NSA Intercepts And Bugs Computers

Posted by | December 29, 2013 18:35 | Filed under: News Behaving Badly Top Stories


The NSA has sprung yet another leak. This time, the English-language edition of Germany’s Der Spiegel has a huge get on an ongoing program called the “Office of Tailored Access Operations“:

… or TAO. This is the NSA’s top operative unit — something like a squad of plumbers that can be called in when normal access to a target is blocked.

According to internal NSA documents viewed by SPIEGEL, these on-call digital plumbers are involved in many sensitive operations conducted by American intelligence agencies. TAO’s area of operations ranges from counterterrorism to cyber attacks to traditional espionage. The documents reveal just how diversified the tools at TAO’s disposal have become — and also how it exploits the technical weaknesses of the IT industry, from Microsoft to Cisco and Huawei, to carry out its discreet and efficient attacks. …

TAO specialists have directly accessed the protected networks of democratically elected leaders of countries. They infiltrated networks of European telecommunications companies and gained access to and read mails sent over Blackberry’s BES email servers, which until then were believed to be securely encrypted. Achieving this last goal required a “sustained TAO operation,” one document states. …

Sometimes it appears that the world’s most modern spies are just as reliant on conventional methods of reconnaissance as their predecessors.

Take, for example, when they intercept shipping deliveries. If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called “load stations,” agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer.

These minor disruptions in the parcel shipping business rank among the “most productive operations” conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain access to networks “around the world.”

Click here for reuse options!
Copyright 2013 Liberaland
By: dave-dr-gonzo

David Hirsch, a.k.a. Dave "Doctor" Gonzo*, is a renegade record producer, video producer, writer, reformed corporate shill, and still-registered lobbyist for non-one-percenter performing artists and musicians. He lives in a heavily fortified compound in one of Manhattan's less trendy neighborhoods.

* Hirsch is the third person to use the pseudonym, a not-so-veiled tribute to journalist and author Hunter S. Thompson, with the permission of his predecessors Gene Gaudette of American Politics Journal (currently webmaster and chief bottlewasher at Liberaland) and Stephen Meese at Smashmouth Politics.