NSA reportedly compromised more than 50,000 networks worldwide
Leaked top secret presentation slide shows over 50,000 Computer Network Exploitation implants
IDG News Service - The National Security Agency reportedly hacked into more than 50,000 computer networks around the world as part of its global intelligence gathering efforts, and also taps into large fiber-optic cables that transport Internet traffic between continents at 20 different major points.
The agency installed specialized malware referred to as "implants" on more than 50,000 devices in order to perform Computer Network Exploitation (CNE), Dutch newspaper NRC Handelsblad reported Saturday based on documents it said were leaked by former NSA contractor Edward Snowden.
The information is reportedly taken from a 2012 top secret presentation about the NSA's worldwide signals intelligence gathering capabilities that was shared with the intelligence services of Australia, Canada, the U.K. and New Zealand that form the Five Eyes partnership.
CNE is one of three types of Computer Network Operations that NSA computer specialists perform. It "includes enabling actions and intelligence collection via computer networks that exploit data gathered from target or enemy information systems or networks," the NSA says on its careers website.
According to a presentation slide published by NRC, the NSA deployed more than 50,000 CNE "implants" worldwide.
The Washington Post reported in August that the attack tools used for these implants are developed by a specialized NSA team called Tailored Access Operations (TAO) and are designed to compromise routers, switches and firewalls to monitor entire networks.
The implants persist through software and equipment upgrades and can be used to harvest communications, copy stored data and tunnel into the compromised networks from outside, according to the Post. Their number is expected to reach more than 85,000 by the end of 2013.
The slide leaked by the NRC also reveals that, aside from CNEs, the NSA has access to large Internet cables at 20 different locations, most of them outside the U.S.; runs more than 80 regional Special Collection Service (SCS) installations that are part of a joint CIA-NSA program used for close surveillance operations and wiretapping; maintains liaisons with 30 third-party countries outside of the Five Eyes; and has access to 52 regional facilities dedicated to intercepting foreign satellite communications (FORNSAT).
- A More Predictable Way to Budget Software Costs Wavetronix enables creative collaboration while cost-effectively accessing all the latest tools with Adobe Creative Cloud for teams. For Wavetronix, collaboration was easy when...
- Adobe Creative Cloud for teams Security Overview This white paper describes the proactive approach and procedures implemented by Adobe to increase the security of your Creative Cloud experience and your...
- 3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it...
- IT Security by the Numbers: Calculating the Total Cost of Protection Humorist Franklin P. Jones may have said it best: "When you get something for nothing, you just haven't been billed for it yet."...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success! All Data Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!