A new report from NSA leak story breaker Glenn Greenwald claims the U.S.-based National Security Agency actually intercepts and alters routers and server hardware exported from the U.S. to implant them with surveillance tools to facilitate spying on international users. The source of the report is a June 2010 document from the NSA’s Access and Target Development department, which outlines the program in detail. Now, the NSA has responded with two official statements addressing the fresh accusations.
These devices, which are either received or intercepted by the NSA in the course of their export, could include routers, servers and “other computer network devices.” The agency is said to open them, implant beacons and other backdoor surveillance tools, and then repackage them complete with factory seals before sending them on to their final destination.
If accurate, the report is especially damning because the U.S. government has, in the past, suggested that China-made network equipment has been intercepted and altered in exactly the same way. This has been used as grounds for encouraging U.S.-based firms to stick with hardware made by American-controlled companies, and to avoid network equipment built by Chinese corporations, including but not limited to Huawei and ZTE.
When contacted for comment, the NSA provided the following statements about these fresh allegations via email:
As we have said before, the U.S. technology industry builds the most secure hardware and software in the world today. NSA relies on these products to help protect our nation’s most sensitive information and, over the past decade, has turned to commercial technology to replace government-built technology. Given its own reliance on many of the very same technologies that the public uses, the U.S. Government is as concerned as the public is with the security of these products. While we cannot comment on specific, alleged intelligence-gathering activities, NSA’s interest in any given technology is driven by the use of that technology by foreign intelligence targets. The United States pursues its intelligence mission with care to ensure that innocent users of those same technologies are not affected.
and:
Disrupt 2026: The tech ecosystem, all in one room
Your next round. Your next hire. Your next breakout opportunity. Find it at TechCrunch Disrupt 2026, where 10,000+ founders, investors, and tech leaders gather for three days of 250+ tactical sessions, powerful introductions, and market-defining innovation. Register now to save up to $400.
Save up to $300 or 30% to TechCrunch Founder Summit
1,000+ founders and investors come together at TechCrunch Founder Summit 2026 for a full day focused on growth, execution, and real-world scaling. Learn from founders and investors who have shaped the industry. Connect with peers navigating similar growth stages. Walk away with tactics you can apply immediately
Offer ends March 13.
As we have previously said, the implication that NSA’s foreign intelligence collection is arbitrary and unconstrained is false. NSA’s activities are focused and specifically deployed against – and only against – valid foreign intelligence targets in response to intelligence requirements. We are not going to comment on specific, alleged foreign intelligence activities. Public release of purportedly classified material about U.S. intelligence collection systems, without context, further confuses an important issue for the country and jeopardizes human life as well as national security sources and methods.
