by Mike Masnick
Mon, Nov 25th 2013 3:44am
Over the weekend, the Dutch media operation NRC published yet another Ed Snowden slide, showing how the NSA had infected 50,000 computer networks with malware. The only really new thing here is the number. We already knew the NSA's TAO (Tailored Access Operations) group was infecting computers around the globe using packet injection, via a system it calls "quantum injection", and that it's used these to install malware on key computers inside Belgacom, the Belgian telco giant. However, the latest report basically shows that the NSA has been able to compromise computers and networks in the same manner all around the globe:
As NRC notes, the earlier reports from the Washington Post had estimated about 20,000 successful "implants" in 2008. So it appears that the NSA has more than doubled its malware installations in the past four or five years. Of course, looking at the chart, you can see some interesting tidbits. The blue dots are "Large Cable," which appears to be key fiber optic cable endpoints that they've tapped into. From the description it appears some of those taps are "covert," while others are "cooperative" (thanks, AT&T!). CNE is "Computer Network Exploitation" and you can see that targeted in areas of interest. A bunch in China and India. A lot in the Middle East. A bunch in Russia and then Mexico and South America. Basically, the NSA has access to... just about anything it wants.
If you liked this post, you may also be interested in...
- Disinformation Works: House Rejects Plan To Stop Backdoor Surveillance Searches Following Devin Nunes Lies
- Scottish Law Enforcement Also Apparently Hooked Up To NSA/GCHQ's Data Firehose
- FBI Sends Computer Information Collected By Its Hacking Tools In Unencrypted Form Over The Open Internet
- Three Years On, It Appears Snowden's Leaks Have Damaged The NSA So Badly It's Healthier Than Ever
- NSA Emails Provide Little Insight Into Snowden's Pre-Leak Concerns, But Speak Volumes About Agency's Internal Controls