A new map details how many companies across the world have been infected by malware by the National Security Agency's team of hackers, and where the companies are located.

Dutch newspaper NRC Handelsblad reports the NSA uses malware to infect, infiltrate and steal information from over 50,000 computer networks around the globe. This new, previously unreported scope of the NSA's hacking operation comes from another PowerPoint slide showing a detailed map of every infection leaked by former contractor Edward Snowden.

NSA Map

The practice is called "Computer Network Exploitation," or CNE for short, and it's carried out by the NSA's Tailored Access Operations team. A yellow dot on the map signifies a CNE infection. The NSA plants malware within a network that can flipped on or off at any time. Once a network is infected, the malware gives the NSA unfiltered access to the network's information whenever it's most convenient. The Washington Post previously profiled the team of "elite hackers" who make up the NSA's TAO division.  

The practice is called "Computer Network Exploitation," or CNE for short, and it's carried out by the NSA's Tailored Access Operations team. A yellow dot on the map signifies a CNE infection. The NSA plants malware within a network that can flipped on or off at any time. Once a network is infected, the malware gives the NSA unfiltered access to the network's information whenever it's most convenient. The Washington Post previously profiled the team of "elite hackers" who make up the NSA's TAO division.  

The British intelligence service liked this strategy too, NRC Handelsblad reports, because they successfully duped a Belgium telecom company with a fake LinkedIn account. A strip at the bottom says the map is relative to relative to the U.K., Australia, New Zealand, and Canada, the "Five Eyes" nations that share intelligence. 

The bulk of CNE operations take place in Europe, South American and Asia. Some are speculating CNE operations focus on Internet service providers, telecom giants and other similar companies to better facilitate massive information collection. 

Where the NSA's team of hackers fit into the organization's greater intelligence gathering structure is presently unclear. But another new document, a February 2012 memo leaked to The New York Times about the NSA's goals for the future, shows exactly how extensive the NSA thought its intelligence gathering would become. They wanted everything:

Intent on unlocking the secrets of adversaries, the paper underscores the agency’s long-term goal of being able to collect virtually everything available in the digital world. To achieve that objective, the paper suggests that the N.S.A. plans to gain greater access, in a variety of ways, to the infrastructure of the world’s telecommunications networks.

Prior to Edward Snowden revealing the operation to the world and ruining the fun, that is. There's now far more public and international scrutiny directed towards the bulk intelligence gathering operation. 



Read more: http://www.thewire.com/national/2013/11/map-shows-nsas-massive-worl...

Views: 146

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

tjdavis posted a video

“What’s His Motive?” - Inside The Mind of George Soros

In this short clip, Patrick Bet-David, Sebastian Gorka Adam Sosnick, and Tom Ellsworth George Soros and what motivates him to do the things he does. FaceTime...
21 hours ago
Doc Vega posted blog posts
yesterday
cheeki kea favorited Bob of the Family Renner's photo
Tuesday
cheeki kea commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"If you're ever out there Doc V and notice giant two legged birds roaming the wilderness be…"
Tuesday
Doc Vega posted blog posts
Tuesday
Burbia commented on TommyD's group The Chuckle Hut
Monday
Doc Vega posted blog posts
Sunday
Doc Vega posted photos
Saturday
Doc Vega posted a blog post

Ashrams and Moonies Perfect Case for Mind Control

 In the late 60’s and into the 70’s we saw a strange phenomenon emerge! That was the rise of cults…See More
Aug 22
Doc Vega posted a blog post

Modern Progress

 From some things you just can’t come backNot everyone has your backIt might just be a nuclear…See More
Aug 21
Bob of the Family Renner favorited tjdavis's photo
Aug 21
Less Prone favorited Sandy's discussion Sick sci-fi sex fantasy written by Epstein's first benefactor people say inspired his twisted island... before author's SON ended up arresting him
Aug 21
Doc Vega commented on tjdavis's photo
Thumbnail

Now Playing

"They sure as hell are! "
Aug 20
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea, yes they have already produced a Wooly Mammoth by crossing DNA from frozen remains in…"
Aug 20
Less Prone favorited tjdavis's photo
Aug 20
Less Prone favorited Bob of the Family Renner's photo
Aug 20
Less Prone favorited tjdavis's photo
Aug 20
Less Prone left a comment for Misteri
"Welcome back!"
Aug 20
tjdavis posted blog posts
Aug 19
tjdavis posted photos
Aug 19

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted