{"id":133656,"date":"2014-05-15T03:58:36","date_gmt":"2014-05-15T07:58:36","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant.php"},"modified":"2014-05-15T03:58:36","modified_gmt":"2014-05-15T07:58:36","slug":"photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant.php","title":{"rendered":"Photos of an NSA upgrade factory show Cisco router getting implant"},"content":{"rendered":"<p><p>    NSA techs perform an unauthorized field upgrade to Cisco    hardware in these 2010 photos from an NSA document.  <\/p>\n<p>    A document included in the trove of National Security Agency    files released with Glenn Greenwalds book No Place to    Hide details how the agencys Tailored Access Operations    (TAO) unit and other NSA employees intercept servers, routers,    and other network gear being shipped to organizations targeted    for surveillance and install covert implant firmware onto them    before theyre delivered. These Trojan horse systems were    described by an NSA manager as being some of the most    productive operations in TAO because they pre-position access    points into hard target networks around the world.  <\/p>\n<p>    The document, a June 2010 internal newsletter article by the    chief of the NSAs Access and Target Development department    (S3261) includesphotos (above) of NSA employees opening    the shipping box for a Cisco router and installing beacon    firmware with a load station designed specifically for the    task.  <\/p>\n<p>    The NSA manager described the process:  <\/p>\n<p>      Heres how it works: shipments of computer network devices      (servers, routers, etc,) being delivered to our targets      throughout the world are      intercepted. Next, they are      redirected to a secret location      where Tailored Access Operations\/Access Operations (AO-S326)      employees, with the support of the Remote Operations Center      (S321), enable the installation of beacon      implants directly into our targets electronic      devices. These devices are then re-packaged and placed back      into transit to the original destination. All of this happens      with the support of Intelligence Community partners and the      technical wizards in TAO.    <\/p>\n<\/p>\n<p>    Sean    Gallagher \/ Sean is Ars Technica's IT Editor. A former Navy    officer, systems administrator, and network systems integrator    with 20 years of IT journalism experience, he lives and works    in Baltimore, Maryland.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/arstechnica.com\/tech-policy\/2014\/05\/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant\" title=\"Photos of an NSA upgrade factory show Cisco router getting implant\">Photos of an NSA upgrade factory show Cisco router getting implant<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> NSA techs perform an unauthorized field upgrade to Cisco hardware in these 2010 photos from an NSA document. A document included in the trove of National Security Agency files released with Glenn Greenwalds book No Place to Hide details how the agencys Tailored Access Operations (TAO) unit and other NSA employees intercept servers, routers, and other network gear being shipped to organizations targeted for surveillance and install covert implant firmware onto them before theyre delivered <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-133656","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/133656"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=133656"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/133656\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=133656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=133656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=133656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}