{"id":20956,"date":"2014-05-13T10:43:33","date_gmt":"2014-05-13T14:43:33","guid":{"rendered":"http:\/\/www.opensource.im\/?p=20956"},"modified":"2014-05-13T10:43:33","modified_gmt":"2014-05-13T14:43:33","slug":"reported-nsa-backdoors-might-open-up-networks-to-more-threats","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/reported-nsa-backdoors-might-open-up-networks-to-more-threats.php","title":{"rendered":"Reported NSA backdoors might open up networks to more threats"},"content":{"rendered":"<p><p>    Allegations that the NSA installed surveillance tools in    U.S.-made network equipment, if true, could mean enterprises    have more to worry about than just government spying.  <\/p>\n<p>    While    the U.S. government warned router buyers that the Chinese    government might spy on them through networking gear made in    China, the U.S. National Security Agency was doing that very    thing, according to a     report in the Guardian newspaper Monday.  <\/p>\n<p>    The NSA    physically intercepted routers, servers and other network    equipment and installed surveillance tools before slapping on a    factory seal and sending the products on to their destinations,    according to the report, which is extracted from an upcoming    book by Glenn Greenwald, a journalist who last year helped    expose sensitive documents uncovered by former NSA contractor    Edward Snowden.  <\/p>\n<p>    With    the tools it installs, the NSA can gain access to entire    internal networks, the story said. For example, in a report on    its use of the technology, the NSA said an embedded beacon was    able to call back to the agency and provided us access to    further exploit the device and survey the network, Greenwald    wrote.  <\/p>\n<p>    The new    charge vastly expands the scope of alleged NSA spying beyond    the interception of traffic across the Internet, said Ranga    Krishnan, a technology fellow at the Electronic Frontier    Foundation. As an example, he pointed to reports from the    Snowden documents that the NSA had tapped into Googles own    fiber network among its data centers, where the company hadnt    encrypted the traffic at all.  <\/p>\n<p>    Thats    how most organizations function, Krishnan said. So once    youre within the companys router, you have access to all that    data thats unencrypted.  <\/p>\n<p>    In    addition, any security hole that a government installs could    open up the network to attacks by others, he added.  <\/p>\n<p>    If you    have made something vulnerable ... somebody else could discover    that and very well use it, Krishnan said.  <\/p>\n<p>    The        House Intelligence Committee and     other arms of the U.S. government have warned for years    that networking equipment from vendors in China, namely Huawei    Technologies and ZTE, poses a threat to U.S. service providers    because of possible links between those companies and the    Chinese government.  <\/p>\n<p>    Specifically, critics have raised alarms that the government    could install backdoor surveillance tools in the gear they    sell, giving Chinese spies access to communications in the U.S.    Those warnings reportedly have held back Huawei and ZTEs sales    in the U.S. The companies have said their equipment is    safe.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/2154289\/reported-nsa-backdoors-might-open-up-networks-to-more-threats.html\/RK=0\/RS=wgGnXz1_eom41jjxpiO2YZb4sug-\" title=\"Reported NSA backdoors might open up networks to more threats\">Reported NSA backdoors might open up networks to more threats<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Allegations that the NSA installed surveillance tools in U.S.-made network equipment, if true, could mean enterprises have more to worry about than just government spying. While the U.S. government warned router buyers that the Chinese government might spy on them through networking gear made in China, the U.S. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-20956","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/20956"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=20956"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/20956\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=20956"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=20956"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=20956"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}