NSA 'snooping' on countries by planting spy tools on US-made internet routers

Security

by CBR Staff Writer| 13 May 2014

Book accuses the spy agency of meddling with devices meant for export.

The US National Security Agency (NSA) has been accused of installing surveillance gear into US manufactured routers and other computer devices meant for export.

The NSA gets access to the hardware equipment meant for exports, implants its surveillance tools into it and repackages them for export to various countries, writes Glenn Greenwald in his book "No Place to Hide".

Citing a leaked June 2010 report from the head of the NSA's Access and Target Development department, Greenwald writes: "The NSA routinely receives - or intercepts - routers, servers and other computer network devices being exported from the US before they are delivered to the international customers."

The implanted tools send the signals back to the NSA allowing it to snoop on the devices.

The NSA's 2010 report, as quoted by Greenwald, says: "In one recent case, after several months a beacon implanted through supply-chain interdiction called back to the NSA covert infrastructure. This call back provided us access to further exploit the device and survey the network."

The US authorities have banned the sale of Chinese manufactured telecoms equipment in the domestic market after complaining about the Chinese Government doing exactly the same.

A report from the US House Intelligence Committee in 2012 accused two Chinese telecom equipment manufacturers Huawei and ZTE of conniving with the state agencies in implanting spy material on the goods meant for exports.

Meanwhile, NSA's new chief Admiral Mike Rogers said he would take steps to see that the agency was more transparent and candid to public.

In an interview to Reuters CyberSecurity Summit in Washington, Rogers defended NSA's surveillance programme. He said that some NSA staff were "confused" by the onslaught of criticism because a series of official reviews found that the agency had for the most part abided by US law.

Comments
Post a comment

Comments may be moderated for spam, obscenities or defamation.

Join our network

754 people like this.
0 people follow this.

Security Intelligence

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.