NSA intercepting laptops ordered online, installing spyware


From planting agents in video games like World of Warcraft to a spy satellite adorned with a world-devouring, tentacled octopus the NSA has shown time and again that it’s willing to go to just about any length to gather intelligence on both domestic and foreign citizens.

The latest report, via Der Spiegel and based on internal NSA documents, reveals that the NSA, in conjunction with the CIA and FBI, has begun intercepting laptops purchased online in order to install spyware and even hardware on the machines. The NSA terms this “interdiction.” Agents divert shipments to secret warehouses, carefully open the packages, install the software and/or hardware, and send them on their way.

The spy agency reportedly has backdoor access to numerous hardware and software systems from prominent tech companies such as Cisco, Dell, and Western Digital, among others. The NSA can even exploit Microsoft Windows error reports to find weak spots in compromised machines in order to install Trojans and other viruses.

As the below giant octopus logo proudly proclaims: “Nothing is beyond our reach.” Lately it appears that this is not so much boasting as a simple statement of fact.

Read entire article...

Even crazier still, the NSA is apparently installing radios into computers, to spy into them even when they are not connected to the Net.

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.

While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.

The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.

The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.

Read entire article...


Thanks to OGer forumnewb for the find!

Get the MMA Underground app. for iPhone and Andriod devices.
iPhone Application Andriod MMA Underground Application

Recent Comments »

Jack Carter site profile image  

1/15/14 10:24 AM by Jack Carter


InconsiderateSerra site profile image  

1/15/14 9:22 AM by InconsiderateSerra

You have no clue what I'm talking about. We're not talking about Dave Dopedealer or even Mikey Murderer or whatever other miserable shitbag is involved in random local crime being set up by equally irrelevant local cops or even DEA agents. We're talking about cases that rise to the level of getting attention from the national intelligence apparatus. These are going to be terrorism cases, espionage cases, cases with nexuses to terrorism or other very, very heavy shit. These are cases that involve deployment of asymmetric strategies and technologies. Depending on the nature of the game they're playing, some of them will be used legally, others illegally however the ones used legally are absolutely, 100% subject to sunshine once used in a criminal prosecution. They're not going to blow high level proprietary technologies/tactics on low level cases. As noted, US v Stumbo was a lesson learned, where a couple retarded field agents buttfucked the governments ability to surprise Hushmail with MAT subpoena because they blew their wad on a totally irrelevant steroid importation case.

crazydave site profile image  

1/15/14 8:34 AM by crazydave


Detachable Penis site profile image  

1/15/14 8:29 AM by Detachable Penis

Nope you're wrong. They ID suspect and have them pulled over for speeding or some bullishit then search to find what they are looking for. They don't have to blow any cover they just back engineer a case on you. It's already happening dude. You don't see all these "drug bust" where the guy had a tail light out or was speeding and you think that dumb mother fucker was speeding with dope in the car? No they already knew which car to pull over and they were just waiting for it to drive by.

Cletus Redpecker III site profile image  

1/15/14 8:15 AM by Cletus Redpecker III

"If they're doing this to you, you're more than 'on a list somewhere' because you went to an Occupy Rally. You're a serious suspect in very heavy shit."If that's the case, then booby trap them bitches Law Abiding Citizen style and be done with it.

InconsiderateSerra site profile image  

1/15/14 7:41 AM by InconsiderateSerra

It's a perfectly sensible thing to do. Its' just that people are confusing a tailored operation with a mass surveillance operation. This is absolutely a tailored operation, in the same category of shit they've always done (bugging communication devices), occasionally abused but most everyone agrees they have a right to do. No question whatsoever covertly intercepting laptops is a VERY limited scope strategy. If they're doing this to you, you're more than 'on a list somewhere' because you went to an Occupy Rally. You're a serious suspect in very heavy shit.The .gov is acutely aware of the need to limit certain asymmetric specialty tactics to high value targets only, reason being is that once someone gets charged, they have to let the cat out of the bag during the discovery process and it all becomes public record.Say for example they already do know how to decrypt something like Truecrypt. They're not going to blow their cover to get a random Child Porn case, but they may consider it to get a high value terrorist target. A great example was Hushmail. It was a rats nest of shitheads and regular privacy minded people alike. The .gov knew it was compromisable via records subpoena however a couple dumbass agents in the DEA and FBI blew it open over an extremely low level steroid importation case.They learned from that.

Brennan Huff site profile image  

1/14/14 8:35 PM by Brennan Huff

Vtfu, i read something similar in the conspiracy ground

Cletus Redpecker III site profile image  

1/14/14 8:28 PM by Cletus Redpecker III

Seems to be a terribly inefficient way to do this.I'm calling B.S. on this one.

InconsiderateSerra site profile image  

1/14/14 7:32 PM by InconsiderateSerra

This comes as no shock. The FBI and other federal LE agencies have always had all manner of 'tricks' they use against suspects from covert in-and-out planting of surveillance devices persuading them to become a "Nielson Family" and have a set top box installed that is really a covert observation device. The question here is scope. There is undoubtedly mass surveillance shit going on that needs to be tightened up but people who think the NSA is randomly dispatching the TAO team to bug any and every random ass laptop that ships from Tiger Direct, well, you're a fucking moron... however if you're Mullah Abdullah Hula, known radical Muslim cleric with ties to terrorist orgs preaching Jihad from your mosque in Dearborn, you are already under surveillance and order a new laptop, yeah. Maybe you might have something to worry about but as far as I'm concerned, fuck him.

UGCTT_mrthesnake site profile image  

1/14/14 7:32 PM by UGCTT_mrthesnake

NSA is blocking this thread!!!