- Where did Jon Snow go? Unpacking the ‘Game of Thrones’ ending 5 Years Ago
- So, did anyone actually win ‘Game of Thrones’? 5 Years Ago
- The surprising religious subtext of ‘John Wick: Chapter 3’ Today 12:53 PM
- Robin Arryn got hot—and the internet is seriously shook Today 12:40 PM
- Tana Mongeau is going to VidCon a year after TanaCon disaster Today 12:12 PM
- What have 2020 Democrats said about Alabama’s abortion ban? Today 11:36 AM
- People keep throwing milkshakes at the U.K.’s far-right politicians Today 11:10 AM
- James Charles is rebounding from his YouTube scandal—and his mentor is paying the price Today 10:42 AM
- Conservatives accuse Pete Buttigieg of wanting to tear down Jefferson Memorial Today 10:28 AM
- Graduating Moorehouse students thank billionaire for vowing to pay off $40m in student debt Today 10:22 AM
- ‘Westworld’ season 3 trailer gives us a new world, Aaron Paul Today 10:17 AM
- Twitch streamer says she’s receiving backlash for ‘getting men banned’ Today 9:27 AM
- ‘Game of Thrones’ fulfilled a twisted version of its biggest prophecy Today 8:17 AM
- Minions memes are more popular than the far-right on Telegram Today 7:35 AM
- ‘Best of Nextdoor’ reveals the true insanity of modern life Today 7:30 AM
NSA has top-secret catalog of ‘keys’ into world’s security architecture
Everything from corporate computer security architecture to your USB cables are game for NSA spying.
Around the world, corporations, nonprofits and government agencies depend on the computer security architecture made by companies like Cisco, Juniper, and Huawei to protect their most valuable secrets. But for years the vast majority of these systems have been compromised.
A 2008 document obtained by German newspaper Der Spiegel reveals the National Security Agency has been able to slip into the majority of systems made by the major players in the computer security industry, thanks to an entire catalog of resilient and hard-to-detect backdoors, some of which are capable of burrowing as deep as a computer’s motherboard.
The document, which the paper likely received via NSA whistleblower Edward Snowden, is a catalog of what are essentially keys into the world’s security architecture. The tools are produced by an NSA unit called ANT, equivalent to a special operations hacking division, called in to help spy on a target when the NSA’s usual snooping methods aren’t paying off. Its catalog offers a suite of tools in varying degrees of sophistication and expense. As Der Spiegel describes it:
A rigged monitor cable that allows [NSA] personnel to see what is displayed on the targeted monitor,’ for example, is available for just $30. But an ‘active GSM base station’ — a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones — costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.
The paper’s print edition included this image of the USB bugging device, which has since been spread widely on Twitter and Reddit:
COTTONMOUTH-I looks like USB cable but works as wireless bridge into target network, can “jump the airgap”. Scary. pic.twitter.com/l9lMwVXU8p
— Henrik Moltke (@moltke) December 29, 2013
But ANT’s hacking goes well beyond special hardware devices. Its software can compromise the security architecture made by the biggest names in the industry, including Cisco, Huawei, and Juniper—none of which appear to have cooperated with the NSA on the hacks, according to Der Spiegel.
ANT has a special affinity for installing malware on a computer’s BIOS, software that runs on a computer’s motherboard when a computer first loads. A BIOS is completely independent from the computer’s operating system, meaning that the malware is undetectable by virus scans and can persist after an infinite number of system reboots. Another exploit attacks similar firmware in the devices of hard drive manufacturers Western Digital, Seagate, Maxtor and Samsung. All but the former of those companies is American.
Considering the document is more than five years old, not all of the targeted software and hardware is still in use. But if the recent history of the NSA is indication—as revealed via Snowden’s leaked documents—ANT has only become more agressive in its data collection operations.
Illustration by Jason Reed
Kevin Morris is a veteran web reporter and editor who specializes in longform journalism. He led the Daily Dot’s esports vertical and, following its acquisition by GAMURS in late 2016, launched Dot Esports, where he serves as the site’s editor-in-chief.