National Security Agency (NSA) Intercepts FedX and UPS Packages To Install Malware Software — Bugs iPhones and Laptops — TOR Network — Videos

Posted on December 31, 2013. Filed under: American History, Blogroll, Books, Business, College, Communications, Computers, Computers, Constitution, Crime, Economics, Education, Employment, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, government, government spending, history, Language, Law, liberty, Life, Links, media, People, Philosophy, Politics, Press, Programming, Psychology, Rants, Raves, Regulations, Resources, Security, Strategy, Talk Radio, Technology, Terrorism, Unemployment, Video, War, Wealth, Weapons, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , |

NSA Interception: Spy malware installed on laptops bought online

Glenn Greenwald Keynote on 30c3

The Tor Network [30c3] (with Jacob Applebaum)

NSA Spying Project Prism Glenn Greenwald Interview

Glenn Greenwald: The NSA Can “Literally Watch Every Keystroke You Make”

Spiegel has revealed new details about a secretive hacking unit inside the National Security Agency called the Office of Tailored Access Operations, or TAO. The unit was created in 1997 to hack into global communications traffic. Hackers inside the TAO have developed a way to break into computers running Microsoft Windows by gaining passive access to machines when users report program crashes to Microsoft. In addition, with help from the CIA and FBI, the NSA has the ability to intercept computers and other electronic accessories purchased online in order to secretly insert spyware and components that can provide backdoor access for the intelligence agencies. American Civil Liberties Union Deputy Legal Director Jameel Jaffer and journalist Glenn Greenwald join us to discuss the latest revelations, along with the future of Edward Snowden, who has recently offered to assist U.S. targets Germany and Brazil with their respective probes into NSA spying.

TAO Revealed: The NSA’s ‘top secret weapon’

‘NSA’s goal is elimination of privacy worldwide’ – Greenwald to EU (FULL SPEECH)

Glenn Greenwald and Ruth Marcus Get in Explosive Exchange over Snowden and ‘Horrible’ D.C. Media

How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP)

by Tyler Durden

Following up on the latest stunning revelations released yesterday by German Spiegel which exposed the spy agency’s 50 page catalog of “backdoor penetration techniques“, today during a speech given by Jacob Applebaum (@ioerror) at the 30th Chaos Communication Congress, a new bombshell emerged: specifically the complete and detailed description of how the NSA bugs, remotely, your iPhone. The way the NSA accomplishes this is using software known as Dropout Jeep, which it describes as follows: “DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.”

The flowchart of how the NSA makes your iPhone its iPhone is presented below:

  • NSA ROC operator
  • Load specified module
  • Send data request
  • iPhone accepts request
  • Retrieves required SIGINT data
  • Encrypt and send exfil data
  • Rinse repeat

And visually:

What is perhaps just as disturbing is the following rhetorical sequence from Applebaum:

“Do you think Apple helped them build that? I don’t know. I hope Apple will clarify that. Here’s the problem: I don’t really believe that Apple didn’t help them, I can’t really prove it but [the NSA] literally claim that anytime they target an iOS device that it will succeed for implantation. Either they have a huge collection of exploits that work against Apple products, meaning that they are hoarding information about critical systems that American companies produce and sabotaging them, or Apple sabotaged it themselves. Not sure which one it is. I’d like to believe that since Apple didn’t join the PRISM program until after Steve Jobs died, that maybe it’s just that they write shitty software. We know that’s true.”

Or, Apple’s software is hardly “shitty” even if it seems like that to the vast majority of experts (kinda like the Fed’s various programs), and in fact it achieves precisely what it is meant to achieve.

Either way, now everyone knows that their iPhone is nothing but a gateway for the NSA to peruse everyone’s “private” data at will. Which, incidentally, is not news, and was revealed when we showed how the “NSA Mocks Apple’s “Zombie” Customers; Asks “Your Target Is Using A BlackBerry? Now What?

How ironic would it be if Blackberry, left for dead by virtually everyone, began marketing its products as the only smartphone that does not allow the NSA access to one’s data (and did so accordingly). Since pretty much everything else it has tried has failed, we don’t see the downside to this hail mary attempt to strike back at Big Brother and maybe make some money, by doing the right thing for once.

We urge readers to watch the full one hour speech by Jacob Applebaum to realize just how massive Big Brother truly is, but those who want to just listen to the section on Apple can do so beginning 44 minutes 30 seconds in the presentation below.

http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep

Related Posts On Pronk Palisades

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos


Make a Comment

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Liked it here?
Why not try sites on the blogroll...

Follow

Get every new post delivered to your Inbox.

Join 594 other followers

%d bloggers like this: