Danie van der Merwe

40%
Flag icon
In addition to such sweeping surveillance, though, the NSA also carries out what it calls Computer Network Exploitation (CNE), placing malware in individual computers to surveil their users. When the agency succeeds in inserting such malware, it is able, in NSA terminology, to “own” the computer: to view every keystroke entered and every screen viewed.
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
Rate this book
Clear rating
Open Preview