Map Shows The NSA’s Massive Worldwide Malware Operations
Upcoming SlideShare
Loading in...5

Map Shows The NSA’s Massive Worldwide Malware Operations



A new map details how many companies across the world have been infected by malware by the

A new map details how many companies across the world have been infected by malware by the
National Security Agency's team of hackers, and where the companies are located.



Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds


Upload Details

Uploaded via as Adobe PDF

Usage Rights

CC Attribution-NonCommercial LicenseCC Attribution-NonCommercial License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

Map Shows The NSA’s Massive Worldwide Malware Operations Map Shows The NSA’s Massive Worldwide Malware Operations Document Transcript

  • Map Shows The NSA’s Massive Worldwide Malware Operations CONNOR SIMPSON The Atlantic Wire November 24, 2013 A new map details how many companies across the world have been infected by malware by the National Security Agency's team of hackers, and where the companies are located. Dutch newspaper NRC Handelsblad reports the NSA uses malware to infect, infiltrate and steal information from over 50,000 computer networks around the globe. This new, previously unreported scope of the NSA's hacking operation comes from another PowerPoint slide showing a detailed map of every infection leaked by former contractor Edward Snowden.
  • The practice is called "Computer Network Exploitation," or CNE for short, and it's carried out by the NSA's Tailored Access Operations team. A yellow dot on the map signifies a CNE infection. The NSA plants malware within a network that can flipped on or off at any time. Once a network is infected, the malware gives the NSA unfiltered access to the network's information whenever it's most convenient. The Washington Post previously profiled the team of "elite hackers" who make up the NSA's TAO division. The British intelligence service liked this strategy too, NRC Handelsblad reports, because they successfully duped a Belgium telecom company with a fake LinkedIn account. A strip at the bottom says the map is relative to relative to the U.K., Australia, New Zealand, and Canada, the "Five Eyes" nations that share intelligence. The bulk of CNE operations take place in Europe, South American and Asia. Some are speculating CNE operations focus on Internet service providers, telecom giants and other similar companies to better facilitate massive information collection. Where the NSA's team of hackers fit into the organization's greater intelligence gathering structure is presently unclear. But another new document, a February 2012 memo leaked to The New York Times about the NSA's goals for the future, shows exactly how extensive the NSA thought its intelligence gathering would become. They wanted everything: Intent on unlocking the secrets of adversaries, the paper underscores the agency’s long-term goal of being able to collect virtually everything available in the digital world. To achieve that objective, the paper suggests that the N.S.A. plans to gain greater access, in a variety of ways, to the infrastructure of the world’s telecommunications networks. Prior to Edward Snowden revealing the operation to the world and ruining the fun, that is. There's now far more public and international scrutiny directed towards the bulk intelligence gathering operation.
  • New Snowden Leaks Expose The NSA’S Play For More Power Dell Cameron November 23, 2013 Email If what they say is true and knowledge is power, the National Security Agency is the strongest government organization in the world—by far. But its trove of data on American citizens, possibly constituting yottabytes of files in a $2 billion, 100,000-square-foot data center, wasn’t enough. Recently leaked documents from Edward Snowden, revealed in the New York Times, show the NSA had a plan to rapidly expand its authority. The leaked papers, dated February 2012, detail the NSA’s fouryear plan to update and increase its methods for gathering intelligence by intercepting foreign and domestic communications. The document, titled “Sigint Strategy 2012–2016,” claims the NSA intends to “aggressively pursue legal authorities and a policy framework mapped more fully to the information age.” “The interpretation and guidelines for applying our authorities, and in some cases the authorities themselves, have not kept pace with the complexity of the technology and target environments, or the operational expectations levied on N.S.A.’s mission,” the NSA says. The NSA’s objective is to acquire the capabilities to gather intelligence on “anyone, anytime, anywhere.” The spy agency intends to accomplish its goal by subverting all forms of cybersecurity—most notably, by influencing “the global commercial encryption market through commercial relationships.” The document concludes: Existing investments in cyber security will by necessity expand across the enterprise to meet the demand and speed of action required to thwart our adversaries. To remain a value for the warfighter our information must be immediately available at the lowest classification level.
  • In a related story, documents released last month described how the NSA, in collaboration with British intelligence, tapped directly into the private data clouds of Yahoo and Google. Naturally, in a public response to spy agency’s uncovered agenda, government officials cited “terrorism” as the cause for seeking an expansion to their authority. As the law currently stands, intelligence analysts are required to seek the approval of the Foreign Intelligence Surveillance Court (FISA) before engaging in surveillance of a target domestically. While some may argue that judicial warrants are necessary to protect the civil liberties of American citizens, the NSA apparently finds them to be a hinderance to their all-inclusive data collection agenda. Several members of Congress have rejected the NSA’s assertion that spying on U.S. citizens is necessary to combat terrorism. This past week, Senators Mark Udall (D-Colo.), Ron Wyden (D-Ore.), and Martin Heinrich (D-N.M.) announced their support of a lawsuit filed by the First Unitarian Church of Los Angeles against the NSA. The church claims the agency’s domestic spying violates their constitutional rights to free association, privacy, and protection from self-incrimination. Not everyone in Congress perceives the NSA’s agenda as a threat to constitutional rights, however. Last month, the U.S. Senate Intelligence Committee, chaired by Sen. Dianne Feinstein (D-Calif.), approved of legislation that would codify the NSA’s practice of collecting U.S. citizens’ phone records. Since When Are Your Phone Calls Private, Government Lawyer Asks NICK DIVITO Courthouse News November 24, 2013
  • Since Americans expect their phone companies to keep records of their calls, they have no basis to challenge the National Security Agency's mass collection of that data, a lawyer for the government argued Friday. Americans have "no reasonable expectation" to privacy when it comes to the telephone calls they make, Assistant Attorney General Stuart Delery said at a packed hearing in federal court. "People assume that phone companies are recording phone numbers and how long the call lasted," he said. "We know that because all of us get the bills with those details." U.S. District Judge William Pauley III is presiding over the trial stemming from the revelation of a then-classified court order that compelled Verizon to turn over domestic phone records for millions of Americans. Former NSA contractor Edward Snowden leaked the document in June and has since received asylum from Russia. Jameel Jaffer, deputy legal director of the American Civil Liberties Union, told the court that the dragnet spying program is an "abuse of the government's investigative power." "If they can collect this kind of information, they can collect all kinds of records as well," Jaffer said. ACLU attorney Alexander Abdo told the court that "the Fourth Amendment creates a private sphere that the government can't penetrate." Keeping the NSA's surveillance program alive allows the government to wiretap calls or photocopy every piece of mail that moves through the United States Postal Service, he added. "Most Americans would be shocked that this information is being looked at by strangers," Abdo said. In his defense of the program, Assistant Attorney General Delery emphasized that it operates pursuant to orders from the once-secret Foreign Intelligence Surveillance Court (FISC). All three branches of government gave the agency the green-light to continue collecting data, Delery added. "The government does not listen to calls," and the data is used "in good-faith investigations ... to find connections between known and unknown terrorists," Delery said. Earlier this week, the Supreme Court refused to consider a challenge to the spying by the Electronic Privacy Information Center. No lower courts ruled on EPIC's case before it petitioned the justices for the writ of mandamus to vacate an order from the FISC. The high court also trounced the ACLU's challenge to the constitutionality of the Foreign Intelligence Surveillance Act in February. Obama: 'Nobody Is Listening to Your Phone Calls' VIDEO BELOW INFOWARS.COM BECAUSE THERE'S A WAR ON FOR YOUR MIND