rgpsecurity.files.wordpress.com€¦  · web viewfor the nsa’s specialists, using software to...

48

Upload: others

Post on 22-Sep-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 2: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 3: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 4: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 5: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 6: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 7: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 8: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 9: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 10: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 11: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 12: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 13: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 14: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 15: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 16: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 17: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 18: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 19: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 20: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 21: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 22: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 23: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”

The NSA’s ANT division offers a range of ways to gain control over others’ computers. One of these involves installing hardware units on a targeted computer by, for example, intercepting the device when it’s first being delivered to its intended recipient, a process the NSA calls “interdiction.” Other spyware programs can be loaded onto a computer via “remote access.” Some of these programs make the hacked computer secretly divert data via a wireless LAN connection whenever the opportunity arises (program name: “SOMBERKNAVE”). Other NSA spyware programs embed themselves in the computer’s BIOS, the lowest level of software on a device. This location allows them to survive rebooting and even software updates (“SWAP”). Still other programs conceal themselves in the master boot record, the firmware of the affected hard drive (“IRATEMONK”).

Page 24: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 25: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 26: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 27: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 28: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 29: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 30: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 31: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”

When it comes to monitoring and tracking mobile phones, the NSA’s ANT division has an entire range of products on offer. These include everything from specially equipped mobile phone models that make it possible to physically track another mobile phone, to fully equipped GSM base stations capable of masquerading as a network operator’s official mobile phone antennas, and thus monitor and record conversations or text messages from mobile phones within their range. One only has to think of the alleged tapping of German Chancellor Angela Merkel’s mobile phone for examples of their potential uses. Several of these specialized mobile phone base stations also have the capability to determine the exact location of any mobile phone user within their range. Then there is a device called “CANDYGRAM” -- referred to by the ANT technicians as a “telephone tripwire” -- which sends a text message to a command center as soon as certain mobile phone users enter its range.

Page 32: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 33: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 34: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 35: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 36: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 37: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 38: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 39: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 40: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 41: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 42: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 43: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 44: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”

For the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN” goes one step further, by transmitting what a computer user types even when the computer isn’t online. An invisible signal emitted by the implant is modified by every keystroke, and then a radar signal emitted by a device located outside the building makes the implant’s invisible signal visible. This allows agents sitting across the street, for example, to know what a subject is typing on a computer that isn’t connected to the Internet.

Page 45: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”
Page 46: rgpsecurity.files.wordpress.com€¦  · Web viewFor the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN”