763:
733:
743:
753:
723:
3032:
166:
152:
906:
817:
713:
1201:
793:
805:
829:
1125:
1212:
1518:), most of the large US-based Internet service providers, and many of the top computer security software manufacturers and consulting companies." A 2012 TAO budget document claims that these companies, on TAO's behest, "insert vulnerabilities into commercial encryption systems, IT systems, networks and endpoint communications devices used by targets". A number of US companies, including
860:
848:
773:
1080:, who perform what are described as "off-net operations", which means they arrange for CIA agents to surreptitiously plant eavesdropping devices on computers and telecommunications systems overseas so that TAO's hackers may remotely access them from Fort Meade. Specially equipped submarines, currently the
1944:
Much more often, an implant is coded entirely in software by an NSA group called, Tailored Access
Operations (TAO). As its name suggests, TAO builds attack tools that are custom-fitted to their targets. The NSA unit's software engineers would rather tap into networks than individual computers because
975:
describing the unit's work says TAO has software templates allowing it to break into commonly used hardware, including "routers, switches, and firewalls from multiple product vendor lines". TAO engineers prefer to tap networks rather than isolated computers, because there are typically many devices
962:
TAO is reportedly "the largest and arguably the most important component of the NSA's huge
Signals Intelligence Directorate (SID), consisting of more than 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and
1104:
Details on a program titled QUANTUMSQUIRREL indicate NSA ability to masquerade as any routable IPv4 or IPv6 host. This enables an NSA computer to generate false geographical location and personal identification credentials when accessing the
Internet utilizing QUANTUMSQUIRREL.
1172:, which released the catalog to the public on December 30, 2013, "The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data." The document was created in 2008. Security researcher
1236:
attacks the NSA referred to as spam. If the browser is exploitable, further permanent "implants" (rootkits etc.) are deployed in the target computer, e.g. OLYMPUSFIRE for
Windows, which gives complete remote access to the infected machine. This type of attack is part of the
1945:
there are usually many devices on each network. Tailored Access
Operations has software templates to break into common brands and models of "routers, switches, and firewalls from multiple product vendor lines," according to one document describing its work.
1384:] is used to commandeer (i.e. compromise) untargeted computer systems. The software is used as a part of QUANTUMNATION, which also includes the software vulnerability scanner VALIDATOR. The tool was first described at the 2014
1928:
1608:
1907:
1434:
system that carries telecommunications between
Singapore, Malaysia, Thailand, Bangladesh, India, Sri Lanka, Pakistan, United Arab Emirates, Saudi Arabia, Sudan, Egypt, Italy, Tunisia, Algeria and France. Additionally,
470:
1363:, i.e. the NSA server is trying to beat the legitimate server with its response. As of mid-2011, the NSA was prototyping a capability codenamed QFIRE, which involved embedding their exploit-dispensing servers in
1161:
Tailored Access
Operations (TAO) by the Advanced Network Technology (ANT) Division to aid in cyber surveillance. Most devices are described as already operational and available to US nationals and members of the
1231:
before the intended destination has had a chance to respond (it's unclear if the compromised router facilitates this race on the return trip). Prior to the development of this technology, FOXACID software made
1957:
1534:. A Microsoft official who declined to be identified in the press confirmed that this is indeed the case, but said that Microsoft cannot be held responsible for how the NSA uses this advance information.
3362:
1489:, TAO is used to intercept laptops purchased online, divert them to secret warehouses where spyware and hardware is installed, and send them on to customers. TAO has also targeted internet browsers
1762:
1530:
provides advance warning to the NSA of vulnerabilities it knows about, before fixes or information about these vulnerabilities is available to the public; this enables TAO to execute so-called
650:
852:
1227:
requests, so that they go both to the intended target and to an NSA site (indirectly). The NSA site runs FOXACID software which sends back exploits that load in the background in the target
516:
2495:
640:
2634:
1506:, TAO has become "increasingly accomplished at its mission, thanks in part to the high-level cooperation it secretly receives from the 'big three' American telecom companies (
3682:
762:
3320:
617:
1841:
2835:
435:
1961:
1436:
2783:
2315:
2659:
797:
742:
569:
612:
3667:
941:(NSA). It has been active since at least 1998, possibly 1997, but was not named or structured as TAO until "the last days of 2000," according to General
892:
2263:
2239:
38:
2158:
833:
732:
2568:
3355:
3040:
2289:
2549:
1420:
752:
722:
665:
498:
488:
2828:
2503:
1443:
1334:
809:
660:
2082:
2188:
1884:
1412:
450:
445:
2735:
1753:
1359:
QUANTUM attacks launched from NSA sites can be too slow for some combinations of targets and services as they essentially try to exploit a
2525:
2007:
1375:(SCS) network worldwide. The goal of QFIRE was to lower the latency of the spoofed response, thus increasing the probability of success.
948:
TAO identifies, monitors, infiltrates, and gathers intelligence on computer systems being used by entities foreign to the United States.
3235:
2760:
2713:
1785:
736:
645:
309:
2803:
2464:
2415:
2341:
2058:
2808:
2390:
2365:
1693:
2638:
3677:
2950:
2821:
1548:
1059:
712:
2110:
1983:
3633:
2873:
2859:
1851:
1407:
Suspected, alleged and confirmed targets of the
Tailored Access Operations unit include national and international entities like
531:
338:
2610:
3429:
1338:
766:
746:
412:
228:
2032:
3662:
3591:
3422:
2957:
1813:
1431:
1215:
NSA's QUANTUMTHEORY overview slide with various codenames for specific types of attack and integration with other NSA systems
885:
821:
314:
206:
1069:
3450:
2943:
2132:
1177:
493:
348:
1726:
1121:(IAD). In January 2016, Joyce had a rare public appearance when he gave a presentation at the Usenix’s Enigma conference.
3193:
2095:
Dealer, Hacker. "Dealer, Hacker, Lawyer, Spy: Modern
Techniques and Legal Boundaries of Counter-cybercrime Operations".
1385:
776:
343:
1118:
3605:
3598:
3228:
2936:
1036:
1017:
756:
726:
465:
304:
1818:
1790:
1637:"From cold to cyber warriors: the origins and expansion of NSA's Tailored Access Operations (TAO) to Shadow Brokers"
3464:
3207:
2922:
2880:
1543:
1001:
67:
1252:
There are numerous services that FOXACID can exploit this way. The names of some FOXACID modules are given below:
3274:
3214:
2929:
2901:
2793:
2788:
1563:
993:
878:
165:
151:
3200:
3186:
3147:
3006:
2866:
2844:
1238:
1158:
1021:
1009:
942:
938:
716:
156:
3020:
1372:
3612:
1558:
1396:
1353:
864:
551:
2083:
https://www.eff.org/files/2014/04/09/20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf
3672:
3436:
3133:
1846:
1578:
1242:
1151:
1013:
655:
1526:, have subsequently made public statements denying that they insert such back doors into their products.
772:
3119:
2978:
2887:
1455:
963:
electrical engineers. The office is currently known as Office of
Computer Network Operations (OCNO). ".
460:
2217:
3376:
2589:
1128:
989:
957:
683:
574:
113:
3492:
3478:
3408:
3063:
2999:
2688:
1613:
1471:
1467:
1348:
Finding machines that are exploitable and worth attacking is done using analytic databases such as
440:
400:
289:
223:
218:
170:
37:
3506:
3154:
3091:
2992:
1664:
1515:
1220:
3531:
2798:
2465:"How the NSA hacks PCs, phones, routers, hard disks 'at speed of light': Spy tech catalog leaks"
521:
3619:
3161:
3112:
1880:
1874:
1689:
1656:
1246:
1459:
3559:
3485:
3327:
3267:
3013:
2971:
2915:
2062:
1648:
1475:
1081:
546:
536:
299:
294:
201:
129:
1447:
3640:
3140:
3105:
3077:
3056:
2175:
1531:
1389:
1364:
1173:
1147:
1141:
1005:
541:
196:
3626:
3584:
3334:
2894:
2714:"NSA reportedly planted spyware on electronics equipment | Security & Privacy"
2440:
1568:
1553:
1502:
1360:
1233:
972:
804:
594:
77:
1131:
image from an NSA presentation explaining the QUANTUMSQUIRREL IP host spoofing ability
3656:
3348:
3302:
3168:
3126:
1668:
1588:
1490:
1257:
1155:
934:
243:
103:
2159:"NSA's top hacking boss explains how to protect your network from his attack squads"
1219:
The TAO has developed an attack suite they call QUANTUM. It relies on a compromised
3471:
3070:
3049:
2469:
1636:
1207:
image from an NSA presentation explaining in part the naming of the QUANTUM program
526:
380:
81:
2008:"Hintergrund: Die Speerspitze des amerikanischen Hackings - News Ausland: Amerika"
1929:"U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show"
1652:
2635:"British spies reportedly spoofed LinkedIn, Slashdot to target network engineers"
1683:
3390:
3383:
3253:
3084:
1427:
1263:
1228:
1211:
1168:
1065:
Mission Infrastructure Technologies Branch: operates the software provided above
828:
584:
455:
1958:"Secret NSA hackers from TAO Office have been pwning China for nearly 15 years"
2908:
1609:"NSA employee who worked on hacking tools at home pleads guilty to spy charge"
1368:
1301:
1269:
1200:
1124:
579:
238:
91:
17:
1660:
3538:
3499:
3369:
3260:
3098:
2985:
2499:
1583:
1527:
1463:
1349:
1163:
1114:
910:
816:
783:
635:
589:
390:
370:
284:
255:
233:
2813:
2133:"Thomas Bossert, Trump's Chief Adviser on Homeland Security, Is Forced Out"
1442:
TAO's QUANTUM INSERT technology was passed to UK services, particularly to
173:
as of 2007, with countries subject to the most data collection shown in red
2809:
Getting the 'Ungettable' Intelligence: An Interview with TAO's Teresa Shea
3524:
3443:
3415:
2964:
1451:
1306:
1285:
688:
385:
333:
2290:"NSA's Internet taps can find systems to hack, track VPNs and Word docs"
3566:
3545:
3341:
3295:
2445:
1573:
1511:
1507:
1494:
1326:
1311:
1290:
1279:
1185:
1181:
997:
859:
417:
395:
375:
360:
279:
191:
117:
2496:"Tax and Spy: How the NSA Can Hack Any American, Stores Data 15 Years"
1352:. A specific method of finding vulnerable machines is interception of
3552:
3288:
2474:
1876:
The Secret Sentry: The Untold History of the National Security Agency
1439:
in Sweden gives access to fiber optic links for QUANTUM cooperation.
1204:
847:
792:
365:
2590:"Läs dokumenten om Sverige från Edward Snowden - Uppdrag Granskning"
2526:"Our Government Has Weaponized the Internet. Here's How They Did It"
1188:, in which he detailed techniques that the simultaneously published
3457:
3281:
2789:
NSA 'hacking unit' infiltrates computers around the world – report
1519:
1408:
1342:
1321:
1316:
1210:
1199:
1123:
904:
328:
1395:
QUANTUMCOOKIE is a more complex form of attack which can be used
2218:"How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID"
1523:
1416:
1224:
2817:
1685:
Playing to the Edge: American Intelligence in the Age of Terror
2550:"China Accuses US of Repeated Hacks on Polytechnic University"
1486:
1482:
1426:
The group has also targeted global communication networks via
1380:
1295:
1274:
1245:. It is difficult to pull off without controlling some of the
1077:
1073:
2569:"Quantum of pwnness: How NSA and GCHQ hacked OPEC and others"
1117:, a 25-plus year employee who previously worked in the NSA's
1087:, are used to wiretap fibre optic cables around the globe.
2264:"NSA-Dokumente: So knackt der Geheimdienst Internetkonten"
2240:"NSA-Dokumente: So knackt der Geheimdienst Internetkonten"
2761:"U.S. Agencies Said to Swap Data With Thousands of Firms"
1922:
1920:
1466:, and Starhome. Belgacom, which provides services to the
1062:(TNT) : improve network and computer hacking methods
1032:, 600 employees gather information from around the world.
2799:
NSA Laughs at PCs, Prefers Hacking Routers and Switches
905:
2170:
2168:
1927:
Gellman, Barton; Nakashima, Ellen (August 30, 2013).
1072:(ATO): Reportedly includes personnel seconded by the
1812:
Kingsbury, Alex; Mulrine, Anna (November 18, 2009).
1786:"The Secret History of the National Security Agency"
1341:), Google services could be attacked too, including
3576:
3516:
3400:
3312:
3245:
3178:
3039:
2851:
2189:"Quantumtheory: Wie die NSA weltweit Rechner hackt"
1984:"Inside the NSA's Ultra-Secret China Hacking Group"
1727:"Inside the NSA's Ultra-Secret China Hacking Group"
135:
123:
109:
97:
87:
73:
63:
52:
44:
2556:. September 5, 2022 – via www.bloomberg.com.
2111:"The NSA and GCHQ's QUANTUMTHEORY Hacking Tactics"
1752:
1192:article he coauthored disclosed from the catalog.
2784:Inside TAO: Documents Reveal Top NSA Hacking Unit
2441:""Chaos Computer Club CCC Presentation" at 28:34"
1371:) hosted closer to the target, in the so-called
1045:S3232 – Cyber Networks Technology Division (CNT)
909:A reference to Tailored Access Operations in an
988:(ROC) and are based at the NSA headquarters at
3321:Global surveillance disclosures (2013–present)
1814:"U.S. is Striking Back in the Global Cyberwar"
1241:family, though more specifically it is called
1060:Telecommunications Network Technologies Branch
618:Global surveillance disclosures (2013–present)
2829:
2033:"Inside the NSA's Ultra-Secret Hacking Group"
1154:document listing technology available to the
1090:S3283 – Expeditionary Access Operations (EAO)
1028:S321 – Remote Operations Center (ROC) In the
886:
8:
1223:that duplicates internet traffic, typically
30:
2804:N.S.A. Devises Radio Pathway Into Computers
2736:"How the NSA Thinks About Secrecy and Risk"
2637:. Network World. 2013-11-11. Archived from
2416:"QFIRE - die "Vorwärtsverteidigng" der NSA"
2391:"QFIRE - die "Vorwärtsverteidigng" der NSA"
2366:"QFIRE - die "Vorwärtsverteidigng" der NSA"
2342:"QFIRE - die "Vorwärtsverteidigng" der NSA"
2310:
2308:
2306:
2211:
2209:
1960:. Computerworld. 2013-06-11. Archived from
1754:"The NSA has its own team of elite hackers"
971:A document leaked by former NSA contractor
3683:American advanced persistent threat groups
2836:
2822:
2814:
1051:S3234 – Computer Technology Division (CTD)
893:
879:
146:
29:
2458:
2456:
1842:"How the U.S. Government Hacks the World"
1356:traffic, which is logged into XKeyscore.
1054:S3235 – Network Technology Division (NTD)
27:Unit of the U.S. National Security Agency
3356:NSA warrantless surveillance controversy
1720:
1718:
1716:
1714:
1712:
1039:(DNT) : develops automated spyware
1682:Hayden, Michael V. (23 February 2016).
1599:
1421:Mexico's Secretariat of Public Security
1113:From 2013 to 2017, the head of TAO was
666:Mass surveillance in the United Kingdom
149:
2660:"Inside TAO: The NSA's Shadow Network"
2097:The European Review of Organised Crime
1392:, who characterized it as tyrannical.
1335:Government Communications Headquarters
661:Mass surveillance in the United States
2682:
2680:
1413:Northwestern Polytechnical University
1070:Access Technologies Operations Branch
613:2005 warrantless surveillance scandal
7:
1607:Nakashima, Ellen (1 December 2017).
919:Office of Tailored Access Operations
1908:"FOIA #70809 (released 2014-09-19)"
1751:Paterson, Andrea (30 August 2013).
937:intelligence-gathering unit of the
3194:Information Warfare Support Center
2288:Gallagher, Sean (August 1, 2013).
2157:Thomson, Iain (January 28, 2016).
1641:Intelligence and National Security
1333:By collaboration with the British
984:TAO's headquarters are termed the
25:
3668:Cyberwarfare in the United States
2951:Misawa Security Operations Center
1784:Kingsbury, Alex (June 19, 2009).
1765:from the original on Oct 19, 2013
1549:Cyberwarfare in the United States
1119:Information Assurance Directorate
171:Map of global NSA data collection
3634:Vulnerabilities Equities Process
3030:
2874:Consolidated Intelligence Center
2860:Alaska Mission Operations Center
2131:Landler, Mark (April 10, 2018).
1725:Aid, Matthew M. (10 June 2013).
1037:Data Network Technologies Branch
858:
846:
827:
815:
803:
791:
771:
761:
751:
741:
731:
721:
711:
310:President's Surveillance Program
164:
150:
36:
3275:Secure Terminal Equipment (STE)
2524:Weaver, Nicholas (2013-03-28).
1879:. Bloomsbury USA. p. 311.
1873:Aid, Matthew M. (8 June 2010).
1840:Riley, Michael (May 23, 2013).
1500:According to a 2013 article in
3592:Institute for Defense Analyses
2958:Multiprogram Research Facility
2794:NSA Tailored Access Operations
2734:Schneier, Bruce (2013-10-04).
2687:Aid, Matthew M. (2013-10-15).
2567:Gallagher, Sean (2013-11-12).
2316:"Inside TAO: Targeting Mexico"
2216:Schneier, Bruce (2013-10-07).
2061:. Defense Tech. Archived from
1635:Loleski, Steven (2018-10-18).
1432:submarine communications cable
1159:National Security Agency (NSA)
315:Terrorist Surveillance Program
1:
2759:Riley, Michael (2013-06-14).
2689:"The NSA's New Code Breakers"
1653:10.1080/02684527.2018.1532627
1437:Försvarets radioanstalt (FRA)
1178:Chaos Communications Congress
1042:S3231 – Access Division (ACD)
494:Senate Intelligence Committee
56:
2463:Thomson, Iain (2013-12-31).
1819:U.S. News & World Report
1791:U.S. News & World Report
1386:Chaos Communication Congress
1093:S3285 – Persistence Division
3606:National Cryptologic School
3599:National Cryptologic Museum
2937:Interagency Training Center
2895:European Cryptologic Center
2867:Colorado Cryptologic Center
2113:. firstlook.org. 2014-07-16
992:. TAO also has expanded to
927:Computer Network Operations
471:FISA Amendments Act of 2008
466:Protect America Act of 2007
305:Total Information Awareness
3699:
3465:Real Time Regional Gateway
3208:Special Collection Service
2923:Georgia Cryptologic Center
2712:Farber, Dan (2013-12-29).
2494:Mick, Jason (2013-12-31).
2340:Fotostrecke (2013-12-30).
2238:Fotostrecke (2013-12-30).
2059:"Jimmy Carter: Super Spy?"
1544:Advanced persistent threat
1450:, which used it to target
1403:Targets and collaborations
1139:
955:
268:Tailored Access Operations
68:Advanced persistent threat
31:Tailored Access Operations
3028:
2930:Hawaii Cryptologic Center
2902:European Technical Center
2611:"What You Wanted to Know"
2174:This section copied from
1564:MiniPanzer and MegaPanzer
1458:(GRX) providers like the
641:Surveillance of reporters
499:National Security Council
35:
3678:National Security Agency
3021:Pacific Technical Center
3007:Texas Cryptologic Center
2845:National Security Agency
1559:Magic Lantern (software)
1373:Special Collection Sites
1239:man-in-the-middle attack
1030:Remote Operations Center
1022:Buckley Space Force Base
986:Remote Operations Center
939:National Security Agency
157:National Security Agency
3613:National Vigilance Park
2178:; see there for sources
1478:discovered the attack.
1354:Windows Error Reporting
1166:alliance. According to
3437:Insider Threat Program
3134:John Michael McConnell
2057:noahmax (2005-02-21).
1847:Bloomberg Businessweek
1579:Syrian Electronic Army
1243:man-on-the-side attack
1216:
1208:
1132:
1014:Joint Base San Antonio
914:
656:Insider Threat Program
3663:Computer surveillance
3120:William Eldridge Odom
1456:GPRS roaming exchange
1378:COMMENDEER [
1214:
1203:
1176:gave a speech at the
1127:
976:on a single network.
908:
461:Homeland Security Act
355:Databases, tools etc.
3377:Thomas Andrews Drake
1481:In concert with the
990:Fort Meade, Maryland
958:Signals intelligence
929:, and structured as
651:UN diplomatic spying
3409:Boundless Informant
3064:Laurence Hugh Frost
2616:. documentcloud.org
1933:The Washington Post
1759:The Washington Post
1614:The Washington Post
1472:European Parliament
1468:European Commission
1430:– an optical fibre
522:Hepting v. AT&T
441:Privacy Act of 1974
219:Upstream collection
141:S3 Data Acquisition
137:Parent organization
32:
3155:Keith B. Alexander
3092:Samuel C. Phillips
2014:. tagesanzeiger.ch
1217:
1209:
1133:
915:
532:Clapper v. Amnesty
407:GCHQ collaboration
401:BOUNDLESSINFORMANT
125:Official language
3650:
3649:
3620:NSA Hall of Honor
3162:Michael S. Rogers
3113:Lincoln D. Faurer
1982:Rothkopf, David.
1886:978-1-60819-096-6
1688:. Penguin Press.
1247:Internet backbone
1100:Virtual locations
903:
902:
145:
144:
16:(Redirected from
3690:
3643:
3636:
3629:
3622:
3615:
3608:
3601:
3594:
3587:
3569:
3562:
3555:
3548:
3541:
3534:
3527:
3509:
3502:
3495:
3488:
3481:
3474:
3467:
3460:
3453:
3446:
3439:
3432:
3425:
3418:
3411:
3393:
3386:
3379:
3372:
3365:
3358:
3351:
3344:
3337:
3330:
3328:Church Committee
3323:
3305:
3298:
3291:
3284:
3277:
3270:
3263:
3256:
3238:
3231:
3224:
3217:
3210:
3203:
3196:
3189:
3171:
3164:
3157:
3150:
3143:
3136:
3129:
3122:
3115:
3108:
3101:
3094:
3087:
3080:
3073:
3066:
3059:
3052:
3034:
3033:
3023:
3016:
3014:Utah Data Center
3009:
3002:
2995:
2988:
2981:
2974:
2972:RAF Menwith Hill
2967:
2960:
2953:
2946:
2939:
2932:
2925:
2918:
2916:Friendship Annex
2911:
2904:
2897:
2890:
2883:
2876:
2869:
2862:
2838:
2831:
2824:
2815:
2772:
2771:
2769:
2768:
2756:
2750:
2749:
2747:
2746:
2731:
2725:
2724:
2722:
2721:
2709:
2703:
2702:
2700:
2699:
2684:
2675:
2674:
2672:
2671:
2656:
2650:
2649:
2647:
2646:
2631:
2625:
2624:
2622:
2621:
2615:
2607:
2601:
2600:
2598:
2597:
2586:
2580:
2579:
2577:
2576:
2564:
2558:
2557:
2546:
2540:
2539:
2537:
2536:
2521:
2515:
2514:
2512:
2511:
2502:. Archived from
2491:
2485:
2484:
2482:
2481:
2460:
2451:
2450:
2437:
2431:
2430:
2428:
2427:
2412:
2406:
2405:
2403:
2402:
2387:
2381:
2380:
2378:
2377:
2362:
2356:
2355:
2353:
2352:
2337:
2331:
2330:
2328:
2327:
2312:
2301:
2300:
2298:
2296:
2285:
2279:
2278:
2276:
2275:
2260:
2254:
2253:
2251:
2250:
2235:
2229:
2228:
2226:
2225:
2213:
2204:
2203:
2201:
2200:
2185:
2179:
2172:
2163:
2162:
2154:
2148:
2147:
2145:
2143:
2128:
2122:
2121:
2119:
2118:
2107:
2101:
2100:
2092:
2086:
2080:
2074:
2073:
2071:
2070:
2054:
2048:
2047:
2045:
2044:
2037:Atlantic Council
2029:
2023:
2022:
2020:
2019:
2004:
1998:
1997:
1995:
1994:
1979:
1973:
1972:
1970:
1969:
1954:
1948:
1947:
1941:
1939:
1924:
1915:
1914:
1912:
1904:
1898:
1897:
1895:
1893:
1870:
1864:
1863:
1861:
1859:
1850:. Archived from
1837:
1831:
1830:
1828:
1826:
1809:
1803:
1802:
1800:
1798:
1781:
1775:
1774:
1772:
1770:
1756:
1748:
1742:
1741:
1739:
1737:
1722:
1707:
1706:
1704:
1702:
1679:
1673:
1672:
1632:
1626:
1625:
1623:
1621:
1604:
1532:zero-day attacks
1476:European Council
1365:virtual machines
895:
888:
881:
863:
862:
851:
850:
832:
831:
820:
819:
808:
807:
796:
795:
775:
765:
755:
745:
735:
725:
715:
547:Wikimedia v. NSA
537:Klayman v. Obama
436:Safe Streets Act
168:
154:
147:
58:
40:
33:
21:
3698:
3697:
3693:
3692:
3691:
3689:
3688:
3687:
3653:
3652:
3651:
3646:
3641:Zendian Problem
3639:
3632:
3625:
3618:
3611:
3604:
3597:
3590:
3583:
3572:
3565:
3558:
3551:
3544:
3537:
3530:
3523:
3512:
3505:
3498:
3491:
3484:
3477:
3470:
3463:
3456:
3449:
3442:
3435:
3428:
3421:
3414:
3407:
3396:
3389:
3382:
3375:
3368:
3361:
3354:
3347:
3340:
3333:
3326:
3319:
3308:
3301:
3294:
3287:
3280:
3273:
3266:
3259:
3252:
3241:
3234:
3227:
3220:
3213:
3206:
3199:
3192:
3185:
3174:
3167:
3160:
3153:
3146:
3141:Kenneth Minihan
3139:
3132:
3125:
3118:
3111:
3106:Bobby Ray Inman
3104:
3097:
3090:
3083:
3078:Marshall Carter
3076:
3069:
3062:
3057:John A. Samford
3055:
3048:
3035:
3031:
3026:
3019:
3012:
3005:
2998:
2991:
2984:
2977:
2970:
2963:
2956:
2949:
2942:
2935:
2928:
2921:
2914:
2907:
2900:
2893:
2886:
2879:
2872:
2865:
2858:
2847:
2842:
2780:
2775:
2766:
2764:
2758:
2757:
2753:
2744:
2742:
2733:
2732:
2728:
2719:
2717:
2711:
2710:
2706:
2697:
2695:
2686:
2685:
2678:
2669:
2667:
2658:
2657:
2653:
2644:
2642:
2633:
2632:
2628:
2619:
2617:
2613:
2609:
2608:
2604:
2595:
2593:
2588:
2587:
2583:
2574:
2572:
2566:
2565:
2561:
2548:
2547:
2543:
2534:
2532:
2523:
2522:
2518:
2509:
2507:
2493:
2492:
2488:
2479:
2477:
2462:
2461:
2454:
2439:
2438:
2434:
2425:
2423:
2414:
2413:
2409:
2400:
2398:
2389:
2388:
2384:
2375:
2373:
2364:
2363:
2359:
2350:
2348:
2339:
2338:
2334:
2325:
2323:
2314:
2313:
2304:
2294:
2292:
2287:
2286:
2282:
2273:
2271:
2262:
2261:
2257:
2248:
2246:
2237:
2236:
2232:
2223:
2221:
2215:
2214:
2207:
2198:
2196:
2187:
2186:
2182:
2176:NSA ANT catalog
2173:
2166:
2161:. The Register.
2156:
2155:
2151:
2141:
2139:
2130:
2129:
2125:
2116:
2114:
2109:
2108:
2104:
2094:
2093:
2089:
2081:
2077:
2068:
2066:
2056:
2055:
2051:
2042:
2040:
2031:
2030:
2026:
2017:
2015:
2006:
2005:
2001:
1992:
1990:
1981:
1980:
1976:
1967:
1965:
1956:
1955:
1951:
1937:
1935:
1926:
1925:
1918:
1910:
1906:
1905:
1901:
1891:
1889:
1887:
1872:
1871:
1867:
1857:
1855:
1854:on May 25, 2013
1839:
1838:
1834:
1824:
1822:
1811:
1810:
1806:
1796:
1794:
1783:
1782:
1778:
1768:
1766:
1750:
1749:
1745:
1735:
1733:
1724:
1723:
1710:
1700:
1698:
1696:
1681:
1680:
1676:
1634:
1633:
1629:
1619:
1617:
1606:
1605:
1601:
1597:
1540:
1405:
1390:Jacob Appelbaum
1331:
1198:
1196:QUANTUM attacks
1174:Jacob Appelbaum
1148:NSA ANT catalog
1144:
1142:NSA ANT catalog
1138:
1136:NSA ANT catalog
1129:QUANTUMSQUIRREL
1111:
1102:
1006:Fort Eisenhower
982:
969:
960:
954:
899:
870:
869:
857:
845:
826:
814:
802:
790:
702:
694:
693:
679:
671:
670:
631:
623:
622:
608:
600:
599:
565:
557:
556:
542:ACLU v. Clapper
512:
504:
503:
484:
476:
475:
431:
423:
422:
182:
174:
155:
138:
126:
100:
28:
23:
22:
15:
12:
11:
5:
3696:
3694:
3686:
3685:
3680:
3675:
3670:
3665:
3655:
3654:
3648:
3647:
3645:
3644:
3637:
3630:
3623:
3616:
3609:
3602:
3595:
3588:
3585:Dundee Society
3580:
3578:
3574:
3573:
3571:
3570:
3563:
3556:
3549:
3542:
3535:
3528:
3520:
3518:
3514:
3513:
3511:
3510:
3503:
3496:
3489:
3482:
3475:
3468:
3461:
3454:
3447:
3440:
3433:
3426:
3419:
3412:
3404:
3402:
3398:
3397:
3395:
3394:
3387:
3380:
3373:
3366:
3363:Pike Committee
3359:
3352:
3345:
3338:
3335:Edward Snowden
3331:
3324:
3316:
3314:
3310:
3309:
3307:
3306:
3299:
3292:
3285:
3278:
3271:
3264:
3257:
3249:
3247:
3243:
3242:
3240:
3239:
3232:
3225:
3218:
3211:
3204:
3197:
3190:
3182:
3180:
3176:
3175:
3173:
3172:
3165:
3158:
3151:
3148:Michael Hayden
3144:
3137:
3130:
3123:
3116:
3109:
3102:
3095:
3088:
3081:
3074:
3067:
3060:
3053:
3045:
3043:
3037:
3036:
3029:
3027:
3025:
3024:
3017:
3010:
3003:
2996:
2989:
2982:
2975:
2968:
2961:
2954:
2947:
2940:
2933:
2926:
2919:
2912:
2905:
2898:
2891:
2884:
2877:
2870:
2863:
2855:
2853:
2849:
2848:
2843:
2841:
2840:
2833:
2826:
2818:
2812:
2811:
2806:
2801:
2796:
2791:
2786:
2779:
2778:External links
2776:
2774:
2773:
2751:
2726:
2704:
2693:Foreign Policy
2676:
2651:
2626:
2602:
2581:
2571:. Ars Technica
2559:
2541:
2516:
2486:
2452:
2432:
2407:
2382:
2357:
2332:
2302:
2280:
2255:
2230:
2220:. Schneier.com
2205:
2180:
2164:
2149:
2137:New York Times
2123:
2102:
2087:
2075:
2049:
2024:
2012:Tages-Anzeiger
1999:
1988:Foreign Policy
1974:
1949:
1916:
1899:
1885:
1865:
1832:
1804:
1776:
1743:
1731:Foreign Policy
1708:
1695:978-1594206566
1694:
1674:
1647:(1): 112–128.
1627:
1598:
1596:
1593:
1592:
1591:
1586:
1581:
1576:
1571:
1569:PLA Unit 61398
1566:
1561:
1556:
1554:Equation Group
1551:
1546:
1539:
1536:
1503:Foreign Policy
1404:
1401:
1361:race condition
1330:
1329:
1324:
1319:
1314:
1309:
1304:
1299:
1293:
1288:
1283:
1277:
1272:
1267:
1261:
1254:
1234:spear-phishing
1197:
1194:
1140:Main article:
1137:
1134:
1110:
1107:
1101:
1098:
1097:
1096:
1095:
1094:
1091:
1066:
1063:
1057:
1056:
1055:
1052:
1049:
1046:
1043:
1033:
1016:, Texas), and
981:
978:
973:Edward Snowden
968:
965:
953:
950:
943:Michael Hayden
901:
900:
898:
897:
890:
883:
875:
872:
871:
868:
867:
855:
842:
841:
837:
836:
824:
812:
800:
787:
786:
780:
779:
769:
759:
749:
739:
729:
719:
708:
707:
703:
700:
699:
696:
695:
692:
691:
686:
680:
677:
676:
673:
672:
669:
668:
663:
658:
653:
648:
643:
638:
632:
629:
628:
625:
624:
621:
620:
615:
609:
606:
605:
602:
601:
598:
597:
595:Edward Snowden
592:
587:
582:
577:
572:
570:William Binney
566:
564:Whistleblowers
563:
562:
559:
558:
555:
554:
549:
544:
539:
534:
529:
524:
519:
513:
510:
509:
506:
505:
502:
501:
496:
491:
485:
482:
481:
478:
477:
474:
473:
468:
463:
458:
453:
448:
443:
438:
432:
429:
428:
425:
424:
421:
420:
415:
409:
408:
404:
403:
398:
393:
388:
383:
378:
373:
368:
363:
357:
356:
352:
351:
346:
341:
336:
331:
325:
324:
320:
319:
318:
317:
307:
302:
297:
292:
287:
282:
276:
275:
271:
270:
264:
263:
259:
258:
252:
251:
247:
246:
241:
236:
231:
226:
221:
215:
214:
210:
209:
204:
199:
194:
188:
187:
183:
180:
179:
176:
175:
169:
161:
160:
143:
142:
139:
136:
133:
132:
127:
124:
121:
120:
111:
107:
106:
101:
98:
95:
94:
89:
85:
84:
78:Cyberespionage
75:
71:
70:
65:
61:
60:
54:
50:
49:
46:
42:
41:
26:
24:
18:Quantum insert
14:
13:
10:
9:
6:
4:
3:
2:
3695:
3684:
3681:
3679:
3676:
3674:
3673:Hacker groups
3671:
3669:
3666:
3664:
3661:
3660:
3658:
3642:
3638:
3635:
3631:
3628:
3624:
3621:
3617:
3614:
3610:
3607:
3603:
3600:
3596:
3593:
3589:
3586:
3582:
3581:
3579:
3575:
3568:
3564:
3561:
3557:
3554:
3550:
3547:
3543:
3540:
3536:
3533:
3529:
3526:
3522:
3521:
3519:
3515:
3508:
3504:
3501:
3497:
3494:
3490:
3487:
3483:
3480:
3476:
3473:
3469:
3466:
3462:
3459:
3455:
3452:
3448:
3445:
3441:
3438:
3434:
3431:
3427:
3424:
3420:
3417:
3413:
3410:
3406:
3405:
3403:
3399:
3392:
3388:
3385:
3381:
3378:
3374:
3371:
3367:
3364:
3360:
3357:
3353:
3350:
3349:James Bamford
3346:
3343:
3339:
3336:
3332:
3329:
3325:
3322:
3318:
3317:
3315:
3311:
3304:
3303:WARRIOR PRIDE
3300:
3297:
3293:
3290:
3286:
3283:
3279:
3276:
3272:
3269:
3265:
3262:
3258:
3255:
3251:
3250:
3248:
3244:
3237:
3233:
3230:
3226:
3223:
3219:
3216:
3212:
3209:
3205:
3202:
3198:
3195:
3191:
3188:
3184:
3183:
3181:
3177:
3170:
3169:Paul Nakasone
3166:
3163:
3159:
3156:
3152:
3149:
3145:
3142:
3138:
3135:
3131:
3128:
3127:Bill Studeman
3124:
3121:
3117:
3114:
3110:
3107:
3103:
3100:
3096:
3093:
3089:
3086:
3082:
3079:
3075:
3072:
3068:
3065:
3061:
3058:
3054:
3051:
3047:
3046:
3044:
3042:
3038:
3022:
3018:
3015:
3011:
3008:
3004:
3001:
2997:
2994:
2990:
2987:
2983:
2980:
2979:Roaring Creek
2976:
2973:
2969:
2966:
2962:
2959:
2955:
2952:
2948:
2945:
2941:
2938:
2934:
2931:
2927:
2924:
2920:
2917:
2913:
2910:
2906:
2903:
2899:
2896:
2892:
2889:
2885:
2882:
2878:
2875:
2871:
2868:
2864:
2861:
2857:
2856:
2854:
2850:
2846:
2839:
2834:
2832:
2827:
2825:
2820:
2819:
2816:
2810:
2807:
2805:
2802:
2800:
2797:
2795:
2792:
2790:
2787:
2785:
2782:
2781:
2777:
2762:
2755:
2752:
2741:
2737:
2730:
2727:
2715:
2708:
2705:
2694:
2690:
2683:
2681:
2677:
2665:
2661:
2655:
2652:
2641:on 2014-01-15
2640:
2636:
2630:
2627:
2612:
2606:
2603:
2591:
2585:
2582:
2570:
2563:
2560:
2555:
2551:
2545:
2542:
2531:
2527:
2520:
2517:
2506:on 2014-08-24
2505:
2501:
2497:
2490:
2487:
2476:
2472:
2471:
2466:
2459:
2457:
2453:
2448:
2447:
2442:
2436:
2433:
2421:
2417:
2411:
2408:
2396:
2392:
2386:
2383:
2371:
2367:
2361:
2358:
2347:
2343:
2336:
2333:
2321:
2317:
2311:
2309:
2307:
2303:
2291:
2284:
2281:
2269:
2265:
2259:
2256:
2245:
2241:
2234:
2231:
2219:
2212:
2210:
2206:
2194:
2190:
2184:
2181:
2177:
2171:
2169:
2165:
2160:
2153:
2150:
2138:
2134:
2127:
2124:
2112:
2106:
2103:
2098:
2091:
2088:
2084:
2079:
2076:
2065:on 2014-02-20
2064:
2060:
2053:
2050:
2038:
2034:
2028:
2025:
2013:
2009:
2003:
2000:
1989:
1985:
1978:
1975:
1964:on 2014-01-25
1963:
1959:
1953:
1950:
1946:
1934:
1930:
1923:
1921:
1917:
1909:
1903:
1900:
1888:
1882:
1878:
1877:
1869:
1866:
1853:
1849:
1848:
1843:
1836:
1833:
1821:
1820:
1815:
1808:
1805:
1793:
1792:
1787:
1780:
1777:
1764:
1760:
1755:
1747:
1744:
1732:
1728:
1721:
1719:
1717:
1715:
1713:
1709:
1697:
1691:
1687:
1686:
1678:
1675:
1670:
1666:
1662:
1658:
1654:
1650:
1646:
1642:
1638:
1631:
1628:
1616:
1615:
1610:
1603:
1600:
1594:
1590:
1589:WARRIOR PRIDE
1587:
1585:
1582:
1580:
1577:
1575:
1572:
1570:
1567:
1565:
1562:
1560:
1557:
1555:
1552:
1550:
1547:
1545:
1542:
1541:
1537:
1535:
1533:
1529:
1525:
1521:
1517:
1513:
1509:
1505:
1504:
1498:
1496:
1492:
1488:
1484:
1479:
1477:
1473:
1469:
1465:
1461:
1457:
1453:
1449:
1445:
1440:
1438:
1433:
1429:
1424:
1422:
1418:
1414:
1410:
1402:
1400:
1398:
1393:
1391:
1387:
1383:
1382:
1376:
1374:
1370:
1366:
1362:
1357:
1355:
1351:
1346:
1344:
1340:
1336:
1328:
1325:
1323:
1320:
1318:
1315:
1313:
1310:
1308:
1305:
1303:
1300:
1297:
1294:
1292:
1289:
1287:
1284:
1281:
1278:
1276:
1273:
1271:
1268:
1265:
1262:
1259:
1256:
1255:
1253:
1250:
1248:
1244:
1240:
1235:
1230:
1226:
1222:
1213:
1206:
1202:
1195:
1193:
1191:
1187:
1183:
1179:
1175:
1171:
1170:
1165:
1160:
1157:
1156:United States
1153:
1150:is a 50-page
1149:
1143:
1135:
1130:
1126:
1122:
1120:
1116:
1108:
1106:
1099:
1092:
1089:
1088:
1086:
1085:
1079:
1075:
1071:
1067:
1064:
1061:
1058:
1053:
1050:
1047:
1044:
1041:
1040:
1038:
1034:
1031:
1027:
1026:
1025:
1023:
1019:
1015:
1011:
1007:
1003:
999:
995:
991:
987:
979:
977:
974:
966:
964:
959:
951:
949:
946:
944:
940:
936:
935:cyber-warfare
932:
928:
924:
920:
912:
907:
896:
891:
889:
884:
882:
877:
876:
874:
873:
866:
861:
856:
854:
849:
844:
843:
839:
838:
835:
830:
825:
823:
818:
813:
811:
806:
801:
799:
794:
789:
788:
785:
782:
781:
778:
774:
770:
768:
764:
760:
758:
754:
750:
748:
744:
740:
738:
734:
730:
728:
724:
720:
718:
714:
710:
709:
706:United States
705:
704:
701:Collaboration
698:
697:
690:
687:
685:
682:
681:
675:
674:
667:
664:
662:
659:
657:
654:
652:
649:
647:
646:Mail tracking
644:
642:
639:
637:
634:
633:
627:
626:
619:
616:
614:
611:
610:
604:
603:
596:
593:
591:
588:
586:
583:
581:
578:
576:
573:
571:
568:
567:
561:
560:
553:
550:
548:
545:
543:
540:
538:
535:
533:
530:
528:
525:
523:
520:
518:
515:
514:
508:
507:
500:
497:
495:
492:
490:
487:
486:
480:
479:
472:
469:
467:
464:
462:
459:
457:
454:
452:
449:
447:
444:
442:
439:
437:
434:
433:
427:
426:
419:
416:
414:
411:
410:
406:
405:
402:
399:
397:
394:
392:
389:
387:
384:
382:
379:
377:
374:
372:
369:
367:
364:
362:
359:
358:
354:
353:
350:
347:
345:
342:
340:
337:
335:
332:
330:
327:
326:
322:
321:
316:
313:
312:
311:
308:
306:
303:
301:
298:
296:
293:
291:
288:
286:
283:
281:
278:
277:
273:
272:
269:
266:
265:
261:
260:
257:
254:
253:
249:
248:
245:
242:
240:
237:
235:
232:
230:
227:
225:
222:
220:
217:
216:
212:
211:
208:
205:
203:
200:
198:
195:
193:
190:
189:
185:
184:
178:
177:
172:
167:
163:
162:
158:
153:
148:
140:
134:
131:
128:
122:
119:
115:
112:
108:
105:
104:United States
102:
96:
93:
90:
86:
83:
79:
76:
72:
69:
66:
62:
55:
51:
47:
43:
39:
34:
19:
3507:Epic Shelter
3472:Stellar Wind
3221:
3071:Gordon Blake
3050:Ralph Canine
2765:. Retrieved
2754:
2743:. Retrieved
2740:The Atlantic
2739:
2729:
2718:. Retrieved
2707:
2696:. Retrieved
2692:
2668:. Retrieved
2666:. 2013-12-29
2663:
2654:
2643:. Retrieved
2639:the original
2629:
2618:. Retrieved
2605:
2594:. Retrieved
2584:
2573:. Retrieved
2562:
2553:
2544:
2533:. Retrieved
2529:
2519:
2508:. Retrieved
2504:the original
2489:
2478:. Retrieved
2470:The Register
2468:
2444:
2435:
2424:. Retrieved
2422:. 2013-12-30
2419:
2410:
2399:. Retrieved
2397:. 2013-12-30
2394:
2385:
2374:. Retrieved
2372:. 2013-12-30
2369:
2360:
2349:. Retrieved
2345:
2335:
2324:. Retrieved
2322:. 2013-12-29
2319:
2293:. Retrieved
2283:
2272:. Retrieved
2270:. 2013-12-30
2267:
2258:
2247:. Retrieved
2243:
2233:
2222:. Retrieved
2197:. Retrieved
2195:. 2013-12-30
2192:
2183:
2152:
2140:. Retrieved
2136:
2126:
2115:. Retrieved
2105:
2096:
2090:
2078:
2067:. Retrieved
2063:the original
2052:
2041:. Retrieved
2039:. 2013-06-11
2036:
2027:
2016:. Retrieved
2011:
2002:
1991:. Retrieved
1987:
1977:
1966:. Retrieved
1962:the original
1952:
1943:
1936:. Retrieved
1932:
1902:
1890:. Retrieved
1875:
1868:
1856:. Retrieved
1852:the original
1845:
1835:
1823:. Retrieved
1817:
1807:
1795:. Retrieved
1789:
1779:
1767:. Retrieved
1758:
1746:
1734:. Retrieved
1730:
1699:. Retrieved
1684:
1677:
1644:
1640:
1630:
1618:. Retrieved
1612:
1602:
1501:
1499:
1480:
1441:
1425:
1406:
1394:
1379:
1377:
1367:(running on
1358:
1347:
1332:
1251:
1218:
1189:
1167:
1145:
1112:
1103:
1084:Jimmy Carter
1083:
1029:
1018:NSA Colorado
1008:, Georgia),
985:
983:
980:Organization
970:
967:Snowden leak
961:
947:
930:
926:
922:
918:
916:
575:Thomas Drake
552:US v. Moalin
527:Jewel v. NSA
483:Institutions
381:TRAFFICTHIEF
267:
159:surveillance
88:Headquarters
82:cyberwarfare
45:Abbreviation
3479:TRAILBLAZER
3391:Matthew Aid
3384:Thomas Tamm
3313:Controversy
3254:ANT catalog
3085:Noel Gayler
3000:Sugar Grove
2944:Kent Island
2888:Dorsey Road
2763:. Bloomberg
2716:. CNET News
2664:Der Spiegel
2420:Der Spiegel
2395:Der Spiegel
2370:Der Spiegel
2346:Der Spiegel
2320:Der Spiegel
2268:Der Spiegel
2244:Der Spiegel
2193:Der Spiegel
1938:7 September
1428:SEA-ME-WE 4
1397:against Tor
1264:doubleclick
1229:web browser
1190:Der Spiegel
1169:Der Spiegel
1024:, Denver).
1002:NSA Georgia
607:Publication
585:Thomas Tamm
517:ACLU v. NSA
456:Patriot Act
430:Legislation
290:Trailblazer
3657:Categories
3532:Interquake
3486:Turbulence
3246:Technology
2993:Salt Creek
2909:Fort Meade
2767:2014-01-18
2745:2014-01-18
2720:2014-01-18
2698:2023-07-27
2670:2014-01-27
2645:2014-01-18
2620:2015-10-03
2596:2014-01-18
2575:2014-01-18
2535:2014-01-18
2510:2014-08-15
2480:2014-08-15
2426:2014-01-18
2401:2014-01-18
2376:2014-01-18
2351:2014-01-18
2326:2014-01-18
2274:2014-01-18
2249:2014-01-18
2224:2014-01-18
2199:2014-01-18
2117:2014-07-16
2069:2014-01-27
2043:2023-07-27
2018:2014-01-27
1993:2014-01-27
1968:2014-01-27
1620:4 December
1595:References
1369:VMware ESX
1302:Tencent QQ
1270:rocketmail
1152:classified
1109:Leadership
994:NSA Hawaii
956:See also:
580:Mark Klein
323:Since 2007
295:Turbulence
274:Since 2001
262:Since 1998
250:Since 1990
239:ThinThread
213:Since 1978
92:Fort Meade
3539:Main Core
3517:Databases
3500:XKeyscore
3370:Russ Tice
3261:FROSTBURG
3179:Divisions
3099:Lew Allen
2986:Room 641A
2852:Locations
2554:Bloomberg
2500:DailyTech
2295:August 8,
2085:(slide 8)
1769:31 August
1669:158068358
1661:0268-4527
1584:Unit 8200
1528:Microsoft
1464:Syniverse
1350:XKeyscore
1260:ForumUser
1164:Five Eyes
1115:Rob Joyce
1010:NSA Texas
1000:, Oahu),
911:XKeyscore
784:Five Eyes
636:Cablegate
590:Russ Tice
391:XKeyscore
371:Main Core
339:Stateroom
285:STORMBREW
256:RAMPART-A
234:Main Core
114:Zero-days
59:1997–2001
53:Formation
3525:DISHFIRE
3493:Upstream
3444:MUSCULAR
3430:Fairview
3416:Dropmire
3401:Programs
2965:Pine Gap
2592:. SVT.se
2142:March 9,
1763:Archived
1538:See also
1508:AT&T
1474:and the
1452:Belgacom
1339:MUSCULAR
1337:(GCHQ) (
1307:Facebook
1291:mailruid
1286:LinkedIn
1076:and the
727:CYBERCOM
689:Metadata
678:Concepts
511:Lawsuits
413:MUSCULAR
386:DISHFIRE
334:Dropmire
300:Genoa II
229:FAIRVIEW
202:SHAMROCK
186:Pre-1978
181:Programs
3567:PINWALE
3546:MAINWAY
3423:ECHELON
3342:LOVEINT
3296:STU-III
3268:HARVEST
3041:Leaders
2446:YouTube
1736:11 June
1701:1 April
1574:Stuxnet
1512:Verizon
1495:Firefox
1460:Comfone
1399:users.
1327:YouTube
1312:Twitter
1298:Token64
1296:msnMail
1280:Hotmail
1258:alibaba
1186:Germany
1182:Hamburg
1068:S328 –
1048:S3233 –
1035:S323 –
998:Wahiawa
952:History
933:, is a
925:), now
630:Related
418:Tempora
396:ICREACH
376:MAINWAY
361:PINWALE
344:Bullrun
280:OAKSTAR
224:BLARNEY
197:MINARET
192:ECHELON
130:English
118:spyware
110:Methods
99:Region
74:Purpose
3627:VENONA
3560:Nymrod
3553:MARINA
3451:MYSTIC
3289:STU-II
2475:London
1892:22 May
1883:
1858:23 May
1825:22 May
1797:22 May
1692:
1667:
1659:
1516:Sprint
1470:, the
1419:, and
1221:router
1205:Lolcat
684:SIGINT
366:MARINA
349:MYSTIC
207:PROMIS
3577:Other
3458:PRISM
3282:STU-I
2614:(PDF)
2530:Wired
1911:(PDF)
1665:S2CID
1520:Cisco
1448:MyNOC
1409:China
1343:Gmail
1322:Gmail
1317:Yahoo
913:slide
840:Other
329:PRISM
244:Genoa
3236:NSOC
3229:NTOC
2881:CSSG
2297:2013
2144:2022
1940:2013
1894:2013
1881:ISBN
1860:2013
1827:2013
1799:2013
1771:2013
1738:2013
1703:2021
1690:ISBN
1657:ISSN
1622:2017
1524:Dell
1522:and
1514:and
1493:and
1485:and
1454:and
1444:GCHQ
1417:OPEC
1225:HTTP
1146:The
1082:USS
917:The
853:DGSE
834:GCSB
810:GCHQ
798:CSEC
489:FISC
451:ECPA
446:FISA
64:Type
3222:TAO
3215:SSO
3201:ROC
3187:CSS
1649:doi
1491:Tor
1487:FBI
1483:CIA
1446:'s
1411:,
1388:by
1381:sic
1275:hi5
1180:in
1078:FBI
1074:CIA
931:S32
923:TAO
865:BND
822:ASD
777:IAO
767:DHS
757:CIA
747:FBI
737:DOJ
717:CSS
48:TAO
3659::
2738:.
2691:.
2679:^
2662:.
2552:.
2528:.
2498:.
2473:.
2467:.
2455:^
2443:.
2418:.
2393:.
2368:.
2344:.
2318:.
2305:^
2266:.
2242:.
2208:^
2191:.
2167:^
2135:.
2035:.
2010:.
1986:.
1942:.
1931:.
1919:^
1844:.
1816:.
1788:.
1761:.
1757:.
1729:.
1711:^
1663:.
1655:.
1645:34
1643:.
1639:.
1611:.
1510:,
1497:.
1462:,
1423:.
1415:,
1345:.
1282:ID
1266:ID
1249:.
1184:,
945:.
116:,
80:,
57:c.
2837:e
2830:t
2823:v
2770:.
2748:.
2723:.
2701:.
2673:.
2648:.
2623:.
2599:.
2578:.
2538:.
2513:.
2483:.
2449:.
2429:.
2404:.
2379:.
2354:.
2329:.
2299:.
2277:.
2252:.
2227:.
2202:.
2146:.
2120:.
2099:.
2072:.
2046:.
2021:.
1996:.
1971:.
1913:.
1896:.
1862:.
1829:.
1801:.
1773:.
1740:.
1705:.
1671:.
1651::
1624:.
1020:(
1012:(
1004:(
996:(
921:(
894:e
887:t
880:v
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.