by Mike Masnick
Mon, Nov 25th 2013 3:44am
Over the weekend, the Dutch media operation NRC published yet another Ed Snowden slide, showing how the NSA had infected 50,000 computer networks with malware. The only really new thing here is the number. We already knew the NSA's TAO (Tailored Access Operations) group was infecting computers around the globe using packet injection, via a system it calls "quantum injection", and that it's used these to install malware on key computers inside Belgacom, the Belgian telco giant. However, the latest report basically shows that the NSA has been able to compromise computers and networks in the same manner all around the globe:
As NRC notes, the earlier reports from the Washington Post had estimated about 20,000 successful "implants" in 2008. So it appears that the NSA has more than doubled its malware installations in the past four or five years. Of course, looking at the chart, you can see some interesting tidbits. The blue dots are "Large Cable," which appears to be key fiber optic cable endpoints that they've tapped into. From the description it appears some of those taps are "covert," while others are "cooperative" (thanks, AT&T!). CNE is "Computer Network Exploitation" and you can see that targeted in areas of interest. A bunch in China and India. A lot in the Middle East. A bunch in Russia and then Mexico and South America. Basically, the NSA has access to... just about anything it wants.
If you liked this post, you may also be interested in...
- To The NSA, The Word 'Security' Is Synonymous With 'Gaping, Unpatched Holes In US Developers' Software'
- Why Are The Congressional Intelligence Committees So Quiet On The NSA Malware Leaks?
- Why The NSA's Vulnerability Equities Process Is A Joke (And Why It's Unlikely To Ever Get Better)
- Australian Law Enforcement Hacked US Users' Computers During Child Porn Investigation
- Did The NSA Continue To Stay Silent On Zero-Day Vulnerabilities Even After Discovering It Had Been Hacked?