Report: NSA installed malware on 50,000 computer networks worldwide

Report: NSA installed malware on 50,000 computer networks worldwide

The malware, like many other types of invasive software, breaks into a computer network and then - when NSA hackers dictate - begins to copy data and send it back to the United States government.

Edward Snowden, who leaked plentiful information about the National Security Agency’s PRISM surveillance program earlier this year, may currently be living under temporary asylum in Russia. However, Snowden’s major leak of NSA information has continued to drag the agency’s image through the mud in the months since the former contractor went on the run from the United States government. Now, according to a report from Mashable, another revelation from Snowden’s leak has left the NSA with even more explaining to do.

The latest leak comes from an NSA PowerPoint presentation that Snowden leaked to the press, alongside some 200,000 other classified agency documents, earlier this year. Finally published by a Dutch newspaper this week, the PowerPoint slide in question displays a world map of 50,000 computer networks that NSA classifies as “worldwide implants” in the “Computer Network Exploitation” (CNE) category. In other words, these so-called “worldwide implants” aren’t operatives, but computer networks that the NSA has infected with malware in order to spy on high-interest individuals all over the globe.

The CNE leak is significant for a number of reasons. First of all, the fact that the NSA was using malware at all – and using it against foreign citizens, companies, and governments, no less – will lead to further trouble for the already disgraced government agency. The malware, like many other types of invasive software, breaks into a computer network and then – when NSA hackers dictate – begins to copy data and send it back to the United States government. The NSA claims that the CNE project is used to enable “actions and intelligence collection via computer networks that exploit data gathered from target or enemy information systems or networks.”

However, one NSA hacking attack was launched against Belgacom, a communications company based in Belgium. The NSA has not indicated which “enemy information systems” it was aiming to exploit with that particular mission, though the agency clearly saw reason to cover its tracks and divert attention: a British intelligence agency ended up taking the blame for the Belgacom hack.

Whatever the reason for the Belgacom hack, it is clear from the NSA’s 50,000 malware-infected computer networks that the agency has a thirst for power that cannot be satiated by current constitutional privacy laws or liberties. In another document leaked by Snowden – and recently published by the New York Times – the NSA outlined a four-year plan for building what they called a “signal intelligence program,” or SIGINT. Included in the agency’s SIGINT plan were provisions allowing for greater surveillance of both United States citizens and of people around the world. In other words, the SIGINT proposal is likely where both PRISM and Computer Network Exploitation were born.

Be social, please share!

Facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

Leave a Reply

Your email address will not be published. Required fields are marked *