Please register on futures.io to view futures trading content such as post attachment(s), image(s), and screenshot(s).
Translated the important "hardware" part of the article:
Packages opened by post, manipulated computer
Often the ANT developers try to place their malicious code in the so-called Bios, software that sits directly on the motherboard of a computer and is first loaded on power up. Even if the hard disk is deleted and a new operating system will be kept up, the ANT- malware programs will continue to work and can ensure that later spyware and sniffer software is reloaded.
In addition to the BIOS of computers and servers, the State Hacker attack the firmware of hard drives, to a certain extent the software that only brings the hardware to run. The offer is about a spy program, the so spy can lurk on hard drives from Western Digital, Seagate and Samsung - even the first two companies are from the United States. On demand Western Digital specifies to know nothing of this implantation by the government, denied to have helped here. From other companies, there are currently no comments so far.
Many of the digital assault weapons can be installed remotely, ie over the Internet. Others require a direct intervention, interdiction is called in the NSA jargon. This means that shipped, brand new products will be caught secretly by post, to use hardware or software implants. Only then is the packet is routed to its proper destination.
Windows error messages as a potential source of information
How creative the team operates, shows a method that relies on the error rate of the Microsoft Windows operating system. Probably every Windows user has got the standard window prompting the customer to send a problem report to Microsoft. These reports would be "confidential and anonymous" assures this window.
For the TAO specialists are these bug reports, according to internal documents, a great potential source of information. Have they put a Internet-connected computer, anywhere in the world once as target , they can ensure that they will be notified as soon as the monitored user submits such a bug report.
A comment in the article mentioned in upper post proposes how to fight back NSA
spy attacks: Internet users can stir up the spy program heavily. If in any sent mail
a sentence of a combination of NSA spy words will be integrated, the base of people to
survey suddenly explodes. To hide that sentence from reading it may be written in white
text on white background.