Your Source for Leaks Around the World!

NSA Intercepts Computer Shipping Deliveries of Targets to Install Malware/Backdoors

In Archive, Cisco, Hacking, Malware, NSA, NSA Files, Surveillance, TAO, Technology on December 30, 2013 at 2:33 AM

ACHTUNG SPERRFRIST 30.12.2013 Texas-Biga #01



Sometimes it appears that the world’s most modern spies are just as reliant on conventional methods of reconnaissance as their predecessors.

Take, for example, when they intercept shipping deliveries. If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called “load stations,” agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer.


These minor disruptions in the parcel shipping business rank among the “most productive operations” conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain access to networks “around the world.”

Even in the Internet Age, some traditional spying methods continue to live on.


Declan McCullagh: “If NSA ‘can divert the shipping delivery to its own secret workshops,’ it’s time to pose some pointed questions to Post Office, UPS, FedEx. Seems like NSA would require not only broad access to USPS/Fedex/UPS databases, but active participation in diverting packages.”

Shipping Companies Largely Silent on NSA Intercepting Packages

UPDATE 03/18/2015 Cisco Using Dead Drops for Sensitive Customers to Avoid NSA Interdiction

Related Link: NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware

  1. […] of the leaked Snowden documents, dated June 2010, has two photos of an NSA interdiction operation, with a box that said Cisco on the […]


  2. […] leaked by Edward Snowden describe NSA and CIA interdiction efforts that involve intercepting computer hardware as it’s in transit from a factory or seller and then […]


  3. […] Supply-chain interdiction / Stealthy techniques can crack some of SIGINT’s hardest targets (1MB) (See:NSA Intercepts Computer Shipping Deliveries of Targets to Install Malware/Backdoors) […]


  4. […] their target’s computers or Internet routers to get to the secret encryption — or they intercept computers on the way to their targets, open them and insert spy gear before they even reach their destination, a process they call […]


  5. why bother? – all the NSA needs to do is install some backdoor in Windows 8 OS – and distribute it FREE on pirate network – then sit back and let the pirate OS phone home.


  6. […] LeakSource 0 likesLeaksComputerDeliveriesInstallInterceptsMalware/BackdoorsShippingTargets […]


  7. […] secret weapon. It maintains its own covert network, infiltrates computers around the world and even intercepts shipping deliveries to plant back doors in electronics ordered by those it is […]


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: