NYT: NSA Secretly Accessed Thousands of Computers Globally

Tuesday, 14 Jan 2014 09:53 PM

By Cathy Burke

Share:
  Comment  |
   Contact Us  |
  Print  
|  A   A  
  Copy Shortlink
The National Security Agency – already under fire for its bulk phone data mining  --
has implanted James Bond-like software in nearly 100,000 computers around the globe to spy on them, and pave a digital path to launch cyberattacks, The New York Times reported Tuesday.

Most of the super-spyware is inserted through computer networks, but the NSA has increasingly used secret technology to penetrate computers that aren’t connected to the Internet, allowing the agency to enter and alter data, The Times reported.

The high-tech radio frequency technology has been used by the agency since 2008, the report said, letting U.S. spy agencies crack into previously impervious computers of friends and foes alike.

And its hardware is pure James Bond -- including a device called Cottonmouth I that looks like a normal USB plug but has a tiny transceiver buried in it.

“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington, told The Times.

“Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”

Among the most frequent targets of the code-named Quantum program have been the Chinese Army, which the United States has accused of launching digital probes and attacks on American industrial and military targets to steal secrets or information, The Times reported.

But Quantum has also been implanted into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, The Times reported.

The NSA even has a map of “computer network exploitation,” The Times said.

There’s no evidence the spyware or radio frequency technology has been used inside the United States, The Times said; most of the implants are intended for surveillance and provide an early warning system for cyberattacks aimed at the United States.

“How do you ensure that Cyber Command people” are able to look at “those that are attacking us?” one official told The Times, comparing the spying to submarine warfare.

“That is what the submarines do all the time. They track the adversary submarines.” In cyberspace, he said, the United States tries “to silently track the adversaries while they’re trying to silently track you.”

The NSA defended its spy “activities.”

“NSA’s activities are focused and specifically deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements,” Vanee Vines, an agency spokeswoman, said in a statement.

“We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line.”

The Times noted parts of the program have been disclosed in documents leaked by ex-NSA contractor Edward Snowden; there have also been reports in a Dutch newspaper and the German magazine Der Spiegel, which published the NSA’s catalogue of high-tech super-spy hardware products.

The bombshell report comes as U.S. lawmakers are demanding, as part of a spending agreement, that the NSA turn over data about the collection of bulk phone records, including how many Americans had calls intercepted by the agency.

A $1.1 trillion bill unveiled Monday to fund the federal government through Sept. 30 would require the NSA to provide Congress with unclassified reports detailing how it collects and uses metadata, which refers to phone records, e-mails and other electronic communications.
If the bill is signed into law, it would represent the first measure from Congress requiring the NSA to provide details about spying programs exposed since June by Snowden.

President Obama on Jan. 17 plans to announce his decision on whether to alter spy programs, which could include requiring phone companies to retain phone records for the government.

Bloomberg contributed to this report


Related Stories:



© 2014 Newsmax. All rights reserved.

Share:
  Comment  |
   Contact Us  |
  Print  
  Copy Shortlink
Around the Web
Join the Newsmax Community
Please review Community Guidelines before posting a comment.
>> Register to share your comments with the community.
>> Login if you are already a member.
blog comments powered by Disqus
 
Email:
Retype Email:
Country
Zip Code:
 
Hot Topics
Follow Newsmax
Like us
on Facebook
Follow us
on Twitter
Add us
on Google Plus
Around the Web
You May Also Like

Obama on Putin: 'Sometimes People Don't Always Act Rationally'

Friday, 01 Aug 2014 18:32 PM

President Barack Obama phoned Russia's Vladimir Putin to urge him to stop supporting separatists in Eastern Ukraine and  . . .

Texas Lt. Gov. Dewhurst: We Need Congress to Pass a Border Bill

Friday, 01 Aug 2014 17:55 PM

Texas is doing its part to help alleviate the migration crisis at its border with Mexico, and now it's time for Congress . . .

Obama Stands Behind Secretary Kerry and CIA's Brennan Amid Criticism

Friday, 01 Aug 2014 17:34 PM

Amid mounting criticism of Secretary of State John Kerry and CIA Director John Brennan, President Barack Obama used an i . . .

Most Commented

Newsmax, Moneynews, and Independent. American. are registered trademarks of Newsmax Media, Inc. Newsmax TV, NewsmaxWorld, NewsmaxHealth, are trademarks of Newsmax Media, Inc.

 
NEWSMAX.COM
America's News Page
©  Newsmax Media, Inc.
All Rights Reserved