31-12-2013, 09:03 AM
12/29/201309:18 AM
InsideTAO
DocumentsReveal Top NSA Hacking Unit
BySPIEGEL StaffTheNSA's TAO hacking unit is considered to be the intelligence agency'stop secret weapon. It maintains its own covert network, infiltratescomputers around the world and even intercepts shipping deliveries toplant back doors in electronics ordered by those it is targeting.
InJanuary 2010, numerous homeowners in San Antonio, Texas, stoodbaffled in front of their closed garage doors. They wanted to driveto work or head off to do their grocery shopping, but their garagedoor openers had gone dead, leaving them stranded. No matter how manytimes they pressed the buttons, the doors didn't budge. The problemprimarily affected residents in the western part of the city, aroundMilitary Drive and the interstate highway known as Loop 410.
Inthe United States, a country of cars and commuters, the mysteriousgarage door problem quickly became an issue for local politicians.Ultimately, the municipal government solved the riddle. Fault for theerror lay with the United States' foreign intelligence service, theNational Security Agency, which has offices in San Antonio. Officialsat the agency were forced to admit that one of the NSA's radioantennas was broadcasting at the same frequency as the garage dooropeners. Embarrassed officials at the intelligence agency promised toresolve the issue as quickly as possible, and soon the doors beganopening again.
Itwas thanks to the garage door opener episode that Texans learned justhow far the NSA's work had encroached upon their daily lives. Forquite some time now, the intelligence agency has maintained a branchwith around 2,000 employees at Lackland Air Force Base, also in SanAntonio. In 2005, the agency took over a former Sony computer chipplant in the western part of the city. A brisk pace of constructioncommenced inside this enormous compound. The acquisition of theformer chip factory at Sony Place was part of a massive expansion theagency began after the events of Sept. 11, 2001.
On-CallDigital Plumbers
Oneof the two main buildings at the former plant has since housed asophisticated NSA unit, one that has benefited the most from thisexpansion and has grown the fastest in recent years -- the Office ofTailored Access Operations, or TAO. This is the NSA's top operativeunit -- something like a squad of plumbers that can be called in whennormal access to a target is blocked.
Accordingto internal NSA documents viewed by SPIEGEL, these on-call digitalplumbers are involved in many sensitive operations conducted byAmerican intelligence agencies. TAO's area of operations ranges fromcounterterrorism to cyber attacks to traditional espionage. Thedocuments reveal just how diversified the tools at TAO's disposalhave become -- and also how it exploits the technical weaknesses ofthe IT industry, from Microsoft to Cisco and Huawei, to carry out itsdiscreet and efficient attacks.
Theunit is "akin to the wunderkind of the US intelligencecommunity," says Matthew Aid, a historian who specializes in thehistory of the NSA. "Getting the ungettable" is the NSA'sown description of its duties. "It is not about the quantityproduced but the quality of intelligence that is important," oneformer TAO chief wrote, describing her work in a document. The paperseen by SPIEGEL quotes the former unit head stating that TAO hascontributed "some of the most significant intelligence ourcountry has ever seen." The unit, it goes on, has "accessto our very hardest targets."
AUnit Born of the Internet
Definingthe future of her unit at the time, she wrote that TAO "needs tocontinue to grow and must lay the foundation for integrated ComputerNetwork Operations," and that it must "support ComputerNetwork Attacks as an integrated part of military operations."To succeed in this, she wrote, TAO would have to acquire "pervasive,persistent access on the global network." An internaldescription of TAO's responsibilities makes clear that aggressiveattacks are an explicit part of the unit's tasks. In other words, theNSA's hackers have been given a government mandate for their work.During the middle part of the last decade, the special unit succeededin gaining access to 258 targets in 89 countries -- nearly everywherein the world. In 2010, it conducted 279 operations worldwide.
Indeed,TAO specialists have directly accessed the protected networksof democraticallyelected leaders ofcountries. They infiltrated networks of European telecommunicationscompanies and gained access to and read mails sent over Blackberry'sBES email servers, which until then were believed to be securelyencrypted. Achieving this last goal required a "sustained TAOoperation," one document states.
ThisTAO unit is born of the Internet -- created in 1997, a time when noteven 2 percent of the world's population had Internet access and noone had yet thought of Facebook, YouTube or Twitter. From the timethe first TAO employees moved into offices at NSA headquarters inFort Meade, Maryland, the unit was housed in a separate wing, setapart from the rest of the agency. Their task was clear from thebeginning -- to work around the clock to find ways to hack intoglobal communications traffic.
Recruitingthe Geeks
Todo this, the NSA needed a new kind of employee. The TAO workersauthorized to access the special, secure floor on which the unit islocated are for the most part considerably younger than the averageNSA staff member. Their job is breaking into, manipulating andexploiting computer networks, making them hackers and civil servantsin one. Many resemble geeks -- and act the part, too.
Indeed,it is from these very circles that the NSA recruits new hires for itsTailored Access Operations unit. In recent years, NSA Director KeithAlexander has made several appearances at major hacker conferences inthe United States. Sometimes, Alexander wears his military uniform,but at others, he even dons jeans and a t-shirt in his effort tocourt trust and a new generation of employees.
Therecruitment strategy seems to have borne fruit. Certainly, few if anyother divisions within the agency are growing as quickly as TAO.There are now TAO units in Wahiawa, Hawaii; Fort Gordon, Georgia; atthe NSA's outpost at Buckley Air Force Base, near Denver, Colorado;at its headquarters in Fort Meade; and, of course, in San Antonio.
Onetrail also leads to Germany. According to a document dating from 2010that lists the "Lead TAO Liaisons" domestically and abroadas well as names, email addresses and the number for their "SecurePhone," a liaison office is located near Frankfurt -- theEuropean Security Operations Center (ESOC) at the so-called "DaggerComplex"at a US military compound in the Griesheim suburb of Darmstadt.
Butit is the growth of the unit's Texas branch that has been uniquelyimpressive, the top secret documents reviewed by SPIEGEL show. Thesedocuments reveal that in 2008, the Texas Cryptologic Center employedfewer than 60 TAO specialists. By 2015, the number is projected togrow to 270 employees. In addition, there are another 85 specialistsin the "Requirements & Targeting" division (up from 13specialists in 2008). The number of software developers is expectedto increase from the 2008 level of three to 38 in 2015. The SanAntonio office handles attacks against targets in the Middle East,Cuba, Venezuela and Colombia, not to mention Mexico, just 200kilometers (124 miles) away, where the government has fallen into theNSA's crosshairs.
TargetingMexico
Mexico'sSecretariat of Public Security, which was folded into the newNational Security Commission at the beginning of 2013, wasresponsible at the time for the country's police, counterterrorism,prison system and border police. Most of the agency's nearly 20,000employees worked at its headquarters on Avenida Constituyentes, animportant traffic artery in Mexico City. A large share of the Mexicansecurity authorities under the auspices of the Secretariat aresupervised from the offices there, making Avenida Constituyentes aone-stop shop for anyone seeking to learn more about the country'ssecurity apparatus.
OperationWHITETAMALE
Thatconsidered, assigning the TAO unit responsible for tailoredoperations to target the Secretariat makes a lot of sense. After all,one document states, the US Department of Homeland Security and theUnited States' intelligence agencies have a need to know everythingabout the drug trade, human trafficking and security along theUS-Mexico border. The Secretariat presents a potential "goldmine"for the NSA's spies, a document states. The TAO workers selectedsystems administrators and telecommunications engineers at theMexican agency as their targets, thus marking the start of what theunit dubbed Operation WHITETAMALE.
Workersat NSA's target selection office, which also had Angela Merkel in itssights in 2002 before she became chancellor, sent TAO a list ofofficials within the Mexican Secretariat they thought might makeinteresting targets. As a first step, TAO penetrated the targetofficials' email accounts, a relatively simple job. Next, theyinfiltrated the entire network and began capturing data.
Soonthe NSA spies had knowledge of the agency's servers, including IPaddresses, computers used for email traffic and individual addressesof diverse employees. They also obtained diagrams of the securityagencies' structures, including video surveillance. It appears theoperation continued for years until SPIEGEL firstreported on it in October.
Thetechnical term for this type of activity is "Computer NetworkExploitation" (CNE). The goal here is to "subvert endpointdevices," according to an internal NSA presentation that SPIEGELhas viewed. The presentation goes on to list nearly all the types ofdevices that run our digital lives -- "servers, workstations,firewalls, routers, handsets, phone switches, SCADA systems, etc."SCADAs are industrial control systems used in factories, as well asin power plants. Anyone who can bring these systems under theircontrol has the potential to knock out parts of a country's criticalinfrastructure.
Themost well-known and notorious use of this type of attack was thedevelopment of Stuxnet, the computer worm whose existence wasdiscovered in June 2010. The virus was developed jointly by Americanand Israeli intelligence agencies to sabotage Iran's nuclear program,and successfully so. The country's nuclear program was set back byyears after Stuxnet manipulated the SCADA control technology used atIran's uranium enrichment facilities in Natanz, rendering up to 1,000centrifuges unusable.
Thespecial NSA unit has its own development department in which newtechnologies are developed and tested. This division is where thereal tinkerers can be found, and their inventiveness when it comes tofinding ways to infiltrate other networks, computers and smartphonesevokes a modern take on Q, the legendary gadget inventor in JamesBond movies.
HavingFun at Microsoft's Expense
Oneexample of the sheer creativity with which the TAO spies approachtheir work can be seen in a hacking method they use that exploits theerror-proneness of Microsoft's Windows. Every user of the operatingsystem is familiar with the annoying window that occasionally pops upon screen when an internal problem is detected, an automatic messagethat prompts the user to report the bug to the manufacturer and torestart the program. These crash reports offer TAO specialists awelcome opportunity to spy on computers.
WhenTAO selects a computer somewhere in the world as a target and entersits unique identifiers (an IP address, for example) into thecorresponding database, intelligence agents are then automaticallynotified any time the operating system of that computer crashes andits user receives the prompt to report the problem to Microsoft. Aninternal presentation suggests it is NSA's powerful XKeyscore spyingtool that is used to fish these crash reports out of the massive seaof Internet traffic.
Theautomated crash reports are a "neat way" to gain "passiveaccess" to a machine, the presentation continues. Passive accessmeans that, initially, only data the computer sends out into theInternet is captured and saved, but the computer itself is not yetmanipulated. Still, even this passive access to error messagesprovides valuable insights into problems with a targeted person'scomputer and, thus, information on security holes that might beexploitable for planting malware or spyware on the unwitting victim'scomputer.
Althoughthe method appears to have little importance in practical terms, theNSA's agents still seem to enjoy it because it allows them to have abit of a laugh at the expense of the Seattle-based software giant. Inone internal graphic, they replaced the text of Microsoft's originalerror message with one of their own reading, "This informationmay be intercepted by a foreign sigint system to gather detailedinformation and better exploit your machine." ("Sigint"stands for "signals intelligence.")
Oneof the hackers' key tasks is the offensive infiltration of targetcomputers with so-called implants or with large numbers of Trojans.They've bestowed their spying tools with illustrious monikers like"ANGRY NEIGHBOR," "HOWLERMONKEY" or "WATERWITCH."These names may sound cute, but the tools they describe are bothaggressive and effective.
Accordingto details in Washington's current budget plan for the USintelligence services, around 85,000 computers worldwide areprojected to be infiltrated bythe NSA specialists by the end of this year. By far the majority ofthese "implants" are conducted by TAO teams via theInternet.
IncreasingSophistication
Untiljust a few years ago, NSA agents relied on the same methods employedby cyber criminals to conduct these implants on computers. They senttargeted attack emails disguised as spam containing links directingusers to virus-infected websites. With sufficient knowledge of anInternet browser's security holes -- Microsoft's Internet Explorer,for example, is especially popular with the NSA hackers -- all thatis needed to plant NSA malware on a person's computer is for thatindividual to open a website that has been specially crafted tocompromise the user's computer. Spamming has one key drawback though:It doesn't work very often.
Nevertheless,TAO has dramatically improved the tools at its disposal. It maintainsa sophisticated toolbox known internally by the name "QUANTUMTHEORY.""Certain QUANTUM missions have a success rate of as high as 80%,where spam is less than 1%," one internal NSA presentationstates.
Acomprehensive internal presentation titled "QUANTUMCAPABILITIES," which SPIEGEL has viewed, lists virtually everypopular Internet service provider as a target, including Facebook,Yahoo, Twitter and YouTube. "NSA QUANTUM has the greatestsuccess against Yahoo, Facebook and static IP addresses," itstates. The presentation also notes that the NSA has been unable toemploy this method to target users of Google services. Apparently,that can only be done by Britain's GCHQ intelligence service, whichhas acquired QUANTUM tools from the NSA.
Afavored tool of intelligence service hackers is "QUANTUMINSERT."GCHQ workers used this method to attackthe computers of employees atpartly government-held Belgian telecommunications company Belgacom,in order to use their computers to penetrate even further into thecompany's networks. The NSA, meanwhile, used the same technologyto targethigh-ranking members of the Organization of the Petroleum ExportingCountries (OPEC)at the organization's Vienna headquarters. In both cases, thetrans-Atlantic spying consortium gained unhindered access to valuableeconomic data using these tools.
TheNSA's Shadow Network
Theinsert method and other variants of QUANTUM are closely linked to ashadow network operated by the NSA alongside the Internet, with itsown, well-hidden infrastructure comprised of "covert"routers and servers. It appears the NSA also incorporates routers andservers from non-NSA networks into its covert network by infectingthese networks with "implants" that then allow thegovernment hackers to control the computers remotely. (Click here toread a relatedarticle onthe NSA's "implants".)
Inthis way, the intelligence service seeks to identify and track itstargets based on their digital footprints. These identifiers couldinclude certain email addresses or website cookies set on a person'scomputer. Of course, a cookie doesn't automatically identify aperson, but it can if it includes additional information like anemail address. In that case, a cookie becomes something like the webequivalent of a fingerprint.
ARace Between Servers
OnceTAO teams have gathered sufficient data on their targets' habits,they can shift into attack mode, programming the QUANTUM systems toperform this work in a largely automated way. If a data packetfeaturing the email address or cookie of a target passes through acable or router monitored by the NSA, the system sounds the alarm. Itdetermines what website the target person is trying to access andthen activates one of the intelligence service's covert servers,known by the codename FOXACID.
ThisNSA server coerces the user into connecting to NSA covert systemsrather than the intended sites. In the case of Belgacom engineers,instead of reaching the LinkedIn page they were actually trying tovisit, they were also directed to FOXACID servers housed on NSAnetworks. Undetected by the user, the manipulated page transferredmalware already custom tailored to match security holes on the targetperson's computer.
Thetechnique can literally be a race between servers, one that isdescribed in internal intelligence agency jargon with phrases like:"Wait for client to initiate new connection," "Shoot!"and "Hope to beat server-to-client response." Like anycompetition, at times the covert network's surveillance tools are"too slow to win the race." Often enough, though, they areeffective. Implants with QUANTUMINSERT, especially when used inconjunction with LinkedIn, now have a success rate of over 50percent, according to one internal document.
TappingUndersea Cables
Atthe same time, it is in no way true to say that the NSA has itssights set exclusively on select individuals. Of even greaterinterest are entire networks and network providers, such as the fiberoptic cables that direct a large share of global Internet trafficalong the world's ocean floors.
Onedocument labeled "top secret" and "not for foreigners"describes the NSA's success in spying on the "SEA-ME-WE-4"cable system. This massive underwater cable bundle connects Europewith North Africa and the Gulf states and then continues on throughPakistan and India, all the way to Malaysia and Thailand. The cablesystem originates in southern France, near Marseille. Among thecompanies that hold ownership stakes in it are France Telecom, nowknown as Orange and still partly government-owned, and Telecom ItaliaSparkle.
Thedocument proudly announces that, on Feb. 13, 2013, TAO "successfullycollected network management information for the SEA-Me-We UnderseaCable Systems (SMW-4)." With the help of a "websitemasquerade operation," the agency was able to "gain accessto the consortium's management website and collected Layer 2 networkinformation that shows the circuit mapping for significant portionsof the network."
Itappears the government hackers succeeded here once again using theQUANTUMINSERT method.
Thedocument states that the TAO team hacked an internal website of theoperator consortium and copied documents stored there pertaining totechnical infrastructure. But that was only the first step. "Moreoperations are planned in the future to collect more informationabout this and other cable systems," it continues.
Butnumerous internal announcements of successful attacks like the oneagainst the undersea cable operator aren't the exclusive factors thatmake TAO stand out at the NSA. In contrast to most NSA operations,TAO's ventures often require physical access to their targets. Afterall, you might have to directly access a mobile network transmissionstation before you can begin tapping the digital information itprovides.
SpyingTraditions Live On
Toconduct those types of operations, the NSA works together with otherintelligence agencies such as the CIA and FBI, which in turn maintaininformants on location who are available to help with sensitivemissions. This enables TAO to attack even isolated networks thataren't connected to the Internet. If necessary, the FBI can even makean agency-owned jet available to ferry the high-tech plumbers totheir target. This gets them to their destination at the right timeand can help them to disappear again undetected after as little as ahalf hour's work.
Respondingto a query from SPIEGEL, NSA officials issued a statement saying,"Tailored Access Operations is a unique national asset that ison the front lines of enabling NSA to defend the nation and itsallies." The statement added that TAO's "work is centeredon computer network exploitation in support of foreign intelligencecollection." The officials said they would not discuss specificallegations regarding TAO's mission.
Sometimesit appears that the world's most modern spies are just as reliant onconventional methods of reconnaissance as their predecessors.
Take,for example, when they intercept shipping deliveries. If a targetperson, agency or company orders a new computer or relatedaccessories, for example, TAO can divert the shipping delivery to itsown secret workshops. The NSA calls this method interdiction. Atthese so-called "load stations," agents carefully open thepackage in order to load malware onto the electronics, or eveninstall hardware components that can provide backdoor access for theintelligence agencies. All subsequent steps can then be conductedfrom the comfort of a remote computer.
Theseminor disruptions in the parcel shipping business rank among the"most productive operations" conducted by the NSA hackers,one top secret document relates in enthusiastic terms. This method,the presentation continues, allows TAO to obtain access to networks"around the world."
Evenin the Internet Age, some traditional spying methods continue to liveon.
REPORTEDBY JACOB APPELBAUM, LAURA POITRAS, MARCEL ROSENBACH, CHRISTIANSTÖCKER, JÖRG SCHINDLER AND HOLGER STARK
URL:
RelatedSPIEGEL ONLINE links:
- Shopping for Spy Gear Catalog Advertises NSA Toolbox (12/29/2013)
http://www.spiegel.de/international/world/0,1518,940994,00.html
- Friendly Fire How GCHQ Monitors Germany, Israel and the EU (12/20/2013)
http://www.spiegel.de/international/world/0,1518,940135,00.html
- Oil Espionage How the NSA and GCHQ Spied on OPEC (11/11/2013)
http://www.spiegel.de/international/world/0,1518,932777,00.html
- Fresh Leak on US Spying NSA Accessed Mexican President's Email (10/20/2013)
http://www.spiegel.de/international/world/0,1518,928817,00.html
- Quantum Spying GCHQ Used Fake LinkedIn Pages to Target Engineers (11/11/2013)
http://www.spiegel.de/international/world/0,1518,932821,00.html
- Ally and Target US Intelligence Watches Germany Closely (08/12/2013)
http://www.spiegel.de/international/world/0,1518,916029,00.html
Relatedinternet links
- "Washington Post": Bericht über Cyber-Attacken 2011
http://www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.htmlSPIEGEL ONLINE is not liable for the content of external web pages.
12/29/201309:19 AM
Shoppingfor Spy Gear
Catalog AdvertisesNSA Toolbox
ByJacob Appelbaum, JudithHorchert and ChristianStöckerAfteryears of speculation that electronics can be accessed by intelligenceagencies through a back door, an internal NSA catalog reveals thatsuch methods already exist for numerous end-user devices.
Editor'snote: This article accompanies our main feature story on the NSA'sTailored Access Operations unit. You can read it here.
Whenit comes to modern firewalls for corporate computer networks, theworld's second largest network equipment manufacturer doesn't skimpon praising its own work. According to Juniper Networks' online PRcopy, the company's products are "ideal" for protectinglarge companies and computing centers from unwanted access fromoutside. They claim the performance of the company's specialcomputers is "unmatched" and their firewalls are the"best-in-class." Despite these assurances, though, there isone attacker none of these products can fend off -- the UnitedStates'NationalSecurity Agency.
Specialistsat the intelligence organization succeeded years ago in penetratingthe company's digital firewalls. A document viewed by SPIEGELresembling a product catalog reveals that an NSA division called ANThas burrowed its way into nearly all the security architecture madeby the major players in the industry -- including American globalmarket leader Cisco and its Chinese competitor Huawei, but alsoproducers of mass-market goods, such as US computer-maker Dell.
A50-Page Catalog
TheseNSA agents, who specialize in secret back doors, are able to keep aneye on all levels of our digital lives -- from computing centers toindividual computers, and from laptops to mobile phones. For nearlyevery lock, ANT seems to have a key in its toolbox. And no matterwhat walls companies erect, the NSA's specialists seem already tohave gotten past them.
This,at least, is the impression gained from flipping through the 50-pagedocument. The list reads like a mail-order catalog, one from whichother NSA employees can order technologies from the ANT division fortapping their targets' data. The catalog even lists the prices forthese electronic break-in tools, with costs ranging from free to$250,000.
Inthe case of Juniper, the name of this particular digital lock pick is"FEEDTROUGH." This malware burrows into Juniper firewallsand makes it possible to smuggle other NSA programs into mainframecomputers. Thanks to FEEDTROUGH, these implants can, by design, evensurvive "across reboots and software upgrades." In thisway, US government spies can secure themselves a permanent presencein computer networks. The catalog states that FEEDTROUGH "hasbeen deployed on many target platforms."
MasterCarpenters
Thespecialists at ANT, which presumably stands for Advanced or AccessNetwork Technology, could be described as master carpenters for theNSA's department for TailoredAccess Operations (TAO).In cases where TAO's usual hacking and data-skimming methods don'tsuffice, ANT workers step in with their special tools, penetratingnetworking equipment, monitoring mobile phones and computers anddiverting or even modifying data. Such "implants," as theyare referred to in NSA parlance, have played a considerable role inthe intelligence agency's ability to establish a global covertnetwork that operates alongside the Internet.
Someof the equipment available is quite inexpensive. A rigged monitorcable that allows "TAO personnel to see what is displayed on thetargeted monitor," for example, is available for just $30. Butan "active GSM base station" -- a tool that makes itpossible to mimic a mobile phone tower and thus monitor cell phones-- costs a full $40,000. Computer bugging devices disguised as normalUSB plugs, capable of sending and receiving data via radioundetected, are available in packs of 50 for over $1 million.
'Persistence'
TheANT division doesn't just manufacture surveillance hardware. It alsodevelops software for special tasks. The ANT developers have a clearpreference for planting their malicious code in so-called BIOS,software located on a computer's motherboard that is the first thingto load when a computer is turned on.
Thishas a number of valuable advantages: an infected PC or server appearsto be functioning normally, so the infection remains invisible tovirus protection and other security programs. And even if the harddrive of an infected computer has been completely erased and a newoperating system is installed, the ANT malware can continue tofunction and ensures that new spyware can once again be loaded ontowhat is presumed to be a clean computer. The ANT developers call this"Persistence" and believe this approach has provided themwith the possibility of permanent access.
Anotherprogram attacks the firmware in hard drives manufactured by WesternDigital, Seagate, Maxtor and Samsung, all of which, with theexception of the latter, are American companies. Here, too, itappears the US intelligence agency is compromising the technology andproducts of American companies.
OtherANT programs target Internet routers meant for professional use orhardware firewalls intended to protect company networks from onlineattacks. Many digital attack weapons are "remotely installable"-- in other words, over the Internet. Others require a direct attackon an end-user device -- an "interdiction," as it is knownin NSA jargon -- in order to install malware or bugging equipment.
Thereis no information in the documents seen by SPIEGEL to suggest thatthe companies whose products are mentioned in the catalog providedany support to the NSA or even had any knowledge of the intelligencesolutions. "Cisco does not work with any government to modifyour equipment, nor to implement any so-called security 'back doors'in our products," the company said in a statement. Contacted bySPIEGEL reporters, officials at Western Digital, Juniper Networks andHuawei also said they had no knowledge of any such modifications.Meanwhile, Dell officials said the company "respects andcomplies with the laws of all countries in which it operates."
Manyof the items in the software solutions catalog date from 2008, andsome of the target server systems that are listed are no longer onthe market today. At the same time, it's not as if the hackers withinthe ANT division have been sleeping on the job. They have continuedto develop their arsenal. Some pages in the 2008 catalog, forexample, list new systems for which no tools yet exist. However, theauthors promise they are already hard at work developing new toolsand that they will be "pursued for a future release."
URL:
RelatedSPIEGEL ONLINE links:
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass