“SPIEGEL published two pieces this morning about the NSA’s Tailored Access Operations (TAO) division, aka premier hacking ninja squad. According to Snowden documents, TAO has a catalog of all the commercial equipment that carries NSA backdoors. And it’s a who’s who of a list. Storage products from Western Digital, Seagate, Maxtor and Samsung have backdoors in their firmware, firewalls from Juniper Networks have been compromised, plus networking equipment from Cisco and Huawei, and even unspecified products from Dell. TAO actually intercepts online orders of these and other electronics to bug them.
SPIEGEL notes that the documents do not provide any evidence that the manufacturers mentioned had any idea about this NSA activity. Every company spokesperson contacted by Spiegel reporters denied having any knowledge of the situation, though Dell officials said instead that the company “respects and complies with the laws of all countries in which it operates.”
TAO uses software hacking in things like Windows bug reports to get the information and device control they need, of course. But if that’s not enough, they even have a special group of hardware hackers who create modified equipment for TAO specialists to try and plant. A monitor cable that allows “TAO personnel to see what is displayed on the targeted monitor,” costs $30. An “active GSM base station” for monitoring cellphone calls costs $40,000, and converted flashdrives that plant bugs and can also transmit and receive data with hidden radio signals come in 50-packs for more than $1 million. The NSA octopus spreads its tentacles even further. [SPIEGEL, SPIEGEL]”
The-NSA-actually-intercepted-packages-to-put-backdoors-in-Electronics