Mobile version Today: 23.10.2014 Last update 00:53 | Select date RUS | ENG | SRB
 
 
home sitemap write a letter facebook twitter
Add to favourites RSS


ONLINE JOURNAL
About us
Authors
Contacts
    Obama Launches His War, Finally  
    All Factors Point to CIA Aerially Assassinating Brazilian Presidential Candidate  
    MH-17: Beware of the «Chameleon»  
  HOME PAGE WORLD BUSINESS HISTORY & CULTURE COLUMNISTS  
 
 
 
EDITOR'S CHOICE
 
Kiev govt used cluster munitions in populated zones in E. Ukraine – HRW
 
Christophe de Margerie.

In Memoriam

all articles
 
 
 
 
NEWS
 
 
Turmoil in Hong Kong, Terrorism in Xinjiang: America’s Covert War on China...

Rosneft files lawsuit over EU sanctions to protect its shareholders - Sechin...

Russia recognizes Ukraine parliamentary election - Ivanov...

Hungary confronts Obama administration over travel bans...

Iran president optimistic over nuclear deal before deadline...

Russia's Financial Support to Ukraine Cannot Last Forever: Kremlin...

Russia to Resume Agriculture Imports From Ukraine if Receives Guarantees: Watchdog...

Pentagon admits weapons-drop fail as anti-ISIS operation hits $ 424 mn...

Russia says US-led coalition fails to coordinate with Syria against IS...

Ukraine’s Radical Party accuses tycoon Kolomoyskyi of election-rigging plot...

OSCE to Display Donbas Ceasefire Monitoring Drones...

Anti-IS Airstrikes Kill 553 in Syria Over Past Month: Watchdog...

Russia's Lavrov Uninterested in West's Opinion on Crimea, Other Domestic Issues...

Kiev hampers reconciliation denying civil rights to Ukrainians — diplomat...

Syria Air Force destroys 2 of 3 jets seized by Islamic State – official...

all news
 
 
 
FACEBOOK
 
 

 

 
 
 
back print
 

NSA able to target offline computers using radio-waves for surveillance, cyber-attacks

News | 15.01.2014 | 11:00
 

The National Security Agency has implanted software in about 100,000 computers around the world, allowing the United States to surveil those machines while creating a trail that can be used to launch cyber-attacks.

Though most of the software is installed by gaining access to computer networks, the NSA can also employ technology that enters computers and alters data without needing internet access.

The secret technology uses covert radio waves transmitted from small circuit boards and USB cards clandestinely inserted into targeted computers, The New York Times reported. The waves can then be sent to a briefcase-sized relay station intelligence agencies can set up just miles away, according to NSA documents, computer experts and US officials.

The radio frequency technology - which often needs to be physically inserted by a spy, manufacturer or unwitting user - has helped US spies access computers that global adversaries have gone to great lengths to protect from surveillance or cyber-attack.

The NSA calls use of the infiltration software and radio technology - all part of a program known as Quantum - “active defense” against cyber-attacks, though it has condemned use of similar software by Chinese attackers against American companies or government agencies.

“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” James Andrew Lewis, cyber security expert at the Center for Strategic and International Studies in Washington, told The Times. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”

Quantum targets

The Chinese Army has been the most frequent target of Quantum. The US has accused the Chinese Army of infiltrating American industrial and military targets to often pilfer secrets or intellectual property.

Other Quantum targets include Russian military networks, systems used by Mexican police and drug cartels, trade institutions within the European Union and even allies like Saudi Arabia, according to American officials and NSA materials that show sites that the agency calls “computer network exploitation.”

There is no evidence that Quantum’s capabilities were used in the US. While not commenting on the scope of the program, the NSA said Quantum is not comparable to actions by the Chinese.

“NSA’s activities are focused and specifically deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements,” Vanee Vines, an agency spokeswoman, said in a statement. “We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line.”

Parts of Quantum were revealed by documents leaked by former NSA contractor Edward Snowden. A Dutch newspaper published a map indicating where the US had inserted spy software, usually in secret. Der Spiegel recently published the NSA’s collection of hardware products used for transmitting and receiving digital signals from computers, known as ANT.

RT

 
Tags: National Security Agency US
 

 
Rating: 0 (0)      Your rating: 1 2 3 4 5     
 
Send by e-mail

Социальные комментарии Cackle
Comments
 
To add a comment, Login or Register
 
 
 
OUR COLUMNIST
    Natalia MEDEN

Christoph de Margerie: Europe Does Not Need Another Berlin Wall

...It’s not organizations but rather people who lay down the basis for mutual trust between nations. The level of contributions differs; in some cases it by far exceeds the average like in the case of Christoph de Margerie. In July the head of Total told Reuters in an interview that Europe needs no Berlin Wall. «Are we going to build a new Berlin Wall?» he asked adding, «Russia is a partner and we shouldn't waste time protecting ourselves from a neighbour ... What we are looking to do is not to be too dependent on any country, no matter which. Not from Russia, which has saved us on numerous occasions»...

24.10.2014
 
 
 
 
 
 
TAGS
 
 
 
Aeroflot AFISMA African Union Africom AIPAC Al Qaeda Al Shabaab Al-Jazeera ALBA Amnesty International Anonymous APEC Arab League ASEAN ATAKA Atomstroyexport Bank for International Settlements Bank of America Barclays Basel Committee BBC Bilderberg Club Black Bloc Blackwater Boco Haram BP BRICS CELAC Center for Responsive Politics CEPAL Chevron CIA CICA CIS Citigroup CNN Committee of 147 Committee of 300 Council of Europe Council on Foreign Relations Crescent Crescent Petroleum CSTO Customs Union DARPA Davos DEA Defense Intelligence Agency DIA Dragon Family E.ON Eager Lion ECOWAS EDA ELNET Enbridge Pipelines ETA EU EULEX EurAsEc Eurasian Union European Commission European Court of Human Rights European Union Exxon Mobil Facebook FAO FARC FATAH FBI FDA Federal Reserve FIFA Financial Action Task Force Financial Stability Board Fitch Franklin Templeton Freedom House FRS FSB FTA FUEN G-4 G20 G7 G8 GATA Gazprom GECF Glonass Goldman Sachs Google Greenpeace GUAM Guardian Gulf Cooperation Council Hague Tribunal HAMAS Heritage Foundation Hezbollah Hizb ut-Tahrir HSBC Human Rights Watch IAEA IEA IHRC IMF International Criminal Court Interpol IOC ISAF Islamic jihad Islamic Revolution Guards Corps ITERA Jamestown JP Morgan Jundullah KFOR KLA Ku Klux Klan Liberation Tigers of Tamil Eelam Lukoil Massachusetts Institute of Technology Mercosur Microsoft Missile defense Missile Defense Agency Moody's Morgan Stanley Mossad Most-Favoured Nation Mujahedin-e Khalq Muslim Brotherhood Nabucco Naftogaz NASA Nation of Islam National Security Agency NATO NDAA NDI NED Non-aligned Movement NORAD Nord Stream NORTHCOM Northern Distribution Network NSA OECD Oerlikon OIC OPCW OPEC Open Government Partnership Organization of American States OSCE OTW movement OUN / UPA PACE PACOM Pan-Europa movement Pentagon PJAK PKK PRISM PYD Red Cross Renova Republican Party Rosatom Roscosmos Rosneft Rosoboronexport Ruhrgas RusAl RWE SABSA Scientology Shanghai Cooperation Organization Shell Siemens South Stream Southern Command Standard & Poor's Statoil Strategic Nuclear Forces Stratfor SWF SWIFT Syrian National Council SYRIZA Taliban Tamarod TAPI TeleSur TNK-BP Total Transneft TTIP Twitter UN UN International Court UNASUR UNESCO USAID Valdai Club Visegrad Group Wall Street Westinghouse Wikileaks World Bank WTO Yukos “Mass Atrocity Response Operations”
 
 
 

Republishing is welcomed with reference to Strategic Culture Foundation on-line journal www.strategic-culture.org.


 

 

 
 
© Strategic Culture Foundation

RSS

Main Politics History&Culture Archive Authors Popular
  Economics Columns About Contact

Яндекс.Метрика