Online: | |
Visits: | |
Stories: |
Is the NSA behind a sophisticated way of implanting spyware on hard drives?
HOWLERMONKEY:
A radio transceiver for extracting data from systems or making them remote-controllable.
MONKEYCALENDAR:
Attack software that sends a mobile phone’s location by covert text message.
DIETYBOUNCE:
Installs a secret payload in a Dell DELL computer by reflashing the motherboard BIOS when the machine is turned on.
NIGHTSTAND:
A mobile system for wirelessly installing exploits of Microsoft MSFT -0.07% Windows from up to eight miles away.
SOMBERKNAVE:
A Windows XP implant to connect computers to NSA headquarters, from where they can be remotely controlled.
ANGRYMONK:
Inserts itself into the firmware of hard drives made by Western Digital WDC 0.77% , Seagate STX 0.46% , Maxtor and Samsung.
SWAP:
Reflashes the BIOS
of multiprocessor systems running Windows, Solaris, Linux or FreeBSD.
SPARROW II:
A tool for detecting and mapping wireless networks via drone.
TOTEGHOSTLY:
An implant that allows full remote control of Window Mobile phones.
DROPOUTJEEP:
(I quote) “A software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality.
This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc.
Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection.
All communications with the implant will be covert and encrypted.”
Appelbaum found references to a long list of U.S. companies whose gear the NSA targeted — including the agency’s favorite phishing holes: Yahoo! YHOO 1.65% and Time Warner’s TWX 0.41% CNN.com.
But it was the last item,
DROPOUTJEEP, the only exploit out of 50 that specifically targeted at an Apple product, that became every editor’s favorite second-day story.
By Tuesday morningTechmeme had assembled more than 30 headlines about DROPOUTJEEP and made the Daily Dot’s.
The NSA has nearly complete backdoor access to Apple’s iPhone its lead story.
Okay, folks, here is the deal …
… is the NSA trampling on the Constitution of the United States? Yes.
Is the NSA activity absolutely illegal? Yes. Is the NSA activity very scary? Yeah, for the most part.
Do U.S. citizens need the NSA to continue said activity? Maybe.
What’s wrong with it? Answer: You’re next.
Right now the targets are Islamic extremists. Tomorrow it will be right wing radicals, or left wing subversives…
It all comes back to Ben Franklin’s adage: “Those willing to give up essential liberty to get a small temporary safety deserve neither liberty nor safety”– B.F.
Perhaps if we shutdown the eyes and ears of our government, our enemies will use our technologies against us… perhaps if we allow our government to keep their eyes and ears open on U.S. citizens, our government will become our enemy.
Will we have freedom or tyranny? We the people need to decide. Be AWARE and be PREPARED, FEAR is not an option. Be safe everyone…
http://www.androidpit.com/nsa-gchq-hacking-sim-cards-snowden
http://www.cnet.com/news/nsa-planted-surveillance-software-on-hard-drives-report/
The Rabbit Hole Goes Real Deep, Find Out How Deep… HERE
And Here