NSA Access To Offline Computers Via Radio Waves

by

According to the New York Times latest findings, a specific program has been planted upon approximately 100,000 computers all over the world, which will enable United States to perform activities related to surveillance with the help of Radio Waves.

Further, added by the Times, with assistance to this peculiar technology, NSA will become able to approach even to those computers of other countries which have been protected from any spying activities. The software can work on those systems even if they are linked or not.

Moreover, The Times said:

The radio frequency technology has helped to solve one of the biggest problems facing American Intelligence Agency for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyber-attack- in most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.

The Times revealed more that the National Security Agency (NSA) regarded the effort as “active defense”. The technology has been used by NSA to handle Russian troops, Chinese corpse, drug cartels, and trading departments within European Nations. The National Security Agency has also provided this technology to American’s companions like Pakistan, Saudi Arabia and India against terrorism.

An Agency Spokeswoman “Vanee Vines” stated to the Times:

“NSA activities are focused and specially deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements. We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of – or give intelligence we collect to – U.S. companies to enhance their international competitiveness or increase their bottom line”.

The story about the program has been publicized by a retired Agency official, Edward Snowden, reported by the times.
The map about the insertion of spy software by U.S. to its targets has been showed by a Dutch News Agency. Der Spiegel also shared information about the installation and reception of the spying hardware. Both NSA and the United States cyber’s think tank consider Chinese troops as their main focus because the Chinese Army has damaged American financially and economically by cyber spying with the support of this technology.

No quick responses have come from the Chinese concerned State Officials. In the past, the China had been blamed by international community for cybercrimes and spying. The China faced huge global pressure to overcome such espionage.
On other hand, a world famous security analyst, Zhu Feng, at Peking University, expressed his opinion:

Those spying activities shows that the U.S says one thing while doing another thing, and the spying activities are being conducted in an irregular way without rules. Other countries may follow suit, leading to a fierce arms race on the internet. So, it is time to set up rules and regulations in cyber space with coordination from international community.

Way back to 2008, Snowden’s map described as “covert, clandestine or cooperative large accesses”. The map also pointed out that “the United States had already conducted over 50,000 implants globally”. The Times narrated that few of the details had beed left un-printed on demand of United States Intelligence Authorities in 2012, when United States was about to start cyber spying encounter against Iran.

In conversation with the Times, A senior Spokesperson of United States declared such cyber activities equal to submarine warfare- the main objective of such implantation is to inform United States about cyber encounters as well as for intelligence purposes.