Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

NSA Taps Offline Computers Using Radio Waves: Report

NSA Taps Offline Computers with Secret Bug: Report

WASHINGTON – The US National Security Agency has developed a secret technology to spy on computers via radio signals, gathering information even when the devices are offline, a report said Wednesday.

NSA Taps Offline Computers with Secret Bug: Report

WASHINGTON – The US National Security Agency has developed a secret technology to spy on computers via radio signals, gathering information even when the devices are offline, a report said Wednesday.

The New York Times reported that the NSA has implanted software on 100,000 computers around the world to be able to conduct surveillance, and which gives the spy agency “a digital highway” for launching cyberattacks.

The Times, citing unnamed sources, said the agency has used the program code-named Quantum since at least 2008, relying on a covert channel of radio waves that can be transmitted from tiny circuit boards and cards inserted surreptitiously into the computers.

It said the radio technology has helped solve a key problem for US intelligence agencies, by getting into computers of adversaries that are hardened against attacks. But it noted that the radio frequency hardware must in most cases be physically inserted by a spy, a manufacturer or an unwitting user.

The report said the NSA and its Pentagon partner, United States Cyber Command, have used these techniques against the Chinese Army, which has been accused of cyberattacks on US firms.

It has also been used against Russian military networks, Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and documents cited by the US newspaper.

Advertisement. Scroll to continue reading.

In a statement to AFP, the NSA did not directly comment on the report but said the agency “deploys various foreign intelligence techniques to help defend the nation.”

“As we have previously stated, the implication that NSA’s collection is arbitrary and unconstrained is false. NSA’s activities are focused and specifically deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements,” the statement said.

“In addition, we do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — US companies to enhance their international competitiveness or increase their bottom line.”

President Barack Obama is due to unveil proposals Friday to reform US intelligence in the wake of a series of revelations which have stunned US allies and others on the vast data-gathering capabilities of the spy agencies, based on leaked documents from former NSA contractor Edward Snowden.

Written By

AFP 2023

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Cybercrime

Spanish Court agreed to extradite Joseph James O’Connor to he U.S., who allegedly took part in the July 2020 hacking of Twitter accounts of...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Ransomware

US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...