Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

NSA Taps Offline Computers Using Radio Waves: Report

NSA Taps Offline Computers with Secret Bug: Report

WASHINGTON – The US National Security Agency has developed a secret technology to spy on computers via radio signals, gathering information even when the devices are offline, a report said Wednesday.

NSA Taps Offline Computers with Secret Bug: Report

WASHINGTON – The US National Security Agency has developed a secret technology to spy on computers via radio signals, gathering information even when the devices are offline, a report said Wednesday.

The New York Times reported that the NSA has implanted software on 100,000 computers around the world to be able to conduct surveillance, and which gives the spy agency “a digital highway” for launching cyberattacks.

The Times, citing unnamed sources, said the agency has used the program code-named Quantum since at least 2008, relying on a covert channel of radio waves that can be transmitted from tiny circuit boards and cards inserted surreptitiously into the computers.

It said the radio technology has helped solve a key problem for US intelligence agencies, by getting into computers of adversaries that are hardened against attacks. But it noted that the radio frequency hardware must in most cases be physically inserted by a spy, a manufacturer or an unwitting user.

The report said the NSA and its Pentagon partner, United States Cyber Command, have used these techniques against the Chinese Army, which has been accused of cyberattacks on US firms.

It has also been used against Russian military networks, Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and documents cited by the US newspaper.

In a statement to AFP, the NSA did not directly comment on the report but said the agency “deploys various foreign intelligence techniques to help defend the nation.”

Advertisement. Scroll to continue reading.

“As we have previously stated, the implication that NSA’s collection is arbitrary and unconstrained is false. NSA’s activities are focused and specifically deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements,” the statement said.

“In addition, we do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — US companies to enhance their international competitiveness or increase their bottom line.”

President Barack Obama is due to unveil proposals Friday to reform US intelligence in the wake of a series of revelations which have stunned US allies and others on the vast data-gathering capabilities of the spy agencies, based on leaked documents from former NSA contractor Edward Snowden.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...