Exposed: Program That Enables NSA To Spy On Computers Around The World

Fact checked
Exposed: Program That Enables NSA To Spy On Computers Around The World

The US National Security Agency (NSA) has figured out how to hide spying software deep within hard drives giving the agency the means to eavesdrop on the majority of the world’s computers, according to cyber researchers and former operatives. The software allows them to monitor computers, even when they are not connected to the internet.

Kaspersky Lab, A Moscow-based security software maker, that has exposed a series of Western cyber-espionage operations, said it had found personal computers in 30 countries infected with one or more of the spying programs.

Most of the most infections were seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria.

Exposed: Program That Enables NSA To Spy On Computers Around The World

The Mail Online reports: The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists.

The NSA began infecting computers in 2001 claims Kaspersky, ramping up their efforts in 2008 when President Barack Obama was elected.

This ‘surpasses anything known in terms of complexity and sophistication of techniques, and that has been active for almost two decades,’ said Kaspersky.

What’s more, even the makers of these hard drives are unaware that these spying programs have been installed, with the NSA obtaining their source codes by going so far as to pose as software developers according to former intelligence operatives, or telling the companies the government must do a security audit to make sure their source code is safe.

According to Kaspersky, the spies made a technological breakthrough by figuring out how to lodge malicious software in the obscure code called firmware that launches every time a computer is turned on.

Disk drive firmware is viewed by spies and cybersecurity experts as the second-most valuable real estate on a PC for a hacker, second only to the BIOS code invoked automatically as a computer boots up.

‘The hardware will be able to infect the computer over and over,’ lead Kaspersky researcher Costin Raiu said in an interview.

Though the leaders of the still-active espionage campaign could have taken control of thousands of PCs, giving them the ability to steal files or eavesdrop on anything they wanted, the spies were selective and only established full remote control over machines belonging to the most desirable foreign targets, according to Raiu. He said Kaspersky found only a few especially high-value computers with the hard-drive infections.

The firm declined to publicly name the country behind the spying campaign, but said it was closely linked to Stuxnet, the NSA-led cyberweapon that was used to attack Iran’s uranium enrichment facility. The NSA is the U.S. agency responsible for gathering electronic intelligence.

A former NSA employee told Reuters that Kaspersky’s analysis was correct, and that people still in the spy agency valued these espionage programs as highly as Stuxnet. Another former intelligence operative confirmed that the NSA had developed the prized technique of concealing spyware in hard drives, but said he did not know which spy efforts relied on it.

NSA spokeswoman Vanee Vines said the agency was aware of the Kaspersky report but would not comment on it publicly.



    • A program name from NSA programs runs under a couple umbrella’s, are you familiar. If not, one must read about the information classification systems the Federal government operates under. One is SAP, special access programs for the Department of Defense. The other SCIF, or sensitive compartmentalized information facilities for the intelligence
      William Arkin is an author, journalist and analyst who has been working on the subject of national security for over 50
      years. He published a rather unique book. Foreign Affairs, the bible of the foreign policy establishment, commented about Arkin in 1997: “The author is well known (and in some government quarters, cordially detested) as an indefatigable researcher in military affairs, whose cunning and persistence have uncovered many secrets …”
      The book I am referencing is titled: Code Names: Deciphering U.S. Military Plans, Programs and Operations in the 9/11 World Hardcover – January 25, 2005

      • good info, but I was really being sarcastic “windows” we all should know that windows is an open window that the NSA can see in.
        I suspect that all those windows “updates” are really the NSA downloading my non internet activities i do on the computer. I must get a update reboot every once to twice a week. I do some really of narrative activity on line. I must be an the “list”.

  1. Reading hard drives connected or sitting idle throw the thin air is a fantastic skill. Sending secret or batch commands to toggle on features such as connect to WIFI, connect to NFC, or Bluetooth is old news. More pressing is the ability to simply read the minds of those targeted.

    • I am targeted, they put “special” news articles to push my buttons and create a false reality. Doesnt work. I find it interesting though.

    • my bet is, if i screened shot new websites and sent them to you, and at the same time you were on that website, the stories would be different, the articles would be different.
      the NSA has the ability to gas light individuals. They did it to Reagan’s assassinator, john lennon’s assasinator. These two shooters were from the same mind control program. The parkland school shooter also. They target patsies to do their bidding.

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.