NSA builds “back doors” in computers before they reach consumers

Big Brother is watching

Just how much are Americans willing to tolerate?

It’s not enough that President Lucifer’s NSA (National Security Agency) intercepts and spies on our every email, phonecall, bank and credit card transaction, and other communications, the NSA actually intercepts, i.e., hijacks, computers before they reach the consumers.

Why?

So as to build a “back door” in the computers which enables the NSA to spy on us.

Raphael Satter reports for the AP that a German magazine, Der Spiegel, reported on Dec. 29, 2013, that an elite division of the NSA (1) intercepts computer deliveries; (2) exploits hardware vulnerabilities; and (3) even hijacks Microsoft’s internal reporting system to spy on their targets. The NSA division is known as Tailored Access Operations (TAO), which is a team of super-hackers specializing in stealing data from the toughest of targets.

Citing internal NSA documents, Der Spiegel said TAO’s mission is “Getting the ungettable,” and quoted an unnamed intelligence official as saying that TAO had gathered “some of the most significant intelligence our country has ever seen.” TAO employs a catalog of James Bondish high-tech gadgets for particularly hard-to-crack cases, including:

  • Computer monitor cables specially modified to record what is being typed across the screen;
  • USB sticks secretly fitted with radio transmitters to broadcast stolen data over the airwaves;
  • Fake base stations intended to intercept mobile phone signals on the go.

1. NSA intercepts computer deliveries to build “back doors”

When a target orders a new computer or other electronic accessories, TAO coordinates with the FBI and the CIA to intercept the hardware in transit, and take it to a secret workshop where it could be discretely fitted with espionage software before being sent on its way. An NSA document cited by Der Spiegel boasts that intercepting computer equipment in such a way is among the NSA’s “most productive operations,” and has helped harvest intelligence from around the world.

2. NSA exploits hardware vulnerabilities

Purpose: to deliver malicious software to specific computers. The makers of the hardware and software exploited by the NSA include some of the world’s leading information technology companies, including:

  • China’s Huawei Technologies Ltd.; and
  • U.S. companies: Cisco Systems, Inc. of San Jose, California; Western Digital Corp. of Irvine, California; Dell Inc. of Round Rock, Texas. 

3. NSA spies on Microsoft Corp.’s crash reports

Microsoft’s crash reports are familiar to many users of the Windows operating system as the dialogue box that pops up when a game freezes or a Word document dies. The crash reporting system is intended to help Microsoft engineers improve their products and fix bugs, but unbeknown to Microsoft, the NSA also sifts through the reports to help spies break into machines running Windows.

For its part, Microsoft says the information sent by customers about technical issues in these crash reports is limited. A Microsoft rep said in an email to Der Spiegel: “Microsoft does not provide any government with direct or unfettered access to our customer’s data. We would have significant concerns if the allegations about government actions are true.”

Microsoft is one of several U.S. firms that have demanded more transparency from the NSA – and worked to bolster their security – in the wake of the revelations of former intelligence worker Edward Snowden, whose disclosures have ignited an international debate over privacy and surveillance.

Der Spiegel did not explicitly say where its cache of NSA documents had come from, although the magazine has previously published a series of stories based on documents leaked by Snowden, and one of Snowden’s key contacts – American documentary filmmaker Laura Poitras – was listed among the article’s six authors.

And now the latest news:

The Washington Post reports, Jan. 2, 2013, that the NSA is racing to build a quantum computer that’s exponentially faster than classical computers, which can break nearly every kind of encryption used to protect banking, medical, business and government records around the world.

According to documents provided by former NSA contractor Edward Snowden, the effort to build the quantum computer is part of a $79.7 million research program titled “Penetrating Hard Targets.” Much of the work is hosted under classified contracts at a laboratory in College Park, Md.

Read more here.

See also:

~Eowyn

13 responses to “NSA builds “back doors” in computers before they reach consumers

  1. When we hear of European protests against NSA and Google spying, this is what they mean. What does America look like to people in other countries? I think we look as scary as Hitler.

  2. Not buying a computer via Amazon.com now…

  3. Microsoft has been working with the NSA since day one just so you know. All the BS Microsoft says about not knowing things is an outright lie. Take it from someone who knows.

  4. Reblogged this on BLOGGING BAD ~ DICK.G: AMERICAN ! and commented:
    Gunny G~

  5. in this last week,every Conservative news site I read, has been taken over by “obotic bloggers” I mean flooded. They must be getting really desperate.

  6. Pingback: How the Feds Plan to Use the APA, NSA and Obamacare to Get Your Guns | The Daily Sheeple

  7. Pingback: Feds Plan to Use the APA, NSA and Obamacare to Get Your Guns | partneringwitheagles

  8. Pingback: How the Feds Plan to Use the APA, NSA & Obamacare to Get Your Guns

  9. Pingback: How the Feds Plan to Use the APA, NSA and Obamacare to Get Your Guns | Conservative Infidel Conservative Infidel

  10. Pingback: How the Feds Plan to Use the APA, NSA & Obamacare to Get Your Guns |

  11. Pingback: How the Feds Plan to Use the APA, NSA and Obamacare to Get Your Guns | Alternative News Alert!

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s