A new map details how many companies across the world have been infected by malware by the National Security Agency's team of hackers, and where the companies are located.

Dutch newspaper NRC Handelsblad reports the NSA uses malware to infect, infiltrate and steal information from over 50,000 computer networks around the globe. This new, previously unreported scope of the NSA's hacking operation comes from another PowerPoint slide showing a detailed map of every infection leaked by former contractor Edward Snowden.

NSA Map

The practice is called "Computer Network Exploitation," or CNE for short, and it's carried out by the NSA's Tailored Access Operations team. A yellow dot on the map signifies a CNE infection. The NSA plants malware within a network that can flipped on or off at any time. Once a network is infected, the malware gives the NSA unfiltered access to the network's information whenever it's most convenient. The Washington Post previously profiled the team of "elite hackers" who make up the NSA's TAO division.  

The practice is called "Computer Network Exploitation," or CNE for short, and it's carried out by the NSA's Tailored Access Operations team. A yellow dot on the map signifies a CNE infection. The NSA plants malware within a network that can flipped on or off at any time. Once a network is infected, the malware gives the NSA unfiltered access to the network's information whenever it's most convenient. The Washington Post previously profiled the team of "elite hackers" who make up the NSA's TAO division.  

The British intelligence service liked this strategy too, NRC Handelsblad reports, because they successfully duped a Belgium telecom company with a fake LinkedIn account. A strip at the bottom says the map is relative to relative to the U.K., Australia, New Zealand, and Canada, the "Five Eyes" nations that share intelligence. 

The bulk of CNE operations take place in Europe, South American and Asia. Some are speculating CNE operations focus on Internet service providers, telecom giants and other similar companies to better facilitate massive information collection. 

Where the NSA's team of hackers fit into the organization's greater intelligence gathering structure is presently unclear. But another new document, a February 2012 memo leaked to The New York Times about the NSA's goals for the future, shows exactly how extensive the NSA thought its intelligence gathering would become. They wanted everything:

Intent on unlocking the secrets of adversaries, the paper underscores the agency’s long-term goal of being able to collect virtually everything available in the digital world. To achieve that objective, the paper suggests that the N.S.A. plans to gain greater access, in a variety of ways, to the infrastructure of the world’s telecommunications networks.

Prior to Edward Snowden revealing the operation to the world and ruining the fun, that is. There's now far more public and international scrutiny directed towards the bulk intelligence gathering operation. 



Read more: http://www.thewire.com/national/2013/11/map-shows-nsas-massive-worl...

Views: 148

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

cheeki kea posted a photo
3 hours ago
Less Prone favorited tjdavis's video
22 hours ago
Less Prone posted a video

“I Helped Build It!” A WEF-Davos Insider EXPOSES The Great Reset

Former investment banker and ESG “whistleblower” Desiree Fixler joins The Winston Marshall Show to expose what she says is one of the biggest financial scams...
22 hours ago
Doc Vega posted a blog post

One Step Too Far Weighs in on Current Events

We now bring you this weeks program on One Step Too Far. Bear with us as more BS floats to the…See More
yesterday
Burbia's blog post was featured

A Masterclass Is Being Played Out For Those Who Have The Eyes To See

A question can be asked, why do Jews want a multicultural community in a host society? It is to…See More
yesterday
Doc Vega's 4 blog posts were featured
yesterday
tjdavis's blog post was featured
yesterday
cheeki kea commented on Burbia's video
Thumbnail

the WITCH language of MYSTERY BABYLON (DOCUMENTARY)

"Great video to watch, and it turns out english is a bizarre and formidable language in its…"
yesterday
cheeki kea favorited Burbia's video
yesterday
Less Prone left a comment for Roberto Castorena
"Welcome to a revolutionary concept in public communication, the truth."
Thursday
Less Prone posted a blog post

Reiner Füllmich imprisoned for investigating the Covid scandal

Rainer Füllmich, a lawyer investigating the Covid scandal was illegally captured in Mexico in…See More
Thursday
Burbia posted a video
Thursday
Doc Vega posted blog posts
Wednesday
Less Prone favorited Doc Vega's photo
Jan 13
tjdavis posted a video

They Destroyed Our Country and Nobody Stopped Them | No Commentary

Music Used in this Video:Song/Music - TimeArtist - Hans ZimmerLicense Type: Creative CommonSong/Music - Evidently ChickentownArtist - John Cooper ClarkeLicen...
Jan 13
Doc Vega posted blog posts
Jan 12
Doc Vega posted photos
Jan 12
Sandy posted a photo
Jan 11
james will's blog post was featured

What Is Tubidy? A Complete Beginner’s Guide

IntroductionTubidy is a free online platform that allows users to search, stream, and download…See More
Jan 10
Less Prone favorited james will's blog post What Is Tubidy? A Complete Beginner’s Guide
Jan 10

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted