NSA known malwares
7 Chilling Ways the NSA Can Spy On You
Chandra Steele By Chandra Steele
January 15, 2014 08:00am EST
If the news, or perhaps more accurately Russian propaganda, is to be believed, spy gear for U.S. covert operatives consists of an ill-
fitting wig or two, sunglasses, a paper map, a compass, and a pocket knife; the items found on Ryan C. Fogle last spring when he was a
pprehended by Russian authorities and charged with being a CIA operative. The tools of the trade involve considerably more technology.
Just this morning The New York Times reported that the NSA is using radio-wave technology to spy on computers not on the Internet.
In addition, the documents released by Edward Snowden and a report in Der Spiegel suggest that when it comes to U.S. surveillance meth
ods, the tools of the trade involve considerably more technology.
The German newspaper recently published a document from a National Security Agency (NSA) division called ANT, which reads like a catal
ogue of secret spy tactics. ANT's programs have bizarre and slightly hilarious names - from HOWLERMONKEY and JUNIORMINT to DROPOUTJEEP
and WATERWITCH - but the details of what they do and how they do it are more chilling than humorous.
Der Spiegel did not cite sources for its extensive look at how the NSA tracks and captures its information, though it has used Snowden
as a source in the past. Laura Poitras, a journalist and documentary filmmaker who was instrumental in bringing Snowden's NSA documen
ts to light, is also one of the story's authors. The data it obtained is a bit outdated, coming from a 2008 guide for spies, but that
only serves to make it all the more alarming since the NSA's tech tactics can only have progressed since then.
One such tactic is "method interdiction," or when the feds intercept packages when they are en route to the recipient for a few add-on
s they didn't order. Malware or backdoor-enabling hardware is installed in workshops by agents and the item then continues on its way
to the customer.
There are dozens of ANT programs, but here's a rundown of just a few.
This backdoor makes its home at work, hiding out in Proliant servers manufactured by Hewlett-Packard. Hardware is implanted by method
interdiction. Even if the spyware is removed and a system wiped, IRONCHEF lives on.
Good fences might make good neighbors but if you have an ANGRYNEIGHBOR, watch out because they're inside your home. ANGRYNEIGHBOR can
track objects in rooms, listen in, and check out what's displayed on computer monitors.
Being offline won't stop SURLYSPAWN from logging keystrokes. This tactic, which is part of ANGRYNEIGHBOR, does not require a software
download; it uses radio frequency to communicate keystrokes from as far away as across the street.
Also part of ANGRYNEIGHBOR, TAWDRYYARD is described as a beacon that typically helps locate units deployed as part of RAGEMASTER, a $3
0 device that can intercept video between a computer video card's VGA output and a monitor.
The NSA doesn't have to go through phone carriers to track the location of phones. Candygram can mimic the GSM cell tower of a larger
network to silently observe from afar - whether that's keeping track of an asset or identifying hostile surveillance.
Computers running Windows can be attacked from up to eight miles away via an 802.11 wireless exploit. Officials turn to this method wh
en a wired access is not a possibility.
Using remote access or interdiction, IRATEMONK is implanted on target PCs, and can then drop payloads whenever a computer is powered o
n. According to NSA documentation, "this technique supports systems without RAID hardware that boot from a variety of Western Digital,
Seagate, Maxtor, and Samsung hard drives.
Amidst the uproar over NSA spying programs, meanwhile, President Obama launched a review of the agency's tactics. On Friday, he is exp
ected to share his recommendations for curbing surveillance at home and abroad.