Following are the Snowden Tweets about NSA Hacked
1) NSA traces and targets malware C2 servers in a practice called Counter Computer Network Exploitation, or CCNE. So do our rivals.
2) NSA is often lurking undetected for years on the C2 and ORBs (proxy hops) of state hackers. This is how we follow their operations.
3) This is how we steal their rivals' hacking tools and reverse-engineer them to create "fingerprints" to help us detect them in the future.
4) Here's where it gets interesting: the NSA is not made of magic. Our rivals do the same thing to us -- and occasionally succeed.
For detail about NSA Hack and Snowden point of view here.
http://www.************/snowdens-leak-was-legit-nsa-hack-proves/
http://www.forbes.com/sites/thomasb...dow-brokers-equation-group-leak/#2e09b66277f9
http://thehackernews.com/2016/08/nsa-hacking-tools.html
1) NSA traces and targets malware C2 servers in a practice called Counter Computer Network Exploitation, or CCNE. So do our rivals.
2) NSA is often lurking undetected for years on the C2 and ORBs (proxy hops) of state hackers. This is how we follow their operations.
3) This is how we steal their rivals' hacking tools and reverse-engineer them to create "fingerprints" to help us detect them in the future.
4) Here's where it gets interesting: the NSA is not made of magic. Our rivals do the same thing to us -- and occasionally succeed.
For detail about NSA Hack and Snowden point of view here.
http://www.************/snowdens-leak-was-legit-nsa-hack-proves/
http://www.forbes.com/sites/thomasb...dow-brokers-equation-group-leak/#2e09b66277f9
http://thehackernews.com/2016/08/nsa-hacking-tools.html