Jump to content


Photo
- - - - -

The NSA's Tailored Access Operations


  • Please log in to reply
No replies to this topic

#1 Sp1nsp3n

Sp1nsp3n

    SCRiPT KiDDie

  • Binrev Financier
  • 23 posts
  • Country:
  • Gender:Male
  • Location:AZ

Posted 08 March 2014 - 03:09 AM

Credibility of this Research
We first made our discoveries in June 2013 and kept silent so that we could
research the capabilities without being detected. As more Edward Snowden
disclosures were published it became crystal clear that what we discovered is
a major component of the surveillance system.
Those who wish to discredit our evidence, feel free to do so, but do so on a
technical level, simply claiming it “it's not true” or performing some social
attack simply re-enforces it and identifies the “discreditor” as an agent of the
NSA/GCHQ or an agent of the global surveillance system.
Our evidence is based on public available UNMODIFIED firmware images.
To verify our claims using UNMODIFIED images requires connecting a USB
to serial port to the modem motherboard board which allows you to login
(admin/admin) and verify yourself. As most people will find this difficult, we
provided a link to third party MODIFIED images based on official BT release
GNU source code that allow you to telnet to the device (192.168.1.1), this
modified version includes the same backdoor. These can be found here:
http://huaweihg612ha....wordpress.com/
and
http://hackingecibfo....wordpress.com/
The MODIFIED images have been publicly available since August, 2012, long
before the Edward Snowden disclosures.
The methods we published, allows confirmation without having to open the
device. However if you are suspicious of the MODIFIED firmware from August
2012, simply connect to the USB serial port of your own existing unmodified
modem and login to verify, either way the results will be the same.

Here is the original research, complete, and unmodified:
https://www.evernote...63951ca71debaa5




BinRev is hosted by the great people at Lunarpages!