{"id":133313,"date":"2014-05-13T15:59:34","date_gmt":"2014-05-13T19:59:34","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nsa-backdoors-my-open-networks-to-new-threats-report-says.php"},"modified":"2014-05-13T15:59:34","modified_gmt":"2014-05-13T19:59:34","slug":"nsa-backdoors-my-open-networks-to-new-threats-report-says","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-backdoors-my-open-networks-to-new-threats-report-says.php","title":{"rendered":"NSA backdoors my open networks to new threats, report says"},"content":{"rendered":"<p><p>    IDG News Service - Allegations that    the NSA installed surveillance tools in U.S.-made network    equipment, if true, could mean enterprises have more to worry    about than just government spying.  <\/p>\n<p>    While the U.S. government warned router buyers that the Chinese    government might spy on them through networking gear made in    China, the U.S. National Security Agency was doing that very    thing, according to a     report in the Guardian newspaper Monday.  <\/p>\n<p>    The NSA physically intercepted routers, servers and other    network equipment and installed surveillance tools before    slapping on a factory seal and sending the products on to their    destinations, according to the report, which is extracted from    an upcoming book by Glenn Greenwald, a journalist who last year    helped expose sensitive documents uncovered by former NSA    contractor Edward Snowden.  <\/p>\n<p>    With the tools it installs, the NSA can gain access to entire    internal networks, the story said. For example, in a report on    its use of the technology, the NSA said an embedded beacon was    able to call back to the agency and \"provided us access to    further exploit the device and survey the network,\" Greenwald    wrote.  <\/p>\n<p>    The new charge vastly expands the scope of alleged NSA spying    beyond the interception of traffic across the Internet, said    Ranga Krishnan, a technology fellow at the Electronic Frontier    Foundation. As an example, he pointed to reports from the    Snowden documents that the NSA had tapped into Google's own    fiber network among its data centers, where the company hadn't    encrypted the traffic at all.  <\/p>\n<p>    \"That's how most organizations function,\" Krishnan said. \"So    once you're within the company's router, you have access to all    that data that's unencrypted.\"  <\/p>\n<p>    In addition, any security hole that a government installs could    open up the network to attacks by others, he added.  <\/p>\n<p>    \"If you have made something vulnerable ... somebody else could    discover that and very well use it,\" Krishnan said.  <\/p>\n<p>    The     House Intelligence Committee and     other arms of the U.S. government have warned for years    that networking equipment from vendors in China, namely Huawei    Technologies and ZTE, poses a threat to U.S. service providers    because of possible links between those companies and the    Chinese government.  <\/p>\n<p>    Specifically, critics have raised alarms that the government    could install backdoor surveillance tools in the gear they    sell, giving Chinese spies access to communications in the U.S.    Those warnings reportedly have held back Huawei and ZTE's sales    in the U.S. The companies have said their equipment is safe.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.computerworld.com\/s\/article\/9248294\/NSA_backdoors_my_open_networks_to_new_threats_report_says\/RK=0\/RS=sRi3K1Haau_b2MEtPeJq0ZwGXaw-\" title=\"NSA backdoors my open networks to new threats, report says\">NSA backdoors my open networks to new threats, report says<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> IDG News Service - Allegations that the NSA installed surveillance tools in U.S.-made network equipment, if true, could mean enterprises have more to worry about than just government spying. While the U.S <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-backdoors-my-open-networks-to-new-threats-report-says.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-133313","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/133313"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=133313"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/133313\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=133313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=133313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=133313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}