Catalog of NSA compromised equipments

D. Hugh Redelmeier hugh-pmF8o41NoarQT0dZR+AlfA at public.gmane.org
Wed Jan 1 04:17:05 UTC 2014


| From: D. Hugh Redelmeier <hugh-pmF8o41NoarQT0dZR+AlfA at public.gmane.org>

| | From: William Muriithi <william.muriithi-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org>
| 
| | http://leaksource.wordpress.com/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-software-hardware-firmware/

| I've stopped reading for now, at about half way down.
| 
| All these revelations seem to be from about 2007.  Who knows what they
| are up to now.

Reading more...

Some are as recent as 2009.

SWAP provides "software application persistence" by exploiting the
BIOS and the HDD's Host Protected Area.  Works with Windows, Linux,
FreeBSD, or Solaris (as of 2007).

Cottonmouth (I, II, and III) are USB plugs that contain network
exfiltration capability.

Ragemaster is a little thing that you put in a VGA cable that captures
the red signal and makes it available for exfiltration via a RADAR
unit.
--
The Toronto Linux Users Group.      Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists





More information about the Legacy mailing list