I wouldn’t be so sure about that. Cottonmouth is only one of the methods they use to monitor data in an isolated (no network) environment. If you think about the sheer number of wireless networks out there, and the fact that they already said Nightstand can inject packets of data from 8 miles away, I’d bet money that they can pretty easily intercept data from pretty much any standard wireless network if they really wanted to. They also mentioned micro-circuitry that’s used in a similar fashion to the Cottonmouth method.
Jesus, as I was writing this I just remembered the whole RSA scandal that was uncovered a few weeks back (Source). Talk about a perfect way to distribute Cottonmouth!? Who’s to say that every one of the RSA key’s sold and used with this flawed algorithm designed by the NSA, also doesn’t double as a radio-transmitter like Cottonmouth? It’d be the perfect double whammy:
Step 1: If the user is online, they can use the backdoor built-in to the algorithm to gain real-time access, like a trojan virus. This would then allow further installation/distribution of software to keep the door “held open” too.
Step 2: In the event that the PC was offline yet still accessing a secure date source via the RSA key, they would simply need a little briefcase (Nightstand) located somewhere within their acceptable 8-mile radius to accomplish the exact same thing.
This is probably worthy of another thread, but directly related to the OP. S&F for the find, should be interesting come Friday.
edit on 16-1-2014 by parad0x122 because: typo
AboveTopSecret.com New Topics In Breaking Alternative News
NSA Quantum Program Leaked: Edward Snowden Reveals How US Government Spies On Offline Computers
No comments:
Post a Comment