Knowledge (XXG)

Tailored Access Operations

Source đź“ť

763: 733: 743: 753: 723: 3032: 166: 152: 906: 817: 713: 1201: 793: 805: 829: 1125: 1212: 1518:), most of the large US-based Internet service providers, and many of the top computer security software manufacturers and consulting companies." A 2012 TAO budget document claims that these companies, on TAO's behest, "insert vulnerabilities into commercial encryption systems, IT systems, networks and endpoint communications devices used by targets". A number of US companies, including 860: 848: 773: 1080:, who perform what are described as "off-net operations", which means they arrange for CIA agents to surreptitiously plant eavesdropping devices on computers and telecommunications systems overseas so that TAO's hackers may remotely access them from Fort Meade. Specially equipped submarines, currently the 1944:
Much more often, an implant is coded entirely in software by an NSA group called, Tailored Access Operations (TAO). As its name suggests, TAO builds attack tools that are custom-fitted to their targets. The NSA unit's software engineers would rather tap into networks than individual computers because
975:
describing the unit's work says TAO has software templates allowing it to break into commonly used hardware, including "routers, switches, and firewalls from multiple product vendor lines". TAO engineers prefer to tap networks rather than isolated computers, because there are typically many devices
962:
TAO is reportedly "the largest and arguably the most important component of the NSA's huge Signals Intelligence Directorate (SID), consisting of more than 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and
1104:
Details on a program titled QUANTUMSQUIRREL indicate NSA ability to masquerade as any routable IPv4 or IPv6 host. This enables an NSA computer to generate false geographical location and personal identification credentials when accessing the Internet utilizing QUANTUMSQUIRREL.
1172:, which released the catalog to the public on December 30, 2013, "The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data." The document was created in 2008. Security researcher 1236:
attacks the NSA referred to as spam. If the browser is exploitable, further permanent "implants" (rootkits etc.) are deployed in the target computer, e.g. OLYMPUSFIRE for Windows, which gives complete remote access to the infected machine. This type of attack is part of the
1945:
there are usually many devices on each network. Tailored Access Operations has software templates to break into common brands and models of "routers, switches, and firewalls from multiple product vendor lines," according to one document describing its work.
1384:] is used to commandeer (i.e. compromise) untargeted computer systems. The software is used as a part of QUANTUMNATION, which also includes the software vulnerability scanner VALIDATOR. The tool was first described at the 2014 1928: 1608: 1907: 1434:
system that carries telecommunications between Singapore, Malaysia, Thailand, Bangladesh, India, Sri Lanka, Pakistan, United Arab Emirates, Saudi Arabia, Sudan, Egypt, Italy, Tunisia, Algeria and France. Additionally,
470: 1363:, i.e. the NSA server is trying to beat the legitimate server with its response. As of mid-2011, the NSA was prototyping a capability codenamed QFIRE, which involved embedding their exploit-dispensing servers in 1161:
Tailored Access Operations (TAO) by the Advanced Network Technology (ANT) Division to aid in cyber surveillance. Most devices are described as already operational and available to US nationals and members of the
1231:
before the intended destination has had a chance to respond (it's unclear if the compromised router facilitates this race on the return trip). Prior to the development of this technology, FOXACID software made
1957: 1534:. A Microsoft official who declined to be identified in the press confirmed that this is indeed the case, but said that Microsoft cannot be held responsible for how the NSA uses this advance information. 3362: 1489:, TAO is used to intercept laptops purchased online, divert them to secret warehouses where spyware and hardware is installed, and send them on to customers. TAO has also targeted internet browsers 1762: 1530:
provides advance warning to the NSA of vulnerabilities it knows about, before fixes or information about these vulnerabilities is available to the public; this enables TAO to execute so-called
650: 852: 1227:
requests, so that they go both to the intended target and to an NSA site (indirectly). The NSA site runs FOXACID software which sends back exploits that load in the background in the target
516: 2495: 640: 2634: 1506:, TAO has become "increasingly accomplished at its mission, thanks in part to the high-level cooperation it secretly receives from the 'big three' American telecom companies ( 3682: 762: 3320: 617: 1841: 2835: 435: 1961: 1436: 2783: 2315: 2659: 797: 742: 569: 612: 3667: 941:(NSA). It has been active since at least 1998, possibly 1997, but was not named or structured as TAO until "the last days of 2000," according to General 892: 2263: 2239: 38: 2158: 833: 732: 2568: 3355: 3040: 2289: 2549: 1420: 752: 722: 665: 498: 488: 2828: 2503: 1443: 1334: 809: 660: 2082: 2188: 1884: 1412: 450: 445: 2735: 1753: 1359:
QUANTUM attacks launched from NSA sites can be too slow for some combinations of targets and services as they essentially try to exploit a
2525: 2007: 1375:(SCS) network worldwide. The goal of QFIRE was to lower the latency of the spoofed response, thus increasing the probability of success. 948:
TAO identifies, monitors, infiltrates, and gathers intelligence on computer systems being used by entities foreign to the United States.
3235: 2760: 2713: 1785: 736: 645: 309: 2803: 2464: 2415: 2341: 2058: 2808: 2390: 2365: 1693: 2638: 3677: 2950: 2821: 1548: 1059: 712: 2110: 1983: 3633: 2873: 2859: 1851: 1407:
Suspected, alleged and confirmed targets of the Tailored Access Operations unit include national and international entities like
531: 338: 2610: 3429: 1338: 766: 746: 412: 228: 2032: 3662: 3591: 3422: 2957: 1813: 1431: 1215:
NSA's QUANTUMTHEORY overview slide with various codenames for specific types of attack and integration with other NSA systems
885: 821: 314: 206: 1069: 3450: 2943: 2132: 1177: 493: 348: 1726: 1121:(IAD). In January 2016, Joyce had a rare public appearance when he gave a presentation at the Usenix’s Enigma conference. 3193: 2095:
Dealer, Hacker. "Dealer, Hacker, Lawyer, Spy: Modern Techniques and Legal Boundaries of Counter-cybercrime Operations".
1385: 776: 343: 1118: 3605: 3598: 3228: 2936: 1036: 1017: 756: 726: 465: 304: 1818: 1790: 1637:"From cold to cyber warriors: the origins and expansion of NSA's Tailored Access Operations (TAO) to Shadow Brokers" 3464: 3207: 2922: 2880: 1543: 1001: 67: 1252:
There are numerous services that FOXACID can exploit this way. The names of some FOXACID modules are given below:
3274: 3214: 2929: 2901: 2793: 2788: 1563: 993: 878: 165: 151: 3200: 3186: 3147: 3006: 2866: 2844: 1238: 1158: 1021: 1009: 942: 938: 716: 156: 3020: 1372: 3612: 1558: 1396: 1353: 864: 551: 2083:
https://www.eff.org/files/2014/04/09/20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf
3672: 3436: 3133: 1846: 1578: 1242: 1151: 1013: 655: 1526:, have subsequently made public statements denying that they insert such back doors into their products. 772: 3119: 2978: 2887: 1455: 963:
electrical engineers. The office is currently known as Office of Computer Network Operations (OCNO). ".
460: 2217: 3376: 2589: 1128: 989: 957: 683: 574: 113: 3492: 3478: 3408: 3063: 2999: 2688: 1613: 1471: 1467: 1348:
Finding machines that are exploitable and worth attacking is done using analytic databases such as
440: 400: 289: 223: 218: 170: 37: 3506: 3154: 3091: 2992: 1664: 1515: 1220: 3531: 2798: 2465:"How the NSA hacks PCs, phones, routers, hard disks 'at speed of light': Spy tech catalog leaks" 521: 3619: 3161: 3112: 1880: 1874: 1689: 1656: 1246: 1459: 3559: 3485: 3327: 3267: 3013: 2971: 2915: 2062: 1648: 1475: 1081: 546: 536: 299: 294: 201: 129: 1447: 3640: 3140: 3105: 3077: 3056: 2175: 1531: 1389: 1364: 1173: 1147: 1141: 1005: 541: 196: 3626: 3584: 3334: 2894: 2714:"NSA reportedly planted spyware on electronics equipment | Security & Privacy" 2440: 1568: 1553: 1502: 1360: 1233: 972: 804: 594: 77: 1131:
image from an NSA presentation explaining the QUANTUMSQUIRREL IP host spoofing ability
3656: 3348: 3302: 3168: 3126: 1668: 1588: 1490: 1257: 1155: 934: 243: 103: 2159:"NSA's top hacking boss explains how to protect your network from his attack squads" 1219:
The TAO has developed an attack suite they call QUANTUM. It relies on a compromised
3471: 3070: 3049: 2469: 1636: 1207:
image from an NSA presentation explaining in part the naming of the QUANTUM program
526: 380: 81: 2008:"Hintergrund: Die Speerspitze des amerikanischen Hackings - News Ausland: Amerika" 1929:"U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show" 1652: 2635:"British spies reportedly spoofed LinkedIn, Slashdot to target network engineers" 1683: 3390: 3383: 3253: 3084: 1427: 1263: 1228: 1211: 1168: 1065:
Mission Infrastructure Technologies Branch: operates the software provided above
828: 584: 455: 1958:"Secret NSA hackers from TAO Office have been pwning China for nearly 15 years" 2908: 1609:"NSA employee who worked on hacking tools at home pleads guilty to spy charge" 1368: 1301: 1269: 1200: 1124: 579: 238: 91: 17: 1660: 3538: 3499: 3369: 3260: 3098: 2985: 2499: 1583: 1527: 1463: 1349: 1163: 1114: 910: 816: 783: 635: 589: 390: 370: 284: 255: 233: 2813: 2133:"Thomas Bossert, Trump's Chief Adviser on Homeland Security, Is Forced Out" 1442:
TAO's QUANTUM INSERT technology was passed to UK services, particularly to
173:
as of 2007, with countries subject to the most data collection shown in red
2809:
Getting the 'Ungettable' Intelligence: An Interview with TAO's Teresa Shea
3524: 3443: 3415: 2964: 1451: 1306: 1285: 688: 385: 333: 2290:"NSA's Internet taps can find systems to hack, track VPNs and Word docs" 3566: 3545: 3341: 3295: 2445: 1573: 1511: 1507: 1494: 1326: 1311: 1290: 1279: 1185: 1181: 997: 859: 417: 395: 375: 360: 279: 191: 117: 2496:"Tax and Spy: How the NSA Can Hack Any American, Stores Data 15 Years" 1352:. A specific method of finding vulnerable machines is interception of 3552: 3288: 2474: 1876:
The Secret Sentry: The Untold History of the National Security Agency
1439:
in Sweden gives access to fiber optic links for QUANTUM cooperation.
1204: 847: 792: 365: 2590:"Läs dokumenten om Sverige från Edward Snowden - Uppdrag Granskning" 2526:"Our Government Has Weaponized the Internet. Here's How They Did It" 1188:, in which he detailed techniques that the simultaneously published 3457: 3281: 2789:
NSA 'hacking unit' infiltrates computers around the world – report
1519: 1408: 1342: 1321: 1316: 1210: 1199: 1123: 904: 328: 1395:
QUANTUMCOOKIE is a more complex form of attack which can be used
2218:"How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID" 1523: 1416: 1224: 2817: 1685:
Playing to the Edge: American Intelligence in the Age of Terror
2550:"China Accuses US of Repeated Hacks on Polytechnic University" 1486: 1482: 1426:
The group has also targeted global communication networks via
1380: 1295: 1274: 1245:. It is difficult to pull off without controlling some of the 1077: 1073: 2569:"Quantum of pwnness: How NSA and GCHQ hacked OPEC and others" 1117:, a 25-plus year employee who previously worked in the NSA's 1087:, are used to wiretap fibre optic cables around the globe. 2264:"NSA-Dokumente: So knackt der Geheimdienst Internetkonten" 2240:"NSA-Dokumente: So knackt der Geheimdienst Internetkonten" 2761:"U.S. Agencies Said to Swap Data With Thousands of Firms" 1922: 1920: 1466:, and Starhome. Belgacom, which provides services to the 1062:(TNT) : improve network and computer hacking methods 1032:, 600 employees gather information from around the world. 2799:
NSA Laughs at PCs, Prefers Hacking Routers and Switches
905: 2170: 2168: 1927:
Gellman, Barton; Nakashima, Ellen (August 30, 2013).
1072:(ATO): Reportedly includes personnel seconded by the 1812:
Kingsbury, Alex; Mulrine, Anna (November 18, 2009).
1786:"The Secret History of the National Security Agency" 1341:), Google services could be attacked too, including 3576: 3516: 3400: 3312: 3245: 3178: 3039: 2851: 2189:"Quantumtheory: Wie die NSA weltweit Rechner hackt" 1984:"Inside the NSA's Ultra-Secret China Hacking Group" 1727:"Inside the NSA's Ultra-Secret China Hacking Group" 135: 123: 109: 97: 87: 73: 63: 52: 44: 2556:. September 5, 2022 – via www.bloomberg.com. 2111:"The NSA and GCHQ's QUANTUMTHEORY Hacking Tactics" 1752: 1192:article he coauthored disclosed from the catalog. 2784:Inside TAO: Documents Reveal Top NSA Hacking Unit 2441:""Chaos Computer Club CCC Presentation" at 28:34" 1371:) hosted closer to the target, in the so-called 1045:S3232 – Cyber Networks Technology Division (CNT) 909:A reference to Tailored Access Operations in an 988:(ROC) and are based at the NSA headquarters at 3321:Global surveillance disclosures (2013–present) 1814:"U.S. is Striking Back in the Global Cyberwar" 1241:family, though more specifically it is called 1060:Telecommunications Network Technologies Branch 618:Global surveillance disclosures (2013–present) 2829: 2033:"Inside the NSA's Ultra-Secret Hacking Group" 1154:document listing technology available to the 1090:S3283 – Expeditionary Access Operations (EAO) 1028:S321 – Remote Operations Center (ROC) In the 886: 8: 1223:that duplicates internet traffic, typically 30: 2804:N.S.A. Devises Radio Pathway Into Computers 2736:"How the NSA Thinks About Secrecy and Risk" 2637:. Network World. 2013-11-11. Archived from 2416:"QFIRE - die "Vorwärtsverteidigng" der NSA" 2391:"QFIRE - die "Vorwärtsverteidigng" der NSA" 2366:"QFIRE - die "Vorwärtsverteidigng" der NSA" 2342:"QFIRE - die "Vorwärtsverteidigng" der NSA" 2310: 2308: 2306: 2211: 2209: 1960:. Computerworld. 2013-06-11. Archived from 1754:"The NSA has its own team of elite hackers" 971:A document leaked by former NSA contractor 3683:American advanced persistent threat groups 2836: 2822: 2814: 1051:S3234 – Computer Technology Division (CTD) 893: 879: 146: 29: 2458: 2456: 1842:"How the U.S. Government Hacks the World" 1356:traffic, which is logged into XKeyscore. 1054:S3235 – Network Technology Division (NTD) 27:Unit of the U.S. National Security Agency 3356:NSA warrantless surveillance controversy 1720: 1718: 1716: 1714: 1712: 1039:(DNT) : develops automated spyware 1682:Hayden, Michael V. (23 February 2016). 1599: 1421:Mexico's Secretariat of Public Security 1113:From 2013 to 2017, the head of TAO was 666:Mass surveillance in the United Kingdom 149: 2660:"Inside TAO: The NSA's Shadow Network" 2097:The European Review of Organised Crime 1392:, who characterized it as tyrannical. 1335:Government Communications Headquarters 661:Mass surveillance in the United States 2682: 2680: 1413:Northwestern Polytechnical University 1070:Access Technologies Operations Branch 613:2005 warrantless surveillance scandal 7: 1607:Nakashima, Ellen (1 December 2017). 919:Office of Tailored Access Operations 1908:"FOIA #70809 (released 2014-09-19)" 1751:Paterson, Andrea (30 August 2013). 937:intelligence-gathering unit of the 3194:Information Warfare Support Center 2288:Gallagher, Sean (August 1, 2013). 2157:Thomson, Iain (January 28, 2016). 1641:Intelligence and National Security 1333:By collaboration with the British 984:TAO's headquarters are termed the 25: 3668:Cyberwarfare in the United States 2951:Misawa Security Operations Center 1784:Kingsbury, Alex (June 19, 2009). 1765:from the original on Oct 19, 2013 1549:Cyberwarfare in the United States 1119:Information Assurance Directorate 171:Map of global NSA data collection 3634:Vulnerabilities Equities Process 3030: 2874:Consolidated Intelligence Center 2860:Alaska Mission Operations Center 2131:Landler, Mark (April 10, 2018). 1725:Aid, Matthew M. (10 June 2013). 1037:Data Network Technologies Branch 858: 846: 827: 815: 803: 791: 771: 761: 751: 741: 731: 721: 711: 310:President's Surveillance Program 164: 150: 36: 3275:Secure Terminal Equipment (STE) 2524:Weaver, Nicholas (2013-03-28). 1879:. Bloomsbury USA. p. 311. 1873:Aid, Matthew M. (8 June 2010). 1840:Riley, Michael (May 23, 2013). 1500:According to a 2013 article in 3592:Institute for Defense Analyses 2958:Multiprogram Research Facility 2794:NSA Tailored Access Operations 2734:Schneier, Bruce (2013-10-04). 2687:Aid, Matthew M. (2013-10-15). 2567:Gallagher, Sean (2013-11-12). 2316:"Inside TAO: Targeting Mexico" 2216:Schneier, Bruce (2013-10-07). 2061:. Defense Tech. Archived from 1635:Loleski, Steven (2018-10-18). 1432:submarine communications cable 1159:National Security Agency (NSA) 315:Terrorist Surveillance Program 1: 2759:Riley, Michael (2013-06-14). 2689:"The NSA's New Code Breakers" 1653:10.1080/02684527.2018.1532627 1437:Försvarets radioanstalt (FRA) 1178:Chaos Communications Congress 1042:S3231 – Access Division (ACD) 494:Senate Intelligence Committee 56: 2463:Thomson, Iain (2013-12-31). 1819:U.S. News & World Report 1791:U.S. News & World Report 1386:Chaos Communication Congress 1093:S3285 – Persistence Division 3606:National Cryptologic School 3599:National Cryptologic Museum 2937:Interagency Training Center 2895:European Cryptologic Center 2867:Colorado Cryptologic Center 2113:. firstlook.org. 2014-07-16 992:. TAO also has expanded to 927:Computer Network Operations 471:FISA Amendments Act of 2008 466:Protect America Act of 2007 305:Total Information Awareness 3699: 3465:Real Time Regional Gateway 3208:Special Collection Service 2923:Georgia Cryptologic Center 2712:Farber, Dan (2013-12-29). 2494:Mick, Jason (2013-12-31). 2340:Fotostrecke (2013-12-30). 2238:Fotostrecke (2013-12-30). 2059:"Jimmy Carter: Super Spy?" 1544:Advanced persistent threat 1450:, which used it to target 1403:Targets and collaborations 1139: 955: 268:Tailored Access Operations 68:Advanced persistent threat 31:Tailored Access Operations 3028: 2930:Hawaii Cryptologic Center 2902:European Technical Center 2611:"What You Wanted to Know" 2174:This section copied from 1564:MiniPanzer and MegaPanzer 1458:(GRX) providers like the 641:Surveillance of reporters 499:National Security Council 35: 3678:National Security Agency 3021:Pacific Technical Center 3007:Texas Cryptologic Center 2845:National Security Agency 1559:Magic Lantern (software) 1373:Special Collection Sites 1239:man-in-the-middle attack 1030:Remote Operations Center 1022:Buckley Space Force Base 986:Remote Operations Center 939:National Security Agency 157:National Security Agency 3613:National Vigilance Park 2178:; see there for sources 1478:discovered the attack. 1354:Windows Error Reporting 1166:alliance. According to 3437:Insider Threat Program 3134:John Michael McConnell 2057:noahmax (2005-02-21). 1847:Bloomberg Businessweek 1579:Syrian Electronic Army 1243:man-on-the-side attack 1216: 1208: 1132: 1014:Joint Base San Antonio 914: 656:Insider Threat Program 3663:Computer surveillance 3120:William Eldridge Odom 1456:GPRS roaming exchange 1378:COMMENDEER [ 1214: 1203: 1176:gave a speech at the 1127: 976:on a single network. 908: 461:Homeland Security Act 355:Databases, tools etc. 3377:Thomas Andrews Drake 1481:In concert with the 990:Fort Meade, Maryland 958:Signals intelligence 929:, and structured as 651:UN diplomatic spying 3409:Boundless Informant 3064:Laurence Hugh Frost 2616:. documentcloud.org 1933:The Washington Post 1759:The Washington Post 1614:The Washington Post 1472:European Parliament 1468:European Commission 1430:– an optical fibre 522:Hepting v. AT&T 441:Privacy Act of 1974 219:Upstream collection 141:S3 Data Acquisition 137:Parent organization 32: 3155:Keith B. Alexander 3092:Samuel C. Phillips 2014:. tagesanzeiger.ch 1217: 1209: 1133: 915: 532:Clapper v. Amnesty 407:GCHQ collaboration 401:BOUNDLESSINFORMANT 125:Official language 3650: 3649: 3620:NSA Hall of Honor 3162:Michael S. Rogers 3113:Lincoln D. Faurer 1982:Rothkopf, David. 1886:978-1-60819-096-6 1688:. Penguin Press. 1247:Internet backbone 1100:Virtual locations 903: 902: 145: 144: 16:(Redirected from 3690: 3643: 3636: 3629: 3622: 3615: 3608: 3601: 3594: 3587: 3569: 3562: 3555: 3548: 3541: 3534: 3527: 3509: 3502: 3495: 3488: 3481: 3474: 3467: 3460: 3453: 3446: 3439: 3432: 3425: 3418: 3411: 3393: 3386: 3379: 3372: 3365: 3358: 3351: 3344: 3337: 3330: 3328:Church Committee 3323: 3305: 3298: 3291: 3284: 3277: 3270: 3263: 3256: 3238: 3231: 3224: 3217: 3210: 3203: 3196: 3189: 3171: 3164: 3157: 3150: 3143: 3136: 3129: 3122: 3115: 3108: 3101: 3094: 3087: 3080: 3073: 3066: 3059: 3052: 3034: 3033: 3023: 3016: 3014:Utah Data Center 3009: 3002: 2995: 2988: 2981: 2974: 2972:RAF Menwith Hill 2967: 2960: 2953: 2946: 2939: 2932: 2925: 2918: 2916:Friendship Annex 2911: 2904: 2897: 2890: 2883: 2876: 2869: 2862: 2838: 2831: 2824: 2815: 2772: 2771: 2769: 2768: 2756: 2750: 2749: 2747: 2746: 2731: 2725: 2724: 2722: 2721: 2709: 2703: 2702: 2700: 2699: 2684: 2675: 2674: 2672: 2671: 2656: 2650: 2649: 2647: 2646: 2631: 2625: 2624: 2622: 2621: 2615: 2607: 2601: 2600: 2598: 2597: 2586: 2580: 2579: 2577: 2576: 2564: 2558: 2557: 2546: 2540: 2539: 2537: 2536: 2521: 2515: 2514: 2512: 2511: 2502:. Archived from 2491: 2485: 2484: 2482: 2481: 2460: 2451: 2450: 2437: 2431: 2430: 2428: 2427: 2412: 2406: 2405: 2403: 2402: 2387: 2381: 2380: 2378: 2377: 2362: 2356: 2355: 2353: 2352: 2337: 2331: 2330: 2328: 2327: 2312: 2301: 2300: 2298: 2296: 2285: 2279: 2278: 2276: 2275: 2260: 2254: 2253: 2251: 2250: 2235: 2229: 2228: 2226: 2225: 2213: 2204: 2203: 2201: 2200: 2185: 2179: 2172: 2163: 2162: 2154: 2148: 2147: 2145: 2143: 2128: 2122: 2121: 2119: 2118: 2107: 2101: 2100: 2092: 2086: 2080: 2074: 2073: 2071: 2070: 2054: 2048: 2047: 2045: 2044: 2037:Atlantic Council 2029: 2023: 2022: 2020: 2019: 2004: 1998: 1997: 1995: 1994: 1979: 1973: 1972: 1970: 1969: 1954: 1948: 1947: 1941: 1939: 1924: 1915: 1914: 1912: 1904: 1898: 1897: 1895: 1893: 1870: 1864: 1863: 1861: 1859: 1850:. Archived from 1837: 1831: 1830: 1828: 1826: 1809: 1803: 1802: 1800: 1798: 1781: 1775: 1774: 1772: 1770: 1756: 1748: 1742: 1741: 1739: 1737: 1722: 1707: 1706: 1704: 1702: 1679: 1673: 1672: 1632: 1626: 1625: 1623: 1621: 1604: 1532:zero-day attacks 1476:European Council 1365:virtual machines 895: 888: 881: 863: 862: 851: 850: 832: 831: 820: 819: 808: 807: 796: 795: 775: 765: 755: 745: 735: 725: 715: 547:Wikimedia v. NSA 537:Klayman v. Obama 436:Safe Streets Act 168: 154: 147: 58: 40: 33: 21: 3698: 3697: 3693: 3692: 3691: 3689: 3688: 3687: 3653: 3652: 3651: 3646: 3641:Zendian Problem 3639: 3632: 3625: 3618: 3611: 3604: 3597: 3590: 3583: 3572: 3565: 3558: 3551: 3544: 3537: 3530: 3523: 3512: 3505: 3498: 3491: 3484: 3477: 3470: 3463: 3456: 3449: 3442: 3435: 3428: 3421: 3414: 3407: 3396: 3389: 3382: 3375: 3368: 3361: 3354: 3347: 3340: 3333: 3326: 3319: 3308: 3301: 3294: 3287: 3280: 3273: 3266: 3259: 3252: 3241: 3234: 3227: 3220: 3213: 3206: 3199: 3192: 3185: 3174: 3167: 3160: 3153: 3146: 3141:Kenneth Minihan 3139: 3132: 3125: 3118: 3111: 3106:Bobby Ray Inman 3104: 3097: 3090: 3083: 3078:Marshall Carter 3076: 3069: 3062: 3057:John A. Samford 3055: 3048: 3035: 3031: 3026: 3019: 3012: 3005: 2998: 2991: 2984: 2977: 2970: 2963: 2956: 2949: 2942: 2935: 2928: 2921: 2914: 2907: 2900: 2893: 2886: 2879: 2872: 2865: 2858: 2847: 2842: 2780: 2775: 2766: 2764: 2758: 2757: 2753: 2744: 2742: 2733: 2732: 2728: 2719: 2717: 2711: 2710: 2706: 2697: 2695: 2686: 2685: 2678: 2669: 2667: 2658: 2657: 2653: 2644: 2642: 2633: 2632: 2628: 2619: 2617: 2613: 2609: 2608: 2604: 2595: 2593: 2588: 2587: 2583: 2574: 2572: 2566: 2565: 2561: 2548: 2547: 2543: 2534: 2532: 2523: 2522: 2518: 2509: 2507: 2493: 2492: 2488: 2479: 2477: 2462: 2461: 2454: 2439: 2438: 2434: 2425: 2423: 2414: 2413: 2409: 2400: 2398: 2389: 2388: 2384: 2375: 2373: 2364: 2363: 2359: 2350: 2348: 2339: 2338: 2334: 2325: 2323: 2314: 2313: 2304: 2294: 2292: 2287: 2286: 2282: 2273: 2271: 2262: 2261: 2257: 2248: 2246: 2237: 2236: 2232: 2223: 2221: 2215: 2214: 2207: 2198: 2196: 2187: 2186: 2182: 2176:NSA ANT catalog 2173: 2166: 2161:. The Register. 2156: 2155: 2151: 2141: 2139: 2130: 2129: 2125: 2116: 2114: 2109: 2108: 2104: 2094: 2093: 2089: 2081: 2077: 2068: 2066: 2056: 2055: 2051: 2042: 2040: 2031: 2030: 2026: 2017: 2015: 2006: 2005: 2001: 1992: 1990: 1981: 1980: 1976: 1967: 1965: 1956: 1955: 1951: 1937: 1935: 1926: 1925: 1918: 1910: 1906: 1905: 1901: 1891: 1889: 1887: 1872: 1871: 1867: 1857: 1855: 1854:on May 25, 2013 1839: 1838: 1834: 1824: 1822: 1811: 1810: 1806: 1796: 1794: 1783: 1782: 1778: 1768: 1766: 1750: 1749: 1745: 1735: 1733: 1724: 1723: 1710: 1700: 1698: 1696: 1681: 1680: 1676: 1634: 1633: 1629: 1619: 1617: 1606: 1605: 1601: 1597: 1540: 1405: 1390:Jacob Appelbaum 1331: 1198: 1196:QUANTUM attacks 1174:Jacob Appelbaum 1148:NSA ANT catalog 1144: 1142:NSA ANT catalog 1138: 1136:NSA ANT catalog 1129:QUANTUMSQUIRREL 1111: 1102: 1006:Fort Eisenhower 982: 969: 960: 954: 899: 870: 869: 857: 845: 826: 814: 802: 790: 702: 694: 693: 679: 671: 670: 631: 623: 622: 608: 600: 599: 565: 557: 556: 542:ACLU v. Clapper 512: 504: 503: 484: 476: 475: 431: 423: 422: 182: 174: 155: 138: 126: 100: 28: 23: 22: 15: 12: 11: 5: 3696: 3694: 3686: 3685: 3680: 3675: 3670: 3665: 3655: 3654: 3648: 3647: 3645: 3644: 3637: 3630: 3623: 3616: 3609: 3602: 3595: 3588: 3585:Dundee Society 3580: 3578: 3574: 3573: 3571: 3570: 3563: 3556: 3549: 3542: 3535: 3528: 3520: 3518: 3514: 3513: 3511: 3510: 3503: 3496: 3489: 3482: 3475: 3468: 3461: 3454: 3447: 3440: 3433: 3426: 3419: 3412: 3404: 3402: 3398: 3397: 3395: 3394: 3387: 3380: 3373: 3366: 3363:Pike Committee 3359: 3352: 3345: 3338: 3335:Edward Snowden 3331: 3324: 3316: 3314: 3310: 3309: 3307: 3306: 3299: 3292: 3285: 3278: 3271: 3264: 3257: 3249: 3247: 3243: 3242: 3240: 3239: 3232: 3225: 3218: 3211: 3204: 3197: 3190: 3182: 3180: 3176: 3175: 3173: 3172: 3165: 3158: 3151: 3148:Michael Hayden 3144: 3137: 3130: 3123: 3116: 3109: 3102: 3095: 3088: 3081: 3074: 3067: 3060: 3053: 3045: 3043: 3037: 3036: 3029: 3027: 3025: 3024: 3017: 3010: 3003: 2996: 2989: 2982: 2975: 2968: 2961: 2954: 2947: 2940: 2933: 2926: 2919: 2912: 2905: 2898: 2891: 2884: 2877: 2870: 2863: 2855: 2853: 2849: 2848: 2843: 2841: 2840: 2833: 2826: 2818: 2812: 2811: 2806: 2801: 2796: 2791: 2786: 2779: 2778:External links 2776: 2774: 2773: 2751: 2726: 2704: 2693:Foreign Policy 2676: 2651: 2626: 2602: 2581: 2571:. Ars Technica 2559: 2541: 2516: 2486: 2452: 2432: 2407: 2382: 2357: 2332: 2302: 2280: 2255: 2230: 2220:. Schneier.com 2205: 2180: 2164: 2149: 2137:New York Times 2123: 2102: 2087: 2075: 2049: 2024: 2012:Tages-Anzeiger 1999: 1988:Foreign Policy 1974: 1949: 1916: 1899: 1885: 1865: 1832: 1804: 1776: 1743: 1731:Foreign Policy 1708: 1695:978-1594206566 1694: 1674: 1647:(1): 112–128. 1627: 1598: 1596: 1593: 1592: 1591: 1586: 1581: 1576: 1571: 1569:PLA Unit 61398 1566: 1561: 1556: 1554:Equation Group 1551: 1546: 1539: 1536: 1503:Foreign Policy 1404: 1401: 1361:race condition 1330: 1329: 1324: 1319: 1314: 1309: 1304: 1299: 1293: 1288: 1283: 1277: 1272: 1267: 1261: 1254: 1234:spear-phishing 1197: 1194: 1140:Main article: 1137: 1134: 1110: 1107: 1101: 1098: 1097: 1096: 1095: 1094: 1091: 1066: 1063: 1057: 1056: 1055: 1052: 1049: 1046: 1043: 1033: 1016:, Texas), and 981: 978: 973:Edward Snowden 968: 965: 953: 950: 943:Michael Hayden 901: 900: 898: 897: 890: 883: 875: 872: 871: 868: 867: 855: 842: 841: 837: 836: 824: 812: 800: 787: 786: 780: 779: 769: 759: 749: 739: 729: 719: 708: 707: 703: 700: 699: 696: 695: 692: 691: 686: 680: 677: 676: 673: 672: 669: 668: 663: 658: 653: 648: 643: 638: 632: 629: 628: 625: 624: 621: 620: 615: 609: 606: 605: 602: 601: 598: 597: 595:Edward Snowden 592: 587: 582: 577: 572: 570:William Binney 566: 564:Whistleblowers 563: 562: 559: 558: 555: 554: 549: 544: 539: 534: 529: 524: 519: 513: 510: 509: 506: 505: 502: 501: 496: 491: 485: 482: 481: 478: 477: 474: 473: 468: 463: 458: 453: 448: 443: 438: 432: 429: 428: 425: 424: 421: 420: 415: 409: 408: 404: 403: 398: 393: 388: 383: 378: 373: 368: 363: 357: 356: 352: 351: 346: 341: 336: 331: 325: 324: 320: 319: 318: 317: 307: 302: 297: 292: 287: 282: 276: 275: 271: 270: 264: 263: 259: 258: 252: 251: 247: 246: 241: 236: 231: 226: 221: 215: 214: 210: 209: 204: 199: 194: 188: 187: 183: 180: 179: 176: 175: 169: 161: 160: 143: 142: 139: 136: 133: 132: 127: 124: 121: 120: 111: 107: 106: 101: 98: 95: 94: 89: 85: 84: 78:Cyberespionage 75: 71: 70: 65: 61: 60: 54: 50: 49: 46: 42: 41: 26: 24: 18:Quantum insert 14: 13: 10: 9: 6: 4: 3: 2: 3695: 3684: 3681: 3679: 3676: 3674: 3673:Hacker groups 3671: 3669: 3666: 3664: 3661: 3660: 3658: 3642: 3638: 3635: 3631: 3628: 3624: 3621: 3617: 3614: 3610: 3607: 3603: 3600: 3596: 3593: 3589: 3586: 3582: 3581: 3579: 3575: 3568: 3564: 3561: 3557: 3554: 3550: 3547: 3543: 3540: 3536: 3533: 3529: 3526: 3522: 3521: 3519: 3515: 3508: 3504: 3501: 3497: 3494: 3490: 3487: 3483: 3480: 3476: 3473: 3469: 3466: 3462: 3459: 3455: 3452: 3448: 3445: 3441: 3438: 3434: 3431: 3427: 3424: 3420: 3417: 3413: 3410: 3406: 3405: 3403: 3399: 3392: 3388: 3385: 3381: 3378: 3374: 3371: 3367: 3364: 3360: 3357: 3353: 3350: 3349:James Bamford 3346: 3343: 3339: 3336: 3332: 3329: 3325: 3322: 3318: 3317: 3315: 3311: 3304: 3303:WARRIOR PRIDE 3300: 3297: 3293: 3290: 3286: 3283: 3279: 3276: 3272: 3269: 3265: 3262: 3258: 3255: 3251: 3250: 3248: 3244: 3237: 3233: 3230: 3226: 3223: 3219: 3216: 3212: 3209: 3205: 3202: 3198: 3195: 3191: 3188: 3184: 3183: 3181: 3177: 3170: 3169:Paul Nakasone 3166: 3163: 3159: 3156: 3152: 3149: 3145: 3142: 3138: 3135: 3131: 3128: 3127:Bill Studeman 3124: 3121: 3117: 3114: 3110: 3107: 3103: 3100: 3096: 3093: 3089: 3086: 3082: 3079: 3075: 3072: 3068: 3065: 3061: 3058: 3054: 3051: 3047: 3046: 3044: 3042: 3038: 3022: 3018: 3015: 3011: 3008: 3004: 3001: 2997: 2994: 2990: 2987: 2983: 2980: 2979:Roaring Creek 2976: 2973: 2969: 2966: 2962: 2959: 2955: 2952: 2948: 2945: 2941: 2938: 2934: 2931: 2927: 2924: 2920: 2917: 2913: 2910: 2906: 2903: 2899: 2896: 2892: 2889: 2885: 2882: 2878: 2875: 2871: 2868: 2864: 2861: 2857: 2856: 2854: 2850: 2846: 2839: 2834: 2832: 2827: 2825: 2820: 2819: 2816: 2810: 2807: 2805: 2802: 2800: 2797: 2795: 2792: 2790: 2787: 2785: 2782: 2781: 2777: 2762: 2755: 2752: 2741: 2737: 2730: 2727: 2715: 2708: 2705: 2694: 2690: 2683: 2681: 2677: 2665: 2661: 2655: 2652: 2641:on 2014-01-15 2640: 2636: 2630: 2627: 2612: 2606: 2603: 2591: 2585: 2582: 2570: 2563: 2560: 2555: 2551: 2545: 2542: 2531: 2527: 2520: 2517: 2506:on 2014-08-24 2505: 2501: 2497: 2490: 2487: 2476: 2472: 2471: 2466: 2459: 2457: 2453: 2448: 2447: 2442: 2436: 2433: 2421: 2417: 2411: 2408: 2396: 2392: 2386: 2383: 2371: 2367: 2361: 2358: 2347: 2343: 2336: 2333: 2321: 2317: 2311: 2309: 2307: 2303: 2291: 2284: 2281: 2269: 2265: 2259: 2256: 2245: 2241: 2234: 2231: 2219: 2212: 2210: 2206: 2194: 2190: 2184: 2181: 2177: 2171: 2169: 2165: 2160: 2153: 2150: 2138: 2134: 2127: 2124: 2112: 2106: 2103: 2098: 2091: 2088: 2084: 2079: 2076: 2065:on 2014-02-20 2064: 2060: 2053: 2050: 2038: 2034: 2028: 2025: 2013: 2009: 2003: 2000: 1989: 1985: 1978: 1975: 1964:on 2014-01-25 1963: 1959: 1953: 1950: 1946: 1934: 1930: 1923: 1921: 1917: 1909: 1903: 1900: 1888: 1882: 1878: 1877: 1869: 1866: 1853: 1849: 1848: 1843: 1836: 1833: 1821: 1820: 1815: 1808: 1805: 1793: 1792: 1787: 1780: 1777: 1764: 1760: 1755: 1747: 1744: 1732: 1728: 1721: 1719: 1717: 1715: 1713: 1709: 1697: 1691: 1687: 1686: 1678: 1675: 1670: 1666: 1662: 1658: 1654: 1650: 1646: 1642: 1638: 1631: 1628: 1616: 1615: 1610: 1603: 1600: 1594: 1590: 1589:WARRIOR PRIDE 1587: 1585: 1582: 1580: 1577: 1575: 1572: 1570: 1567: 1565: 1562: 1560: 1557: 1555: 1552: 1550: 1547: 1545: 1542: 1541: 1537: 1535: 1533: 1529: 1525: 1521: 1517: 1513: 1509: 1505: 1504: 1498: 1496: 1492: 1488: 1484: 1479: 1477: 1473: 1469: 1465: 1461: 1457: 1453: 1449: 1445: 1440: 1438: 1433: 1429: 1424: 1422: 1418: 1414: 1410: 1402: 1400: 1398: 1393: 1391: 1387: 1383: 1382: 1376: 1374: 1370: 1366: 1362: 1357: 1355: 1351: 1346: 1344: 1340: 1336: 1328: 1325: 1323: 1320: 1318: 1315: 1313: 1310: 1308: 1305: 1303: 1300: 1297: 1294: 1292: 1289: 1287: 1284: 1281: 1278: 1276: 1273: 1271: 1268: 1265: 1262: 1259: 1256: 1255: 1253: 1250: 1248: 1244: 1240: 1235: 1230: 1226: 1222: 1213: 1206: 1202: 1195: 1193: 1191: 1187: 1183: 1179: 1175: 1171: 1170: 1165: 1160: 1157: 1156:United States 1153: 1150:is a 50-page 1149: 1143: 1135: 1130: 1126: 1122: 1120: 1116: 1108: 1106: 1099: 1092: 1089: 1088: 1086: 1085: 1079: 1075: 1071: 1067: 1064: 1061: 1058: 1053: 1050: 1047: 1044: 1041: 1040: 1038: 1034: 1031: 1027: 1026: 1025: 1023: 1019: 1015: 1011: 1007: 1003: 999: 995: 991: 987: 979: 977: 974: 966: 964: 959: 951: 949: 946: 944: 940: 936: 935:cyber-warfare 932: 928: 924: 920: 912: 907: 896: 891: 889: 884: 882: 877: 876: 874: 873: 866: 861: 856: 854: 849: 844: 843: 839: 838: 835: 830: 825: 823: 818: 813: 811: 806: 801: 799: 794: 789: 788: 785: 782: 781: 778: 774: 770: 768: 764: 760: 758: 754: 750: 748: 744: 740: 738: 734: 730: 728: 724: 720: 718: 714: 710: 709: 706:United States 705: 704: 701:Collaboration 698: 697: 690: 687: 685: 682: 681: 675: 674: 667: 664: 662: 659: 657: 654: 652: 649: 647: 646:Mail tracking 644: 642: 639: 637: 634: 633: 627: 626: 619: 616: 614: 611: 610: 604: 603: 596: 593: 591: 588: 586: 583: 581: 578: 576: 573: 571: 568: 567: 561: 560: 553: 550: 548: 545: 543: 540: 538: 535: 533: 530: 528: 525: 523: 520: 518: 515: 514: 508: 507: 500: 497: 495: 492: 490: 487: 486: 480: 479: 472: 469: 467: 464: 462: 459: 457: 454: 452: 449: 447: 444: 442: 439: 437: 434: 433: 427: 426: 419: 416: 414: 411: 410: 406: 405: 402: 399: 397: 394: 392: 389: 387: 384: 382: 379: 377: 374: 372: 369: 367: 364: 362: 359: 358: 354: 353: 350: 347: 345: 342: 340: 337: 335: 332: 330: 327: 326: 322: 321: 316: 313: 312: 311: 308: 306: 303: 301: 298: 296: 293: 291: 288: 286: 283: 281: 278: 277: 273: 272: 269: 266: 265: 261: 260: 257: 254: 253: 249: 248: 245: 242: 240: 237: 235: 232: 230: 227: 225: 222: 220: 217: 216: 212: 211: 208: 205: 203: 200: 198: 195: 193: 190: 189: 185: 184: 178: 177: 172: 167: 163: 162: 158: 153: 148: 140: 134: 131: 128: 122: 119: 115: 112: 108: 105: 104:United States 102: 96: 93: 90: 86: 83: 79: 76: 72: 69: 66: 62: 55: 51: 47: 43: 39: 34: 19: 3507:Epic Shelter 3472:Stellar Wind 3221: 3071:Gordon Blake 3050:Ralph Canine 2765:. Retrieved 2754: 2743:. Retrieved 2740:The Atlantic 2739: 2729: 2718:. Retrieved 2707: 2696:. Retrieved 2692: 2668:. Retrieved 2666:. 2013-12-29 2663: 2654: 2643:. Retrieved 2639:the original 2629: 2618:. Retrieved 2605: 2594:. Retrieved 2584: 2573:. Retrieved 2562: 2553: 2544: 2533:. Retrieved 2529: 2519: 2508:. Retrieved 2504:the original 2489: 2478:. Retrieved 2470:The Register 2468: 2444: 2435: 2424:. Retrieved 2422:. 2013-12-30 2419: 2410: 2399:. Retrieved 2397:. 2013-12-30 2394: 2385: 2374:. Retrieved 2372:. 2013-12-30 2369: 2360: 2349:. Retrieved 2345: 2335: 2324:. Retrieved 2322:. 2013-12-29 2319: 2293:. Retrieved 2283: 2272:. Retrieved 2270:. 2013-12-30 2267: 2258: 2247:. Retrieved 2243: 2233: 2222:. Retrieved 2197:. Retrieved 2195:. 2013-12-30 2192: 2183: 2152: 2140:. Retrieved 2136: 2126: 2115:. Retrieved 2105: 2096: 2090: 2078: 2067:. Retrieved 2063:the original 2052: 2041:. Retrieved 2039:. 2013-06-11 2036: 2027: 2016:. Retrieved 2011: 2002: 1991:. Retrieved 1987: 1977: 1966:. Retrieved 1962:the original 1952: 1943: 1936:. Retrieved 1932: 1902: 1890:. Retrieved 1875: 1868: 1856:. Retrieved 1852:the original 1845: 1835: 1823:. Retrieved 1817: 1807: 1795:. Retrieved 1789: 1779: 1767:. Retrieved 1758: 1746: 1734:. Retrieved 1730: 1699:. Retrieved 1684: 1677: 1644: 1640: 1630: 1618:. Retrieved 1612: 1602: 1501: 1499: 1480: 1441: 1425: 1406: 1394: 1379: 1377: 1367:(running on 1358: 1347: 1332: 1251: 1218: 1189: 1167: 1145: 1112: 1103: 1084:Jimmy Carter 1083: 1029: 1018:NSA Colorado 1008:, Georgia), 985: 983: 980:Organization 970: 967:Snowden leak 961: 947: 930: 926: 922: 918: 916: 575:Thomas Drake 552:US v. Moalin 527:Jewel v. NSA 483:Institutions 381:TRAFFICTHIEF 267: 159:surveillance 88:Headquarters 82:cyberwarfare 45:Abbreviation 3479:TRAILBLAZER 3391:Matthew Aid 3384:Thomas Tamm 3313:Controversy 3254:ANT catalog 3085:Noel Gayler 3000:Sugar Grove 2944:Kent Island 2888:Dorsey Road 2763:. Bloomberg 2716:. CNET News 2664:Der Spiegel 2420:Der Spiegel 2395:Der Spiegel 2370:Der Spiegel 2346:Der Spiegel 2320:Der Spiegel 2268:Der Spiegel 2244:Der Spiegel 2193:Der Spiegel 1938:7 September 1428:SEA-ME-WE 4 1397:against Tor 1264:doubleclick 1229:web browser 1190:Der Spiegel 1169:Der Spiegel 1024:, Denver). 1002:NSA Georgia 607:Publication 585:Thomas Tamm 517:ACLU v. NSA 456:Patriot Act 430:Legislation 290:Trailblazer 3657:Categories 3532:Interquake 3486:Turbulence 3246:Technology 2993:Salt Creek 2909:Fort Meade 2767:2014-01-18 2745:2014-01-18 2720:2014-01-18 2698:2023-07-27 2670:2014-01-27 2645:2014-01-18 2620:2015-10-03 2596:2014-01-18 2575:2014-01-18 2535:2014-01-18 2510:2014-08-15 2480:2014-08-15 2426:2014-01-18 2401:2014-01-18 2376:2014-01-18 2351:2014-01-18 2326:2014-01-18 2274:2014-01-18 2249:2014-01-18 2224:2014-01-18 2199:2014-01-18 2117:2014-07-16 2069:2014-01-27 2043:2023-07-27 2018:2014-01-27 1993:2014-01-27 1968:2014-01-27 1620:4 December 1595:References 1369:VMware ESX 1302:Tencent QQ 1270:rocketmail 1152:classified 1109:Leadership 994:NSA Hawaii 956:See also: 580:Mark Klein 323:Since 2007 295:Turbulence 274:Since 2001 262:Since 1998 250:Since 1990 239:ThinThread 213:Since 1978 92:Fort Meade 3539:Main Core 3517:Databases 3500:XKeyscore 3370:Russ Tice 3261:FROSTBURG 3179:Divisions 3099:Lew Allen 2986:Room 641A 2852:Locations 2554:Bloomberg 2500:DailyTech 2295:August 8, 2085:(slide 8) 1769:31 August 1669:158068358 1661:0268-4527 1584:Unit 8200 1528:Microsoft 1464:Syniverse 1350:XKeyscore 1260:ForumUser 1164:Five Eyes 1115:Rob Joyce 1010:NSA Texas 1000:, Oahu), 911:XKeyscore 784:Five Eyes 636:Cablegate 590:Russ Tice 391:XKeyscore 371:Main Core 339:Stateroom 285:STORMBREW 256:RAMPART-A 234:Main Core 114:Zero-days 59:1997–2001 53:Formation 3525:DISHFIRE 3493:Upstream 3444:MUSCULAR 3430:Fairview 3416:Dropmire 3401:Programs 2965:Pine Gap 2592:. SVT.se 2142:March 9, 1763:Archived 1538:See also 1508:AT&T 1474:and the 1452:Belgacom 1339:MUSCULAR 1337:(GCHQ) ( 1307:Facebook 1291:mailruid 1286:LinkedIn 1076:and the 727:CYBERCOM 689:Metadata 678:Concepts 511:Lawsuits 413:MUSCULAR 386:DISHFIRE 334:Dropmire 300:Genoa II 229:FAIRVIEW 202:SHAMROCK 186:Pre-1978 181:Programs 3567:PINWALE 3546:MAINWAY 3423:ECHELON 3342:LOVEINT 3296:STU-III 3268:HARVEST 3041:Leaders 2446:YouTube 1736:11 June 1701:1 April 1574:Stuxnet 1512:Verizon 1495:Firefox 1460:Comfone 1399:users. 1327:YouTube 1312:Twitter 1298:Token64 1296:msnMail 1280:Hotmail 1258:alibaba 1186:Germany 1182:Hamburg 1068:S328 – 1048:S3233 – 1035:S323 – 998:Wahiawa 952:History 933:, is a 925:), now 630:Related 418:Tempora 396:ICREACH 376:MAINWAY 361:PINWALE 344:Bullrun 280:OAKSTAR 224:BLARNEY 197:MINARET 192:ECHELON 130:English 118:spyware 110:Methods 99:Region 74:Purpose 3627:VENONA 3560:Nymrod 3553:MARINA 3451:MYSTIC 3289:STU-II 2475:London 1892:22 May 1883:  1858:23 May 1825:22 May 1797:22 May 1692:  1667:  1659:  1516:Sprint 1470:, the 1419:, and 1221:router 1205:Lolcat 684:SIGINT 366:MARINA 349:MYSTIC 207:PROMIS 3577:Other 3458:PRISM 3282:STU-I 2614:(PDF) 2530:Wired 1911:(PDF) 1665:S2CID 1520:Cisco 1448:MyNOC 1409:China 1343:Gmail 1322:Gmail 1317:Yahoo 913:slide 840:Other 329:PRISM 244:Genoa 3236:NSOC 3229:NTOC 2881:CSSG 2297:2013 2144:2022 1940:2013 1894:2013 1881:ISBN 1860:2013 1827:2013 1799:2013 1771:2013 1738:2013 1703:2021 1690:ISBN 1657:ISSN 1622:2017 1524:Dell 1522:and 1514:and 1493:and 1485:and 1454:and 1444:GCHQ 1417:OPEC 1225:HTTP 1146:The 1082:USS 917:The 853:DGSE 834:GCSB 810:GCHQ 798:CSEC 489:FISC 451:ECPA 446:FISA 64:Type 3222:TAO 3215:SSO 3201:ROC 3187:CSS 1649:doi 1491:Tor 1487:FBI 1483:CIA 1446:'s 1411:, 1388:by 1381:sic 1275:hi5 1180:in 1078:FBI 1074:CIA 931:S32 923:TAO 865:BND 822:ASD 777:IAO 767:DHS 757:CIA 747:FBI 737:DOJ 717:CSS 48:TAO 3659:: 2738:. 2691:. 2679:^ 2662:. 2552:. 2528:. 2498:. 2473:. 2467:. 2455:^ 2443:. 2418:. 2393:. 2368:. 2344:. 2318:. 2305:^ 2266:. 2242:. 2208:^ 2191:. 2167:^ 2135:. 2035:. 2010:. 1986:. 1942:. 1931:. 1919:^ 1844:. 1816:. 1788:. 1761:. 1757:. 1729:. 1711:^ 1663:. 1655:. 1645:34 1643:. 1639:. 1611:. 1510:, 1497:. 1462:, 1423:. 1415:, 1345:. 1282:ID 1266:ID 1249:. 1184:, 945:. 116:, 80:, 57:c. 2837:e 2830:t 2823:v 2770:. 2748:. 2723:. 2701:. 2673:. 2648:. 2623:. 2599:. 2578:. 2538:. 2513:. 2483:. 2449:. 2429:. 2404:. 2379:. 2354:. 2329:. 2299:. 2277:. 2252:. 2227:. 2202:. 2146:. 2120:. 2099:. 2072:. 2046:. 2021:. 1996:. 1971:. 1913:. 1896:. 1862:. 1829:. 1801:. 1773:. 1740:. 1705:. 1671:. 1651:: 1624:. 1020:( 1012:( 1004:( 996:( 921:( 894:e 887:t 880:v 20:)

Index

Quantum insert

Advanced persistent threat
Cyberespionage
cyberwarfare
Fort Meade
United States
Zero-days
spyware
English

National Security Agency

Map of global NSA data collection
ECHELON
MINARET
SHAMROCK
PROMIS
Upstream collection
BLARNEY
FAIRVIEW
Main Core
ThinThread
Genoa
RAMPART-A
Tailored Access Operations
OAKSTAR
STORMBREW
Trailblazer
Turbulence

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑