A new map details how many companies across the world have been infected by malware by the National Security Agency's team of hackers, and where the companies are located.

Dutch newspaper NRC Handelsblad reports the NSA uses malware to infect, infiltrate and steal information from over 50,000 computer networks around the globe. This new, previously unreported scope of the NSA's hacking operation comes from another PowerPoint slide showing a detailed map of every infection leaked by former contractor Edward Snowden.

NSA Map

The practice is called "Computer Network Exploitation," or CNE for short, and it's carried out by the NSA's Tailored Access Operations team. A yellow dot on the map signifies a CNE infection. The NSA plants malware within a network that can flipped on or off at any time. Once a network is infected, the malware gives the NSA unfiltered access to the network's information whenever it's most convenient. The Washington Post previously profiled the team of "elite hackers" who make up the NSA's TAO division.  

The practice is called "Computer Network Exploitation," or CNE for short, and it's carried out by the NSA's Tailored Access Operations team. A yellow dot on the map signifies a CNE infection. The NSA plants malware within a network that can flipped on or off at any time. Once a network is infected, the malware gives the NSA unfiltered access to the network's information whenever it's most convenient. The Washington Post previously profiled the team of "elite hackers" who make up the NSA's TAO division.  

The British intelligence service liked this strategy too, NRC Handelsblad reports, because they successfully duped a Belgium telecom company with a fake LinkedIn account. A strip at the bottom says the map is relative to relative to the U.K., Australia, New Zealand, and Canada, the "Five Eyes" nations that share intelligence. 

The bulk of CNE operations take place in Europe, South American and Asia. Some are speculating CNE operations focus on Internet service providers, telecom giants and other similar companies to better facilitate massive information collection. 

Where the NSA's team of hackers fit into the organization's greater intelligence gathering structure is presently unclear. But another new document, a February 2012 memo leaked to The New York Times about the NSA's goals for the future, shows exactly how extensive the NSA thought its intelligence gathering would become. They wanted everything:

Intent on unlocking the secrets of adversaries, the paper underscores the agency’s long-term goal of being able to collect virtually everything available in the digital world. To achieve that objective, the paper suggests that the N.S.A. plans to gain greater access, in a variety of ways, to the infrastructure of the world’s telecommunications networks.

Prior to Edward Snowden revealing the operation to the world and ruining the fun, that is. There's now far more public and international scrutiny directed towards the bulk intelligence gathering operation. 



Read more: http://www.thewire.com/national/2013/11/map-shows-nsas-massive-worl...

Views: 147

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted a blog post
13 hours ago
tjdavis posted blog posts
yesterday
Doc Vega posted photos
yesterday
tjdavis posted a blog post
Wednesday
Doc Vega commented on Doc Vega's blog post Is this proof that the story about Charlie Kirk's assassination is false?
"Les prone, Thanks Buddy! "
Tuesday
Doc Vega posted a blog post
Tuesday
tjdavis posted a photo
Tuesday
Doc Vega commented on Doc Vega's blog post Is this proof that the story about Charlie Kirk's assassination is false?
"Less Prone as usual the official version of the truth does not match the evidence and is labeled…"
Saturday
Less Prone commented on Doc Vega's blog post This Memorable Anthem Given by Nick Freitas Hit the Nail on the Head Please Listen!
"Charlie Kirk was getting very critical against Israel and had turned down a lucrative deal from the…"
Saturday
Doc Vega's blog post was featured

The Army of Government Launched Psychopaths

They walk among us in most college towns. They seem relatively reasonable until political…See More
Saturday
Less Prone favorited Doc Vega's blog post Is this proof that the story about Charlie Kirk's assassination is false?
Saturday
Less Prone commented on Doc Vega's blog post Is this proof that the story about Charlie Kirk's assassination is false?
"Have to sign in to YT for this. So. What I do is to go to https://ytdown.io/en/ and download…"
Saturday
Doc Vega commented on Doc Vega's blog post Was a Planned Civil War Averted?
"cheeki kea, you are spot on. The old guard is about to collapse! "
Oct 2
Doc Vega commented on Doc Vega's blog post Alligator Creek and a Japanese Massacre
"cheeki kea, the Japanese thought they could expand their empire and exact enough damage on the US…"
Oct 2
Michelle Reichert favorited Burbia's video
Oct 1
cheeki kea posted a video

NEW DOCUMENTARY - Dissent Into Madness

TRANSCRIPT AND SOURCES: https://www.corbettreport.com/dissent-into-madness/What if the delusions of the dissidents are in fact real? What if their paranoid f...
Oct 1
cheeki kea commented on Doc Vega's blog post Alligator Creek and a Japanese Massacre
"Japan served themselves up no favours by inching out into the South Pacific as they soon found out.…"
Oct 1
cheeki kea commented on Doc Vega's blog post Was a Planned Civil War Averted?
"Their plans did not work out because we are the news now, and the old news is the enemy. "
Oct 1
Doc Vega posted a blog post

Alligator Creek and a Japanese Massacre

The year is 1942 just a few months after the Pearl Harbor disaster. Despite losses suffered by the…See More
Sep 30
Doc Vega commented on Burbia's video
Thumbnail

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

"With all due respect this guy comes off as a drunken asshole and he didn't even  know who…"
Sep 29

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted