The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.
While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.
The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
The N.S.A. calls its efforts more an act of “active defense” against foreign cyberattacks than a tool to go on the offensive. But when Chinese attackers place similar software on the computer systems of American companies or government agencies, American officials have protested, often at the presidential level.
Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”
“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
The Latest on: Pathway Into Computers
via Google News
The Latest on: Pathway Into Computers
- Know the Difference Between DaaS and Virtual Desktopson June 5, 2020 at 5:44 am
Both virtual desktops and Desktop as a Service offer benefits for online education, but what’s the difference between these digital delivery alternatives?
- Linuxfx 10: A Smart, Easy Way to Transition From Windowson June 4, 2020 at 1:02 pm
Linuxfx 10 is the closest pathway I have seen to transitioning from real Windows 7 or 10 to Linux with a convincing Windows overlay.
- redHUMAN: Deciphering links between genes and metabolismon June 4, 2020 at 7:53 am
In the last two decades, the life sciences have seen a growing partnership with information technology. The main drive behind this is the need to process and integrate enormous volumes of data from ...
- Blood plasma analysis could spot signs of ALSon June 2, 2020 at 6:06 pm
A method of analyzing blood plasma could help diagnose and predict the progression of ALS, researchers report.
- Urgency of getting people back to work gives new momentum to “microcredentials”on June 2, 2020 at 6:27 am
The concept of microcredentials is getting a burst of momentum as people need more education to get back into the workforce.
- Mask wearing found to be better than sheltering, social distancing for limiting COVIDon June 2, 2020 at 5:00 am
Do you want to go out in public in Fresno? Put on a face mask. That is one of the best ways to limit spread of COVID-19, studies show | Commentary ...
- More Students Are ‘Stacking’ Credentials en Route to a Degreeon June 2, 2020 at 3:00 am
With record numbers of Americans jobless, some are turning to nontraditional programs that offer rewards for completing short courses on specific skills.
- Deep-Learning–Based Characterization of Tumor-Infiltrating Lymphocytes in Breast Cancers From Histopathology Images and Multiomics Dataon June 1, 2020 at 6:27 pm
PURPOSE Tumor-infiltrating lymphocytes (TILs) and their spatial characterizations on whole-slide images (WSIs) of histopathology sections have become crucial in diagnosis, prognosis, and treatment ...
- Implication of JAK1/STAT3/SOCS3 Pathway in Aging of Cerebellum of Male Rat: Histological and Molecular studyon June 1, 2020 at 2:36 am
Aging causes morphological and functional changes in the cerebellum. This work aimed to demonstrate the implication of JAK1/STAT3/SOCS3 on aging–induced changes of rat cerebellum. Thirty male rats ...
- ARC, Pathways work to hurdle COVIDon May 29, 2020 at 12:13 pm
Regular meetings hold recovering addicts accountable and remind them they’re not alone in their laborious daily battle.
via Bing News