There are proxies, proxy servers on the internet, and this is very typical for hackers to use. They create what are called proxy chains where they gain access to a number of different systems around the world, sometimes by hacking these, and they use them as sort of relay boxes.
Edward SnowdenSomething we have to remember is that everything about the internet is interconnected. All of our systems are not just common to us because of the network links between them, but because of the software packages, because of the hardware devices that comprise it. The same router that's deployed in the United States is deployed in China.
Edward SnowdenThe bare bones tools for a cyber-attack are to identify a vulnerability in the system you want to gain access to or you want to subvert or you want to deny, destroy, or degrade, and then to exploit it, which means to send codes, deliver code to that system somehow and get that code to that vulnerability, to that crack in their wall, jam it in there, and then have it execute.
Edward SnowdenWhat the NSA really wants is the capability of retrospective investigation. They want to have a perfect record of the last five years of your life, so when you come to their attention, they can know everything about you. I'm not down with that, but [Bill] Binney was trying to create something like that.
Edward Snowden