- Ancestry.com ad tries to sell slavery as romance—not rape 5 Years Ago
- The 9 best Satanic movies on Shudder 5 Years Ago
- Twitch streamer banned after accidentally revealing racist chats 5 Years Ago
- This video captures 15 years of meme trends in 10 minutes 5 Years Ago
- Trump calls parts of Mueller Report ‘total bullshit’ in unfinished tweetstorm Today 8:24 AM
- Amid ‘Avengers’ hype, ‘Spider-Man: Far From Home’ bumps up release date Today 7:57 AM
- Netflix’s ‘Someone Great’ is a coming-of-age rom-com for twenty-somethings Today 7:03 AM
- The best new movies and TV shows to stream this weekend Today 7:00 AM
- ‘Ramy’ explores the intersection of Muslim and millennial identities Today 6:30 AM
- The top 10 Sekiro bosses, ranked Today 6:00 AM
- How to install PlayStation Vue on Kodi to stream live TV Today 5:30 AM
- Alexandria Ocasio-Cortez supports resolution that could lead to Trump’s impeachment Thursday 9:46 PM
- Ricardo Milos dancing memes are the new Rickroll Thursday 9:09 PM
- Laura Loomer sues Twitter, Muslim lobbying group over account ban Thursday 8:15 PM
- Far-right troll Ian Miles Cheong gets flamed for mocking a ‘Star Wars’ fan Thursday 6:17 PM
NSA reportedly installs backdoors in U.S.-made Internet routers
Shocking, we know.
After years of warning that China was building backdoor threats into U.S. routers and Internet devices, it turns out that the U.S. government has been intercepting “routers, servers, and other computer network devices” in order to install surveillance tools targeting foreign customers, Glenn Greenwald reports in an excerpt of his new book published Monday by the Guardian.
“It is quite possible that Chinese firms are implanting surveillance mechanisms in their network devices,” Greenwald writes in his new book No Place to Hide, which is based on leaked documents from Edward Snowden. “But the U.S. is certainly doing the same.”
Late last year, leaks from Snowden revealed that the National Security Agency also intercepts laptops purchased online in order to surreptitiously load software and hardware to gain backdoor access to the machine.
Greenwald’s latest piece cites a June 2010 report from the head of the NSA’s Access and Target Development department that explicitly spells out the export interception program.
After the intercepted device is set up, it eventually connects back to the NSA. The report cited by Greenwald says these compromised devices have provided the agency “access to further exploit the device and survey the [adversary’s] network.”
The report cited by Greenwald will be online tomorrow, he says, and will be included in his upcoming book.
A 2012 report from the House Intelligence Committee accused two top Chinese telecom equipment firms, Huawei and ZTE, of violating American law and recommended that Americans should “view with suspicion the continued penetration of the U.S. telecommunications market by Chinese telecommunications companies.”
If China and the United States are both heavily tampering electronics built in the countries, one important question arises: Who, if anyone, can be trusted to build computers and Internet devices that are safe and secure?
Photo via Matt Newman/Flickr (CC BY SA 2.0)
Patrick Howell O'Neill is a notable cybersecurity reporter whose work has focused on the dark net, national security, and law enforcement. A former senior writer at the Daily Dot, O'Neill joined CyberScoop in October 2016. I am a cybersecurity journalist at CyberScoop. I cover the security industry, national security and law enforcement.