{"id":11799,"date":"2013-11-23T18:15:24","date_gmt":"2013-11-24T00:15:24","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=11799"},"modified":"2013-11-25T12:27:33","modified_gmt":"2013-11-25T18:27:33","slug":"nsa-infected-50000-computer-networks-with-malicious-software","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=11799","title":{"rendered":"NSA infected 50,000 computer networks with malicious software"},"content":{"rendered":"<blockquote><p>A management presentation dating from 2012 explains how the NSA collects information worldwide. In addition, the presentation shows that the intelligence service uses \u2018Computer Network Exploitation\u2019 (CNE) in more than 50,000 locations. CNE is the secret infiltration of computer systems achieved by installing malware, malicious software.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/www.nrc.nl\/nieuws\/2013\/11\/23\/nsa-infected-50000-computer-networks-with-malicious-software\/\">NSA infected 50,000 computer networks with malicious software &#8211; nrc.nl<\/a>.<\/p>\n<p>This article is a bit short on details.\u00a0 It doesn&#8217;t say what OSs or exactly how they got malware onto victim machines.\u00a0 The only way to infect a network would be to perhaps get control of its firewall or main router.\u00a0 Since most people use cheap SOHO routers that might not be very difficult to swap out firmware on them that can do all kinds of things unbeknownst to its owner.\u00a0\u00a0 The article implies that the victim machines are PCs according to this:<\/p>\n<blockquote><p>One example of this type of hacking was discovered in September 2013 at the Belgium telecom provider Belgacom. For a number of years the British intelligence service &#8211; GCHQ \u2013 has been installing this malicious software in the Belgacom network in order to tap their customers\u2019 telephone and data traffic. The Belgacom network was infiltrated by GCHQ through a process of luring employees to a false Linkedin page.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>A management presentation dating from 2012 explains how the NSA collects information worldwide. In addition, the presentation shows that the intelligence service uses \u2018Computer Network Exploitation\u2019 (CNE) in more than 50,000 locations. CNE is the secret infiltration of computer systems &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=11799\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1121],"tags":[1089,347,1149],"class_list":["post-11799","post","type-post","status-publish","format-standard","hentry","category-current-events","tag-cfaa","tag-malware","tag-nsa"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/11799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11799"}],"version-history":[{"count":2,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/11799\/revisions"}],"predecessor-version":[{"id":11801,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/11799\/revisions\/11801"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11799"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}