Over the weekend, the Dutch media operation NRC published yet another Ed Snowden slide, showing how the NSA had infected 50,000 computer networks with malware. The only really new thing here is the number. We already knew the NSA’s TAO (Tailored Access Operations) group was infecting computers around the globe using packet injection, via a system it calls “quantum injection”, and that it’s used these to install malware on key computers inside Belgacom, the Belgian telco giant. However, the latest report basically shows that the NSA has been able to compromise computers and networks in the same manner all around the globe:

Worldwide SIGINT defence cryptologic platform

As NRC notes, the earlier reports from the Washington Post had estimated about 20,000 successful “implants” in 2008. So it appears that the NSA has more than doubled its malware installations in the past four or five years. Of course, looking at the chart, you can see some interesting tidbits. The blue dots are “Large Cable,” which appears to be key fiber optic cable endpoints that they’ve tapped into. From the description it appears some of those taps are “covert,” while others are “cooperative” (thanks, AT&T!). CNE is “Computer Network Exploitation” and you can see that targeted in areas of interest. A bunch in China and India. A lot in the Middle East. A bunch in Russia and then Mexico and South America. Basically, the NSA has access to… just about anything it wants.

Share.

About Author

Techdirt

Techdirt was started in 1997 Mike Masnick and then grew into a group blogging effort, which uses a proven economic framework to analyse and offer insight into news stories about changes in government policy, technology and legal issues that affect companies ability to innovate and grow.

Comments are closed.