NSA reportedly compromised more than 50,000 networks worldwide
Leaked top secret presentation slide shows over 50,000 Computer Network Exploitation implants
IDG News Service - The National Security Agency reportedly hacked into more than 50,000 computer networks around the world as part of its global intelligence gathering efforts, and also taps into large fiber-optic cables that transport Internet traffic between continents at 20 different major points.
The agency installed specialized malware referred to as "implants" on more than 50,000 devices in order to perform Computer Network Exploitation (CNE), Dutch newspaper NRC Handelsblad reported Saturday based on documents it said were leaked by former NSA contractor Edward Snowden.
The information is reportedly taken from a 2012 top secret presentation about the NSA's worldwide signals intelligence gathering capabilities that was shared with the intelligence services of Australia, Canada, the U.K. and New Zealand that form the Five Eyes partnership.
CNE is one of three types of Computer Network Operations that NSA computer specialists perform. It "includes enabling actions and intelligence collection via computer networks that exploit data gathered from target or enemy information systems or networks," the NSA says on its careers website.
According to a presentation slide published by NRC, the NSA deployed more than 50,000 CNE "implants" worldwide.
The Washington Post reported in August that the attack tools used for these implants are developed by a specialized NSA team called Tailored Access Operations (TAO) and are designed to compromise routers, switches and firewalls to monitor entire networks.
The implants persist through software and equipment upgrades and can be used to harvest communications, copy stored data and tunnel into the compromised networks from outside, according to the Post. Their number is expected to reach more than 85,000 by the end of 2013.
The slide leaked by the NRC also reveals that, aside from CNEs, the NSA has access to large Internet cables at 20 different locations, most of them outside the U.S.; runs more than 80 regional Special Collection Service (SCS) installations that are part of a joint CIA-NSA program used for close surveillance operations and wiretapping; maintains liaisons with 30 third-party countries outside of the Five Eyes; and has access to 52 regional facilities dedicated to intercepting foreign satellite communications (FORNSAT).
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity...
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva.
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources... All Data Security White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!