Now we can see the catalog itself. Courtesy this post on Leaksource, you can flip through the numerous single-page descriptions of the NSA’s specialized hardware.
For example, there’s FEEDTHROUGH, a method for gaining access to firewalls from Juniper Network’s Netscreen product line. There’s also JETPLOW, which burrows into firewalls from Cisco Systems. In a stroke of irony that will not be lost on anyone, there’s HEADWATER, which is used on routers from China’s Huawei.
Here are a few more that caught my eye: NIGHTSTAND, a mobile Wi-Fi exploitation and insertion device “typically used where wired access to a target is not possible.” PICASSO is an otherwise typical, if outdated, GSM wireless phone (including two models from Samsung) that “collects user data, location information and room audio” and allows data to be collected via a laptop or via SMS “without alerting the target.”
And this one blows my mind: COTTONMOUTH-I. To the untrained eye, it looks like a typical USB plug at the end of an otherwise unremarkable USB cord. Inside there is a motherboard that provides a “wireless bridge into a target network as well as the ability to load exploit software onto target PCs.”
Here’s where to find it, if you want to look for yourself.
Tagged with: ATD Facebook, Cisco, Cisco Systems, Edward Snowden, firewalls, hardware hacking., Huawei Technologies, Juniper Networks, mobile phones, National Security Agency, NSA, security, spying, surveillance, USB Powered by LivefyreApple Denies Working with NSA on iPhone Backdoor
December 31, 2013 at 8:49 am PT
HP Is Negotiating to Settle Bribery Charges
December 30, 2013 at 8:45 am PT
CIOs Brand Enterprise Social Tools as Most Overhyped Technology of the Year
December 30, 2013 at 3:39 am PT
Malware Attacks by Syrian Pro-Government Hackers Are on the Rise
December 27, 2013 at 1:27 pm PT
Sign up here with your email
ConversionConversion EmoticonEmoticon