It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
A document included in the trove of National Security Agency files released with Glenn Greenwald’s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) unit and other NSA employees intercept servers, routers, and other network gear being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they’re delivered.
The US authorities have banned the sale of Chinese manufactured telecoms equipment in the domestic market after complaining about the Chinese Government doing exactly the same.
A report from the US House Intelligence Committee in 2012 accused two Chinese telecom equipment manufacturers Huawei and ZTE of conniving with the state agencies in implanting spy material on the goods meant for exports.
In an interview to Reuters CyberSecurity Summit in Washington, Rogers defended NSA's surveillance programme. He said that some NSA staff were "confused" by the onslaught of criticism because a series of official reviews found that the agency had for the most part abided by US law.
For networks that the NSA can't get to physically, there's NIGHTSTAND, a self-contained Wi-Fi hacking system that can break into networks up to eight miles away, in optimum conditions. NIGHTSTAND hijacks the target network and uses packet injection attacks to install exploits on the target network's computers. Combined with a Windows exploit called SOMBERKNAVE, which uses a computer's Wi-Fi adapter to "phone home" with data, it could be used to collect data from target computers even when they're not intentionally connected to a network.