thewayne: (Cyranose)
[personal profile] thewayne
Basically, the NSA doesn't want to watch communications on a computer-by-computer basis. They tap backbones, the connections where huge amounts of information flows between internet servers. They tap major ISPs. Your computer? Chump change. If they know what you're saying to other people, they don't really need to tap your computer. And the thing that makes this possible?

Weak routers.

A router takes the packets generated from all of the computers on your network, wired or wireless, aggregates them, and sends them upstream across your connection to another router at your ISP that has a faster connection, which sends them upstream to another router with a faster connection, etc. Eventually your traffic gets to your destination and information comes back, and the routers (also known as hops) between your PC and the server/site that you wanted to access, can deconstruct the information and get it back to its origin. The problem is that routers are not easy to configure, it takes some specialized information, and that if you need to patch it, you risk breaking the configuration. And a broken configuration means down-time, a bad thing.

So most of the time, once a router is working well and the configuration is backed up, it's pretty rare that they're upgraded. The upgrades are risky because a vast majority of businesses don't have a duplicate network set up so that router patches can be tested.

And a router that is not upgraded, just like your computer, is vulnerable to being compromised and exploited.

So the NSA's money is best spent compromising and monitoring the routers upstream of your connection, because there is a lot more information present at that point, so it's more efficient.

Which is not to say that they can't compromise your computer and get in and look at things directly.

There is an old maxim about what defines a secure computer: it's not connected to any communication device, it's turned off, buried in 10' of concrete, and in a locked room with an armed guard. It's highly unlikely that a computer thus secure can be compromised.

http://www.wired.com/threatlevel/2013/09/nsa-router-hacking/

Date: 2013-09-21 06:17 pm (UTC)
silveradept: A kodama with a trombone. The trombone is playing music, even though it is held in a rest position (Default)
From: [personal profile] silveradept
Or, if the NSA has secret rooms where they tap into the trunks, they don't even have to worry about routers, I suspect.

Date: 2013-09-21 08:50 pm (UTC)
From: [identity profile] thewayne.livejournal.com
Well, tapping trunks gives you access to internet backbones, but it doesn't give you access to internal network communications. That's where the back-doored routers come in to play. And once you're in the router, you're in the network, and can have fun compromising workstations if you want to.

Date: 2013-09-21 09:14 pm (UTC)
silveradept: A kodama with a trombone. The trombone is playing music, even though it is held in a rest position (Default)
From: [personal profile] silveradept
Ah, okay. So once you know where you want to clandestinely hack, hitting the routers is the best way to go.

Date: 2013-09-23 07:30 am (UTC)
From: [identity profile] thewayne.livejournal.com
Yep. Pluck the low-hanging fruit, then go after the high value when you need to. To paraphrase Armand Du Plessis, better known as Cardinal Richelieu, said "Give me six lines written by a man and I will find cause to hang him." I also like his phrase "I don't have enemies, France has enemies."

Date: 2013-09-23 01:50 pm (UTC)
silveradept: A kodama with a trombone. The trombone is playing music, even though it is held in a rest position (Default)
From: [personal profile] silveradept
That sounds like it would for in today's National Security State without anyone blinking an eye.

January 2026

S M T W T F S
    1 23
45678910
11121314151617
18192021222324
25262728293031

Most Popular Tags

Page Summary

Style Credit

Expand Cut Tags

No cut tags
Page generated Jan. 2nd, 2026 05:50 pm
Powered by Dreamwidth Studios