‘Getting the ungettable’: Leaks reveal NSA’s top hacking unit

1/1/14. ‘Getting the ungettable’: Leaks reveal NSA’s top hacking unit. rt.com

Documents leaked by Edward Snowden have uncovered a secret NSA hacking unit which delivered the US some of its most significant intelligence information in recent years. The unit has been tapping into computers and networks since the dawn of the internet.

Der Spiegel described the Office of Tailored Access Operations (TAO) as “something like a squad of plumbers that can be called in when normal access to a target is blocked.”

According to the secret documents obtained by the German news magazine, TAO specialists are involved in the most sensitive operations of US intelligence – including counterterrorism, cyber-attacks, and traditional espionage.

The unit, which was created at the dawn of the internet, was developed with the mission of “getting the ungettable.”

It’s not about the quantity produced, but the quality of intelligence that is important,” a former TAO boss wrote, describing her work in a document. She added that her hacked had contributed to “some of the most significant intelligence our country [the US] has ever seen.”

She stated that TAO “needs to continue to grow and must lay the foundation for integrated Computer Network Operations” and that it must also “support Computer Network Attacks as an integrated part of military operations.”

In order to achieve those aims, the unit has to gain “pervasive, persistent access on the global network,” the ex-chief said.

The top secret unit has succeeded in gaining access to 258 targets in 89 countries. In 2010 alone, it conducted 279 global operations, according to the documents.

Der Spiegel reported that TAO specialists have directly accessed the protected networks of democratically elected leaders of different states. They infiltrated networks of European telecommunications companies and gained access to messages sent over Blackberry’s BES email servers – which are considered to be securely encrypted.

The papers state that TAO recruits its staff among “geeks” at hacker conferences, with NSA director Keith Alexander visiting several such events in recent years.

TAO was originally located at the NSA’s headquarters in Fort Meade, Maryland. But the unit has since expanded, with offices in Wahiawa, Hawaii; Fort Gordon, Georgia; Buckley Air Force Base near Denver, Colorado; and San Antonio, Texas.

The document shows that the NSA’s “on-call digital plumbers” also have a European branch – the European Security Operations Centre (ESOC), stationed at the so-called “Dagger Complex” at a US military compound near Frankfurt, Germany.

Hacking Mexico’s security agency

Mexico has been a prime target for US intelligence, with surveillance assigned to TAO’s San Antonio branch – situated just 200 kilometers from the US-Mexico border.

The unit’s hackers accessed the network of Mexico’s Secretariat of Public Security, which is responsible for overseeing the country’s police, prison system, counter-terrorism operations, and border officers.

The NSA is most interested in information on the drug trade, as well as overall security and human trafficking taking place at the border, according to the documents.

As part of ‘Operation WHITETAMALE,’ TAO infiltrated the Secretariat’s network by breaking into the emails of elected systems administrators and telecommunications engineers. Hackers then began mining large amounts of data.

The NSA spies had wide knowledge of the agency’s servers – including IP addresses, computers used for email traffic, and individual addresses of employees. They also obtained diagrams of the security agency’s structures, including video surveillance.

The operation has been going on for years, Spiegel said, and was aborted only after the paper reported the news for the first time in October.

The NSA’s internal division labels the type of activity TAO performed against the Mexican agency as “Computer Network Exploitation” (CNE).

Its goal is to “subvert endpoint devices,” including servers, workstations, firewalls, routers, handsets, phone switches, and industrial control systems used at factories and power plants – otherwise known as SCADAs.

Tapping global underwater internet cables

The NSA’s push for global surveillance explains its interest towards the fiber optic cables which direct a large share of global internet traffic along the world’s ocean floors.

A document labeled “top secret” and “not for foreigners” describes the success of US intelligence in spying on the SEA-ME-WE-4 cable system.

The system is a massive underwater cable bundle which connects Europe with North Africa and the Gulf states before continuing through Pakistan and India and onto Malaysia and Thailand.

The cable system originates in southern France, near Marseille, with French Orange and Telecom Italia Sparkle being among the primary stakeholders in the project.

According to the document, TAO “successfully collected network management information for the SEA-Me-We Undersea Cable Systems (SMW-4)” on February 13, 2013.

The agency was able to “gain access to the consortium’s management website and collected Layer 2 network information that shows the circuit mapping for significant portions of the network.”

The document states that the TAO team hacked an internal website of the operator consortium and copied documents stored there pertaining to technical infrastructure.

But the NSA has no intention of resting its oars. “More operations are planned in the future to collect more information about this and other cable systems,” the document states.

Advertisements
This entry was posted in Surveillance State and tagged . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s