US uses covert chips on foreign computers—report | Inquirer Technology

US uses covert chips on foreign computers—report

/ 10:18 AM January 16, 2014

The National Security Agency has implanted software in nearly 100,000 computers around the world—but not in the United States—that allows the US to conduct surveillance on those machines, The New York Times reported Tuesday, Jan. 14, 2014. AP

WASHINGTON—The National Security Agency has implanted software in nearly 100,000 computers around the world—but not in the United States—that allows the US to conduct surveillance on those machines, The New York Times reported.

The Times cited NSA documents, computer experts and US officials in its report about the use of secret technology using radio waves to gain access to computers that other countries have tried to protect from spying or cyberattacks. The software network could also create a digital highway for launching cyberattacks, the Times reported Tuesday.

Article continues after this advertisement

The Times reported that the technology, used by the agency for several years, relies on radio waves that can be transmitted from tiny circuit boards and USB cards inserted covertly into the computers. The NSA calls the effort an “active defense” and has used the technology to monitor units of China’s army, the Russian military, drug cartels, trade institutions inside the European Union and sometime US partners against terrorism like Saudi Arabia, India and Pakistan, the Times reported.

FEATURED STORIES

Among the most frequent targets of the NSA and US Cyber Command, the Times reported, has been China’s army. The United States has accused China’s army of launching regular attacks on American industrial and military targets, often to steal secrets or intellectual property. When Chinese attackers have placed similar software on computer systems of American companies or government agencies, US officials have protested, the newspaper reported.

The NSA says the technology has not been used in computers in the US.

Article continues after this advertisement

“NSA’s activities are focused and specifically deployed against—and only against—valid foreign intelligence targets in response to intelligence requirements,” Vanee Vines, an agency spokeswoman, said in a statement to the Times. “We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of—or give intelligence we collect to—US companies to enhance their international competitiveness or increase their bottom line.”

Article continues after this advertisement

Parts of the program have been disclosed in documents leaked by Edward Snowden, the former NSA systems analyst, the Times reported. A Dutch newspaper published the map showing where the United States has inserted spy software, sometimes with the help of local authorities. Der Spiegel, a German newsmagazine, published information about the NSA’s hardware products that can secretly transmit and receive signals from computers, according to the Times.

Article continues after this advertisement

The Times said that it withheld some of those details, at the request of US intelligence officials, when it reported in summer 2012 on American cyberattacks on Iran.

Hong Lei, a spokesman for China’s Foreign Ministry, said Wednesday that the US “on one hand has been playing up the cyber threats from other countries, and on the other hand has been implementing cyber surveillance endangering the sovereignty, security and public privacy of other countries.”

Article continues after this advertisement

Hong called on the US to “work with the international community to create international regulations and build a peaceful, safe, open and cooperative cyberspace.”

At New Delhi’s Institute of Defense Studies and Analyses, cybersecurity expert Cherian Samuel said, “If it had been any other country doing this kind of thing, the US would have come down on them like a ton of bricks with punitive sanctions.”

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

TOPICS: Computers, NSA Surveillance, US
TAGS: Computers, NSA Surveillance, US

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our newsletter!

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

This is an information message

We use cookies to enhance your experience. By continuing, you agree to our use of cookies. Learn more here.