged infringement that comply with the DMCA and other applicable intellectual property laws. It is our policy to remove material from public view that we believe in good faith to be copyrighted material that has been illegally copied and distributed by any of our members or users.

About Us - Disclaimer - Privacy Policy

Advanced Search


Remember Me
Forgot Password?

School Cop Tells 16-Yr-Old Student He "Ruined His Life" By Smoking Pot Before Homecoming Dance, Student Commits Suicide - 10/07VIDEO: Dashcam Refutes Cop's Story of "Fearing For His Life," Shows Him Taser Man For Parking Ticket - 10/06Woman Called 911 to Report Stolen Wallet, Crazed Cop Showed Up and Beat Her Unconscious - 10/06Drudge on AJ: Copyright Laws Will Destroy the Internet - 10/06"Elections Are Fixed and US Created ISIS," Rage Against The Machine Bassist Lets Them Have It - 10/0733 Heroes Are Possibly Dead and No One Cares Because They Aren't Cops - 10/07A Major Win For The Opponents of The 'War On Drugs' - 10/07'Neutralizing' John Lennon: One Man Against The 'Monster' - 10/06

Man Follows Speeding Cop, Finds Out He Was Speeding To Buy PeanutsMission Creeps: Homeland Security Agents Confiscate Women's Panties For 'Copyright Infringement'Cop Shoots Couple's Dog, Threatens Jail For Trying To Save Dog's LifeSWAT Team Shoots Teen Girl & Her Dog During Pot Raid On Wrong HomeDurham, NC Cop Testifies Faking 911 Calls To Enter Homes Is "Official Policy"Indiana Sheriff Says US A "War Zone" To Justify New MRAP Military VehicleTampa Cops Surveil Pot Dealer, Catch Him Selling Pot, Raid His Home & Kill Him"You Just Shot An Unarmed Man!": Witness Says Police Shot His Friend With His Hands Up