NSA devises pathway into computers isolated from the Internet

The US spy agency denied its ‘active defense’ tactics are similar to those used by its surveillance targets, like China

By David Sanger and Thom Shanker  /  NY Times News Service, WASHINGTON

Sun, Jan 19, 2014 - Page 9

The US National Security Agency (NSA) has implanted software in nearly 100,000 computers around the world that allows the US to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.

While most of the software is inserted by gaining access to computer networks, the NSA has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to NSA documents, computer experts and US officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.

The radio frequency technology has helped solve one of the biggest problems facing US intelligence agencies for years: getting into computers that adversaries, and some US partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.

The NSA calls its efforts more an act of “active defense” against foreign cyberattacks than a tool to go on the offensive, but when Chinese attackers place similar software on the systems of US companies or government agencies, US officials have protested, often at the presidential level.

Among the most frequent targets of the NSA and its Pentagon partner, US Cyber Command, have been units of the Chinese army, which the US has accused of launching regular digital probes and attacks on US industrial and military targets, usually to steal secrets or intellectual property. However, the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the EU, and such occasional partners against terrorism as Saudi Arabia, India and Pakistan, according to officials and an NSA map that indicates sites of what the agency calls “computer network exploitation.”

“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the US a window it’s never had before.”

NO DOMESTIC USE

There is no evidence that the NSA has implanted its software or used its radio frequency technology inside the US. While refusing to comment on the scope of the Quantum program, the NSA said its actions were not comparable to China’s.

“NSA’s activities are focused and specifically deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements,” Vanee Vines, an agency spokeswoman, said in a statement. “We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — US companies to enhance their international competitiveness or increase their bottom line.”

Over the past two months, parts of the program have been disclosed in documents from the trove leaked by former NSA contractor Edward Snowden. A Dutch newspaper published the map of areas where the US has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German news magazine, published the NSA’s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of US intelligence officials, when it reported, in the summer of 2012, on US cyberattacks on Iran.

US President Barack Obama on Friday announced a plan to reform NSA practices, following a report from an advisory panel on changing how the NSA collects and stores information. The panel agreed with Silicon Valley executives that some of the techniques developed by the agency to find flaws in computer systems undermine global confidence in a range of US-made information products like laptop computers and cloud services.

Embracing Silicon Valley’s critique of the NSA, the panel has recommended banning, except in extreme cases, the NSA practice of exploiting flaws in common software to aid in US surveillance and cyberattacks. It also called for an end to government efforts to weaken publicly available encryption systems, and said the government should never develop secret ways into computer systems to exploit them, which sometimes include software implants.

Richard Clarke, an official in the Clinton and Bush administrations who served as one of the five members of the advisory panel, explained the group’s reasoning in an email last week, saying that “it is more important that we defend ourselves than that we attack others.”

“Holes in encryption software would be more of a risk to us than a benefit,” he said, adding: “If we can find the vulnerability, so can others. It’s more important that we protect our power grid than that we get into China’s.”

From the earliest days of the Internet, the NSA had little trouble monitoring traffic because a vast majority of messages and searches were moved through servers on US soil. As the Internet expanded, so did the NSA’s efforts to understand its geography. A program named Treasure Map tried to identify nearly every node and corner of the Web, so that any computer or mobile device that touched it could be located.

A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big optic fiber cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the US but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the US had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.

That map suggests how the US was able to speed ahead with implanting malicious software on the computers around the world that it most wanted to monitor — or disable before they could be used to launch a cyberattack.

FOCUS ON DEFENSE

In interviews, officials and experts said that a vast majority of such implants are intended only for surveillance and serve as an early warning system for cyberattacks directed at the US.

“How do you ensure that Cyber Command people” are able to look at “those that are attacking us?” a senior official, who compared it to submarine warfare, asked in an interview several months ago.

“That is what the submarines do all the time,” said the official, speaking on the condition of anonymity to describe policy. “They track the adversary submarines.” In cyberspace, he said, the US tries “to silently track the adversaries while they’re trying to silently track you.”

If tracking subs was a Cold War cat-and-mouse game with the Soviets, tracking malware is a pursuit played most aggressively with the Chinese.

The US has targeted Unit 61398, the Shanghai-based Chinese army unit believed to be responsible for many of the biggest cyberattacks on the US, in an effort to see attacks being prepared. With Australia’s help, one NSA document suggests, the US has also focused on another specific Chinese army unit.

Documents obtained by Snowden indicate that the US has set up two data centers in China — perhaps through front companies — from which it can insert malware into computers.

When the Chinese place surveillance software on US computer systems — and they have, on systems like those at the Pentagon and at the Times — the US usually regards it as a potentially hostile act, a possible prelude to an attack. Obama laid out America’s complaints about those practices to Chinese President Xi Jinping (習近平) in a long session at a summit meeting in California in June last year.

At that session, Obama tried to differentiate between conducting surveillance for national security — which the US argues is legitimate — and conducting it to steal intellectual property.

“The argument is not working,” said Peter Singer of the Brookings Institution, a co-author of a new book called Cybersecurity and Cyberwar. “To the Chinese, gaining economic advantage is part of national security. And the Snowden revelations have taken a lot of the pressure off” the Chinese.

Still, the US has banned the sale of computer servers from a major Chinese manufacturer, Huawei, for fear that they could contain technology to penetrate US networks.

OLD TECHNOLOGY

The NSA’s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions.

In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bond’s technology supplier.

One, called Cottonmouth I, looks like a normal USB plug, but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the NSA even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.

The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as 8 miles [12.8km] under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the NSA, even if the machines are isolated from the Internet.

Computers are not the only targets: Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.

Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the US less dependent on physically getting hardware into adversaries’ computer systems.

The NSA refused to talk about the documents that contained these descriptions, even after they were published in Europe.

“Continuous and selective publication of specific techniques and tools used by NSA to pursue legitimate foreign intelligence targets is detrimental to the security of the United States and our allies,” Vines said.

However, the Iranians and others discovered some of those techniques years ago. The hardware in the NSA’s catalog was crucial in the cyberattacks on Iran’s nuclear facilities, code-named Olympic Games, that began around 2008 and proceeded through the summer of 2010, when a technical error revealed the attack software, later called Stuxnet. That was the first major test of the technology.

One feature of the Stuxnet attack was that the technology the US slipped into Iran’s nuclear enrichment plant at Natanz was able to map how it operated, then “phone home” the details. Later, that equipment was used to insert malware that blew up nearly 1,000 centrifuges, and temporarily set back Iran’s program.

However, the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the country’s underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as “the remains of a device capable of intercepting data from computers at the plant.” The origins of that device have never been determined.

On Jan. 12, according to the Fars news agency, Iran’s Oil Ministry issued another warning about possible cyberattacks, describing a series of defenses it was erecting — and making no mention of what are suspected of being its own attacks on Saudi Arabia’s largest oil producer.