Monday, December 30, 2013

NSA Backdoors "Secure" Electronics

The NSA has been putting back doors in American's electronics.  Our enemies will eventually figure out the codes and use these back doors against Americans.  We can no longer trust any of our electronics, EVEN IF new hard drives are installed

It is time for Obama's continutation of Bush's policies to end: close Guantanamo, stop spying on Americans, stop picking fights overseas.


Shopping for Spy Gear: Catalog Advertises NSA Toolbox

... an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry ... And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them. ...

The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000.

In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive "across reboots and software upgrades." In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH "has been deployed on many target platforms." ...

The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on.

This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer.


No comments: