A document included in the trove of National Security Agency files released with Glenn Greenwald’s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) unit and other NSA employees intercept servers, routers, and other network gear being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they’re delivered.
These Trojan horse systems were described by an NSA manager as being “some of the most productive operations in TAO because they pre-position access points into hard target networks around the world.”
The document, a June 2010 internal newsletter article by the chief of the NSA’s Access and Target Development department (S3261) includes photos (above) of NSA employees opening the shipping box for a Cisco router and installing beacon firmware with a “load station” designed specifically for the task.
The NSA manager described the process:
Here’s how it works: shipments of computer network devices (servers, routers, etc,) being delivered to our targets throughout the world are intercepted. Next, they are redirected to a secret location where Tailored Access Operations/Access Operations (AO-S326) employees, with the support of the Remote Operations Center (S321), enable the installation of beacon implants directly into our targets’ electronic devices. These devices are then re-packaged and placed back into transit to the original destination. All of this happens with the support of Intelligence Community partners and the technical wizards in TAO.
You must login or create an account to comment.
Channel Ars Technica
SITREP: President Trump's Missile Defense Strategy
President Trump has a plan to build a missile wall in space, and to make U.S. allies pay for it.
SITREP: President Trump's Missile Defense Strategy
Hybrid Options for US's Next Top Fighter
The Air Force’s Senior Citizen Chopper Can’t Retire Yet
Ars Live #23: The History and Future of Tech Law
Police re-creation of body camera evidence - Pueblo, CO | Ars Technica
Visual Labs body camera software with the Dos Palos PD | Ars Technica
He knew his rights; he got tased anyway