Methods Uncovered For Disabling The FIVEYE ECHELON / GCHQ / NSA / CSEC / DSD / GCHB Systems
Removing Governmental on-line stranglehold | Disabling major capabilities (BULLRUN / EDGEHILL) | Restoring on-line privacy - immediately
Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
On September 5th 2013, Bruce Schneier, wrote in The Guardian:
“The NSA also attacks network devices directly: routers, switches, firewalls, etc. Most of these devices have surveillance capabilities already built in; the trick is to surreptitiously turn them on. This is an especially fruitful avenue of attack; routers are updated less frequently, tend not to have security software installed on them, and are generally ignored as a vulnerability”.
“The NSA also devotes considerable resources to attacking endpoint computers. This kind of thing is done by its TAO – Tailored Access Operations – group. TAO has a menu of exploits it can serve up against your computer – whether you're running Windows, Mac OS, Linux, iOS, or something else – and a variety of tricks to get them on to your computer.
Your anti-virus software won't detect them, and you'd have trouble finding them even if you knew where to look. These are hacker tools designed by hackers with an essentially unlimited budget. What I took away from reading the Snowden documents was that if the NSA wants in to your computer, it's in. Period”.
The evidence provided by this Full-Disclosure is the first independent technical verifiable proof that Bruce Schneier's statements are indeed correct.
This update includes 10 pages of additional evidence, courtesy of the U.S. Government. Dedicated to the Whistle - Blower Mr Edward J. Snowden.
Click here to learn how to disable them - PDF document