NSA reportedly compromised more than 50,000 networks worldwide
Leaked top secret presentation slide shows over 50,000 Computer Network Exploitation implants
IDG News Service - The National Security Agency reportedly hacked into more than 50,000 computer networks around the world as part of its global intelligence gathering efforts, and also taps into large fiber-optic cables that transport Internet traffic between continents at 20 different major points.
The agency installed specialized malware referred to as "implants" on more than 50,000 devices in order to perform Computer Network Exploitation (CNE), Dutch newspaper NRC Handelsblad reported Saturday based on documents it said were leaked by former NSA contractor Edward Snowden.
The information is reportedly taken from a 2012 top secret presentation about the NSA's worldwide signals intelligence gathering capabilities that was shared with the intelligence services of Australia, Canada, the U.K. and New Zealand that form the Five Eyes partnership.
CNE is one of three types of Computer Network Operations that NSA computer specialists perform. It "includes enabling actions and intelligence collection via computer networks that exploit data gathered from target or enemy information systems or networks," the NSA says on its careers website.
According to a presentation slide published by NRC, the NSA deployed more than 50,000 CNE "implants" worldwide.
The Washington Post reported in August that the attack tools used for these implants are developed by a specialized NSA team called Tailored Access Operations (TAO) and are designed to compromise routers, switches and firewalls to monitor entire networks.
The implants persist through software and equipment upgrades and can be used to harvest communications, copy stored data and tunnel into the compromised networks from outside, according to the Post. Their number is expected to reach more than 85,000 by the end of 2013.
The slide leaked by the NRC also reveals that, aside from CNEs, the NSA has access to large Internet cables at 20 different locations, most of them outside the U.S.; runs more than 80 regional Special Collection Service (SCS) installations that are part of a joint CIA-NSA program used for close surveillance operations and wiretapping; maintains liaisons with 30 third-party countries outside of the Five Eyes; and has access to 52 regional facilities dedicated to intercepting foreign satellite communications (FORNSAT).
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Top tips for securing big data environments - Why big data doesn't have to mean big security challenges Organizations don't have to feel overwhelmed when it comes to securing big data environments. The same security fundamentals for securing databases, data warehouses...
- Top 3 Myths about Big Data Security : Debunking common misconceptions about big data security Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are...
- Three guiding principles for data security and compliance Data security is a moving target-as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it...
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva.
- How SIEM Addresses the Challenges of Big Security Data This webcast will help you understand today's big data security challenges and how intelligent and scalable SIEM solutions give IT the tools and... All Data Security White Papers | Webcasts