NSA Gave Them A Ferrari, And the CIA Treated It Like A Lawnmower – AND How To Detect If You've Been Hacked

Sharing is Caring!

Just like in the Borne Legacy.
When one bureaucracy has to get support from another, there’s always pressure to do it yourself – like the Army and the National Reconnaissance Office (NRO). The Army got so sick of the bureaucratic mess of requesting satellite photos from the NRO they even went so far as to build their own satellites. For experimentation purposes, of course!
The same thing happened here. I suspect the NSA provided the foundation for cyber exploitation, and the CIA built that into this massive monster being exposed now.
The only problem is the CIA didn’t have the 70 years of tribal knowledge that the NSA had in keeping things quiet, when to exploit and when not to. The CIA is more action oriented; the NSA, quiet spooks that listen mostly.
Yep, it was a little bit like this:

You can check your home network for some of these exploits.
You need an old laptop and a network hub – not a switch.
Load the laptop with Kali Linux, the appropriate flavor for the CPU you have – x32 or x64. Or you could just download Wireshark for Windows.
Then connect the hub between the cable modem and your WiFi router/switch (home-use routers are also switches).
Run a one-way Ethernet cable from the hub to your monitoring computer. This prevents the monitoring computer from sending packets or being detected on your internal net.
Start up Wireshark in Windows or Linux. Set the capture to the Ethernet port in Promiscuous Mode. Turn off all networked devices in the house (but not your router, hub, or cable modem). Watch the packets, and in time you will be able to determine what is normal machine chatter and what is anomalous encrypted TCP/IP packets. You then can filter out the machine chatter with capture rules in Wireshark.
You may want to let the sniffer run all night to get a good capture.

Building your own network sniffer:
www.techworld.com/tutorial/networking/build-your-own-network-sniffer-on-linux-2491/
Building your own hub port:
www.instructables.com/id/Make-a-Passive-Network-Tap/
How to neuter a cell phone:


You have to run a special antivirus made to detect government malware that bypasses regular antivirus software.
Detekt — Free Anti-Malware Tool To Detect Govt. Surveillance Malware
Detekt was developed by security researcher Claudio Guarnieri, who has been investigating government abuse of spyware for years and often collaborates with other researchers at University of Toronto’s Citizen Lab.
“It was intended as a triaging utility for human rights workers travelling around. It is not an AV [AntiVirus],” explained the developer Claudio Guarnieri in an online discussion about the tool on Twitter with other security researchers.
thehackernews.com/2014/11/detekt-free-anti-malware-tool-to-detect_20.html
 
h/t Cheyenne

735 views

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.