NSA Creates Device Backdoors

Tuesday, May 13, 2014 @ 08:05 PM gHale


The NSA has been targeting routers, servers and other computer network devices to plant backdoors, a researcher said.

According to a new report from Glenn Greenwald via The Guardian, the NSA plants backdoors and other spyware before these devices ship overseas. The information comes from the batch of files Edward Snowden provided the journalist with last year. The United States accused the Chinese government of doing exactly this thing with Huawei and ZTE.

The government’s attack on the Chinese manufacturers was so strong that Huawei decided to take a step back and abandon the U.S. market.

RELATED STORIES
Cyber War Stakes Rising
Hackers Secure F-35 Fighter Plans
U.S., Israel behind New Iran Attack
Shamoon Target: Aramco Production

And while the American market was short of one big provider, the rest of the world should be avoiding the “Made in the USA” label for a range of products. Greenwald cites a June 2010 report from the chief of the NSA’s Access and Target Development department which indicates just how the NSA was fiddling with the tech shipments.

The NSA routinely receives or intercepts routers, servers and other computer networking devices exported from the United States before they end up delivered to the international customers, the file said.

The agency implants the spying tools, repackages the devices with a factory seal and sends them on their way.

“In one recent case, after several months a beacon implanted through supply-chain interdiction called back to the NSA covert infrastructure. The call back provided us access to further exploit the device and survey the network,” the file reads, explaining just how the NSA conducts business.

Creating backdoors into products is not new, as ISSSource reported in October, 2011 that facing mounting concern about Iran’s nuclear program, a top U.S. and Israeli technical team has developed a computer “malworm” designed to take down all of Iran’s computer software.

ISSSource learned leaders of the three major software companies, Sergey Brin at Google, Steve Ballmer at Microsoft and Larry Ellison at Oracle have been working with Israel’s top cyber warriors and have now come up with new version of a Stuxnet-like worm that can bring down Iran’s entire software networks if the Iranian regime gets too close to a breakout, according to U.S. intelligence sources. Google, Microsoft and Oracle had no comment on the issue.

This new Stuxnet worm is a more powerful tool with more range and a stronger capability than the previous version, said administration and intelligence officials. Officials want this new cyber capability to derail any military action that could result in a regional war.

The Stuxnet attack on Iran’s nuclear plants in Bushehr and Natanz in 2010 was the result of a joint effort between the United States and the cyber warfare experts of Israel’s Mossad and the IDF Unit 8200. The attack wrecked havoc on Iran’s nuclear program for 11 months, U.S. officials confirmed.



Leave a Reply

You must be logged in to post a comment.