Schneier on Security: More about the NSA’s Tailored Access Operations Unit January 9, 2014Posted by sandyclaus in FBI, NSA, Security, Security State.
These minor disruptions in the parcel shipping business rank among the \”most productive operations\” conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain access to networks \”around the world.\”
They can install the software implants using techniques like QUANTUM and FOXACID.
Related is this list of NSA attack tools. And here is another article on TAO from October.
Remember, this is not just about the NSA. The NSA shares these tools with the FBI\’s black bag teams for domestic surveillance, and presumably with the CIA and DEA as well. Other countries are going to have similar bags of tricks, depending on their sophistication and budgets. And today\’s secret NSA programs are tomorrow\’s PhD theses, and the next day\’s criminal hacking tools. Even if you trust the NSA to only spy on \”enemies,\” consider this an advance warning of what we have to secure ourselves against in the future.