According to NSA expert and former Guardian columnist Glenn Greenwald’s new book, No Place to Hide, the NSA has intercepted servers and routers from U.S. manufacturers in the delivery process in order to install tracking gear.
In a Guardian excerpt from the book, which comes out tomorrow, Greenwald highlighted a June 2010 report from the NSA’s Access and Target Development department explaining how the intelligence agency installs backdoor surveillance tools on internationally bound routers, servers and other networking equipment before the items are delivered worldwide. Would-be recipients of the equipment have no idea that their items have been tampered with, because the equipment comes delivered with a factory seal.
Through the surveillance tools, Greenwald wrote that the NSA is able to access “entire networks and all their users,” and he singled out an instance in which the NSA was able to exploit and gain access to a network from a device that had a spying beacon installed.
This isn’t the first time the NSA has been singled out for manipulating networking devices for the purpose of spying. Last December, news came out from leaked documents that describe how the intelligence agency installs backdoors in the equipment of various computing and security vendors, including Juniper Networks, Samsung, and Dell.
News of the tampered equipment stuck Greenwald as being a bit ironic considering that a 2012 report from the House Intelligence Committee stated that Chinese-based telecommunications equipment companies Huawei and ZTE “may be violating United States laws,” by allegedly installing backdoors allowing for the Chinese government to spy on targets. Around the same time, Intelligence Committee chairman Mike Rogers said that Americans should “find another vendor” if they consider privacy and concerns about U.S. security important.
In an email to Gigaom, the NSA declined to comment on the specific allegations detailed in Greenwald’s book.