rgpsecurity.files.wordpress.com€¦ · web viewfor the nsa’s specialists, using software to...
TRANSCRIPT
The NSA’s ANT division offers a range of ways to gain control over others’ computers. One of these involves installing hardware units on a targeted computer by, for example, intercepting the device when it’s first being delivered to its intended recipient, a process the NSA calls “interdiction.” Other spyware programs can be loaded onto a computer via “remote access.” Some of these programs make the hacked computer secretly divert data via a wireless LAN connection whenever the opportunity arises (program name: “SOMBERKNAVE”). Other NSA spyware programs embed themselves in the computer’s BIOS, the lowest level of software on a device. This location allows them to survive rebooting and even software updates (“SWAP”). Still other programs conceal themselves in the master boot record, the firmware of the affected hard drive (“IRATEMONK”).
When it comes to monitoring and tracking mobile phones, the NSA’s ANT division has an entire range of products on offer. These include everything from specially equipped mobile phone models that make it possible to physically track another mobile phone, to fully equipped GSM base stations capable of masquerading as a network operator’s official mobile phone antennas, and thus monitor and record conversations or text messages from mobile phones within their range. One only has to think of the alleged tapping of German Chancellor Angela Merkel’s mobile phone for examples of their potential uses. Several of these specialized mobile phone base stations also have the capability to determine the exact location of any mobile phone user within their range. Then there is a device called “CANDYGRAM” -- referred to by the ANT technicians as a “telephone tripwire” -- which sends a text message to a command center as soon as certain mobile phone users enter its range.
For the NSA’s specialists, using software to log keystrokes on a hacked computer is child’s play. The hardware implant “SURLYSPAWN” goes one step further, by transmitting what a computer user types even when the computer isn’t online. An invisible signal emitted by the implant is modified by every keystroke, and then a radar signal emitted by a device located outside the building makes the implant’s invisible signal visible. This allows agents sitting across the street, for example, to know what a subject is typing on a computer that isn’t connected to the Internet.