Greg, et al -- I'm going to keep digging on US cyber operations, and particularly on "computer network exploitation" and "computer network attack." I'd be interested in theories, questions or suggestions from the smart folks here as I think about my reporting strategy. --Bart ----------------- Date: Mon, 02 Sep 2013 12:44:04 -0500 From: Gregory Foster <gfoster@entersection.org> Subject: WaPo releases details on US offensive cyber-ops Washington Post (Aug 30) - "U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show" by @BartonGellman & @nakashimae: http://www.washingtonpost.com/world/national-security/us-spy-agencies-mounte...
under an extensive effort code-named GENIE, U.S. computer specialists break into foreign networks so that they can be put under surreptitious U.S. control. Budget documents say the $652 million project has placed ?covert implants,? sophisticated malware transmitted from far away, in computers, routers and firewalls on tens of thousands of machines every year, with plans to expand those numbers into the millions.