Pages

A universe of beauty, mystery and wonder

A universe of beauty, mystery and wonder
©http://ottersandsciencenews.blogspot.ca/ UNAUTHORIZED USE AND/OR DUPLICATION OF THIS BLOG'S MATERIAL IS STRICTLY PROHIBITED. EXCERPTS AND LINKS MAY BE USED, PROVIDED THAT FULL AND CLEAR CREDIT IS GIVEN TO OTTERS AND SCIENCE NEWS BLOGSPOT WITH APPROPRIATE AND SPECIFIC DIRECTION TO THE ORIGINAL CONTENT. --- THE FACTS AND OPINIONS POSTED ON THIS BLOG ARE HERE FOR INFORMATIONAL PURPOSE AND DO NOT NECESSARILY REFLECT THE VIEWS AND OPINIONS OF THIS BLOG'S ADMINISTRATOR.

Sunday, November 24, 2013

HOW THE NSA INFECTS COMPUTERS WITH MALICIOUS SOFTWARE

 
The American intelligence service NSA infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information.  A special department of the NSA employs more than a thousand hackers.
 
Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this.
A management presentation dating from 2012 explains how the NSA collects information worldwide.
 
In addition, the presentation shows that the intelligence service uses ‘Computer Network Exploitation’ (CNE) in more than 50,000 locations. CNE is the secret infiltration of computer systems achieved by installing malware, malicious software.
 
The NSA computer attacks are performed by a special department called TAO (Tailored Access Operations). Public sources show that this department employs more than a thousand hackers.
 
The malware can be controlled remotely and be turned on and off at will. The ‘implants’ act as digital ‘sleeper cells’ that can be activated with a single push of a button.
 
According to the Washington Post, the NSA has been carrying out this type of cyber operation since 1998.

Read more - http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/


RELATED


MAP SHOWS THE NSA MASSIVE WORLDWIDE MALWARE OPERATIONS
http://www.businessinsider.com/map-shows-the-nsas-massive-worldwide-malware-operations-2013-11


***************************************************************************

No comments:

Post a Comment

Thank you for visiting my blog. Your comments are always appreciated, but please do not include links.