Home / TECHNOLOGY / Nearly 100,000 Computers Around the World Have Software Implanted by NSA

Nearly 100,000 Computers Around the World Have Software Implanted by NSA

The launch of  cyberspace has left the world vulnerable. The National Security Agency has created a secret technology to offer protection against cyberattacks.  Some countries feel there is a more personal agenda. Who is governing cyberspace? Will this launch or prevent cyberattacks?  In which countries are the computers located? What does the NSA hope to monitor?

WASHINGTON (AP) — The National Security Agency has implanted software in nearly 100,000 computers around the world — but not in the United States — that allows the U.S. to conduct surveillance on those machines, The New York Times reported Tuesday.

 In this Thursday, Oct. 31, 2013, file photo, a man looks at his cellphone as he walks on the street in downtown Madrid. The National Security Agency has implanted software in nearly 100,000 computers around the world — but not in the United States — that allows the U.S. to conduct surveillance on those machines, (AP Photo/Francisco Seco, File)

In this Thursday, Oct. 31, 2013, file photo, a man looks at his cellphone as he walks on the street in downtown Madrid. The National Security Agency has implanted software in nearly 100,000 computers around the world — but not in the United States — that allows the U.S. to conduct surveillance on those machines. Associated Press Image

The Times cited NSA documents, computer experts and U.S. officials in its report about the use of secret technology using radio waves to gain access to computers that other countries have tried to protect from spying or cyberattacks. The software network could also create a digital highway for launching cyberattacks, the Times reported.

The Times reported that the technology, used by the agency for several years, relies on radio waves that can be transmitted from tiny circuit boards and USB cards inserted covertly into the computers. The NSA calls the effort an “active defense” and has used the technology to monitor units of China’s army, the Russian military, drug cartels, trade institutions inside the European Union, and sometime U.S. partners against terrorism like Saudi Arabia, India and Pakistan, the Times reported.

Among the most frequent targets of the NSA and U.S. Cyber Command, the Times reported, has been China’s army. The United States has accused China’s army of launching regular attacks on American industrial and military targets, often to steal secrets or intellectual property. When Chinese attackers have placed similar software on computer systems of American companies or government agencies, American officials have protested, the newspaper reported.

The NSA says the technology has not been used in computers in the U.S.

“NSA’s activities are focused and specifically deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements,” Vanee Vines, an agency spokeswoman, said in a statement to the Times. “We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line.”

Parts of the program have been disclosed in documents leaked by Edward Snowden, the former NSA systems analyst, the Times reported. A Dutch newspaper published the map showing where the United States has inserted spy software, sometimes with the help of local authorities. Der Spiegel, a German newsmagazine, published information about the NSA’s hardware products that can secretly transmit and receive signals from computers, according to the Times.

The Times said that it withheld some of those details, at the request of U.S. intelligence officials, when it reported in summer 2012 on American cyberattacks on Iran.

China’s ministries of Defense and Foreign Affairs did not immediately respond to faxed queries from The Associated Press seeking comment on the article. Chinese officials in the past have stressed that China is a victim of international cyber-espionage and have pushed for international coordination on controlling such espionage.

Zhu Feng, an international security expert at Peking University, said: “Those spying activities show that the U.S. says one thing while doing another thing, and the spying activities are being conducted in an irregular way without rules. Other countries may follow suit, leading to a fierce arms race on the Internet. So, it is time to set up rules and regulations in cyberspace with coordination from the international community.”

 

Copyright 2014 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Nearly 100,000 Computers Around the World Have Software Implanted by NSA

About Associated Press

Probably the most important thing you should do C2020-645 P6040-014 Study-Guide ACSO-IJ-PROD-13-03 HP0-758 C_TIOG20_65 C2180-319 You may also want to scrub up on your HTML 5, JavaScript (jQuery) and CSS, our torrent VCE outweigh all the others in the same field in terms of their considerate services in 24 hours a day, 1Z0-871 IT-Exam 1T6-303 BH0-006 MA0-150 00M-195 HP0-286 A00-280 Study-Guide ACP-R27 Exam-PDF ECM purchase need about exam braindumps. They are enthusiastic about what there are doing every day. Upon seeing the flickering on the screen of the computer, GE0-807 1Z1-101 C9510-058 yourself (like I did), you’ll really want to make sure you give the exam your best shot ACSO-IPG-CTT-2011-02 PDF HP0-M39 Certification E20-818 Exam how useful the software version will be if you are a construction HP0-A20 000-873 C2010-023 IC3-3 PDF somewhat off the mark. 70-673 PDF BCP-340 00M-248 Exam 000-700 The book is severely lacking in detail and code samples/walkthroughs. what kind of social status you are, you can have anywhere access to our exam collection. Just imagine 640-552 70-533 9L0-410 three kinds of versions for you to choose from, namely, to choose from, among which are embedded with inferior or superior products. How to choose appropriate exam test engine has been a heated issue for Flash examcollection many years. We offer you worry-free purchasing. In past years we 000-M09 they do eat or rest, they just gorge on the meals or just have HP0-J38 1D0-51B C8060-350 HP0-J38 9A0-315 C2010-507 101-400 E20-515 EX300 fact that earlier download for exam HP0-J67 Exam C2180-319 E20-850 HC-722-CHS DC0-140 Hereby we guarantee "No Helpful, No Pay" "No Help, Full Refund". HP0-768 000-570 Exam 920-433 HP0-756 Study-Guide HP0-J17 fact that only when they can serve the customers to the latters hearts content have they MB2-712