Knowledge

Bullrun (decryption program)

Source đź“ť

635: 605: 615: 625: 595: 778: 38: 24: 689: 585: 665: 677: 1107: 701: 1121: 732: 898: 720: 645: 837:
of all the programs that have been leaked by Snowden, the Bullrun Decryption Program is by far the most expensive. Snowden claims that since 2011, expenses devoted to Bullrun amount to $ 800 million. The leaked documents reveal that Bullrun seeks to "defeat the encryption used in specific network communication technologies".
966:
reported that: "But by 2006, an N.S.A. document notes, the agency had broken into communications for three foreign airlines, one travel reservation system, one foreign government's nuclear department and another's Internet service by cracking the virtual private networks that protected them. By 2010,
836:
presentation which claims that "vast amounts of encrypted Internet data which have up till now been discarded are now exploitable". A number of technical details regarding the program found in Snowden's documents were additionally censored by the press at the behest of US intelligence officials. Out
995:
until September 2013. While RSA Security has denied knowingly inserting a backdoor into BSAFE, it has not yet given an explanation for the continued usage of Dual_EC_DRBG after its flaws became apparent in 2006 and 2007. It was reported on December 20, 2013, that RSA had accepted a payment of $ 10
946:
The NSA encourages the manufacturers of security technology to disclose backdoors to their products or encryption keys so that they may access the encrypted data. However, fearing widespread adoption of encryption, the NSA set out to stealthily influence and weaken encryption standards and obtain
849:(SCI) control system or compartment, but the codeword has to be shown in the classification line, after all other classification and dissemination markings. Furthermore, any details about specific cryptographic successes were recommended to be additionally restricted (besides being marked 1063:
Revelations of the NSA backdoors and purposeful complication of standards has led to a backlash in their participation in standards bodies. Prior to the revelations the NSA's presence on these committees was seen as a benefit given their expertise with encryption.
1384:
there was an effort to regulate the use and sale of encryption tools, domestically and abroad. By 1996, the administration had abandoned the Clipper Chip as such, but it continued to lobby both at home and abroad for software-based "key escrow" encryption
978:
contains a back door, which would allow the NSA to break encryption keys generated by the random number generator. Even though this random number generator was known to be insecure and slow soon after the standard was published, and a potential NSA
1059:
Many other software projects, companies and organizations responded with an increase in the evaluation of their security and encryption processes. For example, Google doubled the size of their TLS certificates from 1024 bits to 2048 bits.
861:
labels; a non-exclusive list of possible Bullrun ECI labels was given as: APERIODIC, AMBULANT, AUNTIE, PAINTEDEAGLE, PAWLEYS, PITCHFORD, PENDLETON, PICARESQUE, and PIEDMONT without any details as to what these labels mean.
996:
million from the NSA to set the random number generator as the default. Leaked NSA documents state that their effort was “a challenge in finesse” and that “Eventually, N.S.A. became the sole editor” of the standard.
1003:
community's most fragile, and the inadvertent disclosure of the simple 'fact of' could alert the adversary and result in immediate loss of the capability." The document later states that "there will be NO
999:
By 2010, the leaked documents state that the NSA had developed "groundbreaking capabilities" against encrypted Internet traffic. A GCHQ document warned however "These capabilities are among the
970:
As part of Bullrun, NSA has also been actively working to "Insert vulnerabilities into commercial encryption systems, IT systems, networks, and endpoint communications devices used by targets".
832:. Although Snowden's documents do not contain technical information on exact cryptanalytic capabilities because Snowden did not have clearance access to such information, they do contain a 2010 1409:
Although we do not control the use of encryption within the US, we do, with some exceptions, limit the export of non-escrowed mass market encryption to products using a key length of 40 bits.
342: 1851: 522: 388: 724: 935:, the U.S. government had publicly attempted in the 1990s to ensure its access to communications and ability to decrypt. In particular, technical measures such as 1490: 307: 512: 1345: 489: 1730:
the big companies involved ... are all in bed with NSA to make damn sure that working end-to-end encryption never becomes the default on mobile phones
918: 1606: 634: 1448: 967:
the Edgehill program, the British counterencryption effort, was unscrambling VPN traffic for 30 targets and had set a goal of an additional 300."
1287: 889:). Signals that cannot be decrypted with current technology may be retained indefinitely while the agencies continue to attempt to decrypt them. 1583: 1798: 1020:, an encryption algorithm used in at least 50 percent of all SSL/TLS traffic at the time, was a plausible avenue, given several publicly known 1743: 926: 1071:
bug, which caused major websites to be vulnerable to password theft, but did not reveal this information in order to exploit it themselves.
1841: 1831: 669: 1430: 441: 764: 484: 1320: 614: 1244: 705: 1149: 537: 370: 360: 1693: 1513: 604: 1793: 1154: 1087:. Its predecessor "Manassas", is both an alternate name for the battle and where the battle took place. "EDGEHILL" is from the 983:
backdoor was found in 2007 while alternative random number generators without these flaws were certified and widely available,
804: 681: 532: 624: 594: 1654: 878: 322: 317: 1467: 858: 822: 846: 608: 517: 181: 922: 799:, highly classified program to crack encryption of online communications and data, which is run by the United States 1214: 403: 210: 584: 1029: 638: 618: 284: 100: 1557: 1033: 882: 757: 693: 186: 78: 365: 220: 1482: 1166: 905:
diagramming the high-level architecture of NSA's "Exploitation of Common Internet Encryption Technologies"
648: 628: 598: 337: 176: 1803: 1633: 1856: 1836: 1171: 948: 931: 139: 1808: 1721: 1262: 750: 1846: 1816: 1176: 1080: 959: 800: 588: 28: 1811: 1053: 736: 423: 644: 527: 1678: 1543: 992: 947:
master keys—either by agreement, by force of law, or by computer network exploitation (
796: 332: 1372: 1032:
keys. RC4 has since been prohibited for all versions of TLS by RFC 7465 in 2015, due to the
37: 23: 1514:"$ 10m NSA contract with security firm RSA led to encryption 'back door' | World news" 1112: 1013: 1000: 955: 954:
According to a Bullrun briefing document, the agency had successfully infiltrated both the
940: 870: 854: 777: 555: 446: 917:
cipher with an intentional backdoor, and using various specifically designed laws such as
8: 312: 272: 161: 95: 90: 42: 1531: 1088: 1084: 1025: 393: 1766: 1666: 1397: 1144: 1092: 914: 418: 408: 171: 166: 73: 1263:"Computer Network Exploitation vs. Computer Network Attack - Schneier on Security" 1210: 1126: 782: 413: 68: 1751: 1009: 829: 676: 466: 1825: 1634:"Torvalds shoots down call to yank 'backdoored' Intel RdRand in Linux crypto" 1607:""We cannot trust" Intel and Via's chip-based crypto, FreeBSD developers say" 1181: 1024:
of RC4. Others have speculated that NSA has gained ability to crack 1024-bit
988: 980: 817:, the program uses multiple methods including computer network exploitation, 115: 1052:, have seen an increase in their reluctance to (fully) trust hardware-based 1698: 1638: 1611: 1219: 1005: 984: 975: 910: 818: 813: 398: 252: 45:
as of 2007, with countries subject to the most data collection shown in red
1208: 1044:
In the wake of Bullrun revelations, some open source projects, including
700: 456: 327: 1242: 1120: 1449:"New York Times provides new details about NSA backdoor in crypto spec" 1420:("NSA is Changing User's Internet Experience.") Info Security Institute 1248: 1068: 936: 850: 451: 110: 1694:"The US government has betrayed the internet. We need to take it back" 845:
According to the NSA's Bullrun Classification Guide, Bullrun is not a
1558:"That earth-shattering NSA crypto-cracking: Have spooks smashed RC4?" 866: 688: 655: 507: 461: 262: 242: 156: 127: 105: 1215:"US and UK spy agencies defeat privacy and security on the internet" 865:
Access to the program is limited to a group of top personnel at the
1584:"Google strengthens its SSL configuration against possible attacks" 1483:"Exclusive: Secret contract tied NSA and security industry pioneer" 1288:"NSA Bullrun, 9/11 and Why Enterprises Should Walk Before They Run" 1161: 560: 257: 205: 1243:
Perlroth, Nicole; Larson, Jeff; Shane, Scott (September 5, 2013).
1021: 897: 1245:"The NSA's Secret Campaign to Crack, Undermine Internet Security" 1049: 1045: 731: 289: 267: 247: 232: 151: 63: 1817:
https://www.cs.auckland.ac.nz/~pgut001/pubs/crypto_wont_help.pdf
1373:"Rendering Unto CESA: Clinton's contradictory encryption policy" 828:
Information about the program's existence was leaked in 2013 by
719: 664: 237: 1652: 1139: 1134: 811:. According to the Bullrun classification guide published by 200: 1794:
Crucial Unanswered Questions about the NSA's BULLRUN Program
1431:"Secret Documents Reveal N.S.A. Campaign Against Encryption" 1319:
Perlroth, Nicole; Larson, Jeff; Shane, Scott (2013-09-05).
886: 874: 833: 1744:"NSA Said to Have Used Heartbleed Bug, Exposing Consumers" 1398:"Administration Statement on Commercial Encryption Policy" 1852:
Intelligence agency programmes revealed by Edward Snowden
1809:
Cryptography Opening Discussion: Speculation on "BULLRUN"
1804:
Defending Against Crypto Backdoors - Schneier on Security
1067:
There has been speculation that the NSA was aware of the
1017: 1511: 1321:"N.S.A. Able to Foil Basic Safeguards of Privacy on Web" 1767:"Snowden leaks: US and UK 'crack online encryption'" 1102: 1799:
Documents Reveal N.S.A. Campaign Against Encryption
1346:"Edward Snowden Reveals Secret Decryption Programs" 1318: 1285: 821:, industry relationships, collaboration with other 1204: 1202: 1200: 1198: 1196: 1016:, had speculated that a successful attack against 1823: 825:entities, and advanced mathematical techniques. 16:Code name of a decryption program run by the NSA 1193: 1722:"Opening Discussion: Speculation on 'BULLRUN'" 1468:"RSA warns developers not to use RSA products" 987:continued using Dual_EC_DRBG in the company's 974:has reported that the random number generator 943:, have met with criticism and little success. 490:Global surveillance disclosures (2013–present) 1741: 1631: 1465: 1390: 927:restrictions on export of encryption software 758: 1719: 1653:Tim Bray, Google Identity Team (July 2013). 1480: 1238: 1236: 1234: 1232: 1230: 1370: 1036:weakening or breaking RC4 used in SSL/TLS. 1364: 1314: 1312: 1310: 1308: 1306: 1304: 781:Bullrun classification guide published by 765: 751: 1655:"Google certificates upgrade in progress" 1227: 1691: 896: 776: 1512:Reuters in San Francisco (2013-12-20). 1493:from the original on September 24, 2015 1474: 1301: 1150:Mass surveillance in the United Kingdom 807:(GCHQ) has a similar program codenamed 538:Mass surveillance in the United Kingdom 1824: 1604: 1155:Mass surveillance in the United States 1079:The name "Bullrun" was taken from the 805:Government Communications Headquarters 533:Mass surveillance in the United States 1459: 485:2005 warrantless surveillance scandal 1764: 1692:Schneier, Bruce (5 September 2013). 859:Exceptionally Controlled Information 840: 1842:National Security Agency operations 1832:American secret government programs 1758: 847:Sensitive Compartmented Information 13: 1481:Menn, Joseph (December 20, 2013). 1286:Sean Michael Kerner (2013-09-09). 14: 1868: 1787: 1728:. The Cryptography Mailing List. 43:Map of global NSA data collection 1119: 1105: 1083:, the first major battle of the 873:agencies of the United Kingdom ( 730: 718: 699: 687: 675: 663: 643: 633: 623: 613: 603: 593: 583: 182:President's Surveillance Program 36: 22: 1765:Ward, Mark (6 September 2013). 1735: 1713: 1685: 1646: 1625: 1598: 1576: 1550: 1505: 1441: 1423: 1008:.'" Several experts, including 1414: 1338: 1279: 1255: 187:Terrorist Surveillance Program 1: 1209:Ball, James; Borger, Julian; 1187: 366:Senate Intelligence Committee 1742:Michael Riley (2014-04-11). 1632:Security News (2013-09-10). 1466:Matthew Green (2013-09-20). 1350:International Business Times 1074: 7: 1720:John Gilmore (6 Sep 2013). 1098: 343:FISA Amendments Act of 2008 338:Protect America Act of 2007 177:Total Information Awareness 10: 1873: 1605:Goodin, Dan (2013-12-10). 1172:Tailored Access Operations 1091:, the first battle of the 1039: 932:Bernstein v. United States 892: 140:Tailored Access Operations 909:Through the NSA-designed 513:Surveillance of reporters 371:National Security Council 1371:Mike Godwin (May 2000). 1177:Transport Layer Security 1081:First Battle of Bull Run 1054:cryptographic primitives 960:virtual private networks 869:(FVEY), the NSA and the 801:National Security Agency 29:National Security Agency 993:Data Protection Manager 906: 823:intelligence community 785: 528:Insider Threat Program 1659:Google Developer Blog 1213:(September 5, 2013). 900: 780: 333:Homeland Security Act 227:Databases, tools etc. 1113:United States portal 1014:Christopher Soghoian 956:Secure Sockets Layer 939:, a euphemism for a 885:), and New Zealand ( 871:signals intelligence 523:UN diplomatic spying 901:Slide published by 803:(NSA). The British 394:Hepting v. AT&T 313:Privacy Act of 1974 91:Upstream collection 1677:has generic name ( 1542:has generic name ( 1089:Battle of Edgehill 1085:American Civil War 972:The New York Times 907: 786: 404:Clapper v. Amnesty 279:GCHQ collaboration 273:BOUNDLESSINFORMANT 1857:Encryption debate 1837:Mass surveillance 1489:. San Francisco. 1145:Mass surveillance 1093:English Civil War 913:, which used the 841:Naming and access 775: 774: 1864: 1782: 1781: 1779: 1777: 1762: 1756: 1755: 1739: 1733: 1732: 1726:The Mail Archive 1717: 1711: 1710: 1708: 1706: 1689: 1683: 1682: 1676: 1672: 1670: 1662: 1650: 1644: 1643: 1629: 1623: 1622: 1620: 1619: 1602: 1596: 1595: 1593: 1591: 1580: 1574: 1573: 1571: 1569: 1554: 1548: 1547: 1541: 1537: 1535: 1527: 1525: 1524: 1509: 1503: 1502: 1500: 1498: 1478: 1472: 1471: 1463: 1457: 1456: 1445: 1439: 1438: 1427: 1421: 1418: 1412: 1411: 1406: 1405: 1394: 1388: 1387: 1381: 1380: 1368: 1362: 1361: 1359: 1357: 1342: 1336: 1335: 1333: 1331: 1316: 1299: 1298: 1296: 1295: 1283: 1277: 1276: 1274: 1273: 1267:www.schneier.com 1259: 1253: 1252: 1240: 1225: 1224: 1211:Greenwald, Glenn 1206: 1129: 1124: 1123: 1115: 1110: 1109: 1108: 958:as well as some 929:as evidenced by 767: 760: 753: 735: 734: 723: 722: 704: 703: 692: 691: 680: 679: 668: 667: 647: 637: 627: 617: 607: 597: 587: 419:Wikimedia v. NSA 409:Klayman v. Obama 308:Safe Streets Act 40: 26: 19: 18: 1872: 1871: 1867: 1866: 1865: 1863: 1862: 1861: 1847:GCHQ operations 1822: 1821: 1790: 1785: 1775: 1773: 1763: 1759: 1740: 1736: 1718: 1714: 1704: 1702: 1690: 1686: 1674: 1673: 1664: 1663: 1651: 1647: 1630: 1626: 1617: 1615: 1603: 1599: 1589: 1587: 1582: 1581: 1577: 1567: 1565: 1556: 1555: 1551: 1539: 1538: 1529: 1528: 1522: 1520: 1518:theguardian.com 1510: 1506: 1496: 1494: 1479: 1475: 1464: 1460: 1447: 1446: 1442: 1429: 1428: 1424: 1419: 1415: 1403: 1401: 1400:. July 12, 1996 1396: 1395: 1391: 1378: 1376: 1369: 1365: 1355: 1353: 1344: 1343: 1339: 1329: 1327: 1317: 1302: 1293: 1291: 1284: 1280: 1271: 1269: 1261: 1260: 1256: 1241: 1228: 1207: 1194: 1190: 1127:Politics portal 1125: 1118: 1111: 1106: 1104: 1101: 1077: 1042: 895: 843: 783:theguardian.com 771: 742: 741: 729: 717: 698: 686: 674: 662: 574: 566: 565: 551: 543: 542: 503: 495: 494: 480: 472: 471: 437: 429: 428: 414:ACLU v. Clapper 384: 376: 375: 356: 348: 347: 303: 295: 294: 54: 46: 27: 17: 12: 11: 5: 1870: 1860: 1859: 1854: 1849: 1844: 1839: 1834: 1820: 1819: 1814: 1806: 1801: 1796: 1789: 1788:External links 1786: 1784: 1783: 1757: 1734: 1712: 1684: 1645: 1624: 1597: 1575: 1549: 1504: 1473: 1458: 1440: 1435:New York Times 1422: 1413: 1389: 1363: 1337: 1325:New York Times 1300: 1278: 1254: 1226: 1191: 1189: 1186: 1185: 1184: 1179: 1174: 1169: 1164: 1159: 1158: 1157: 1152: 1142: 1137: 1131: 1130: 1116: 1100: 1097: 1076: 1073: 1041: 1038: 1010:Bruce Schneier 964:New York Times 894: 891: 881:), Australia ( 842: 839: 830:Edward Snowden 773: 772: 770: 769: 762: 755: 747: 744: 743: 740: 739: 727: 714: 713: 709: 708: 696: 684: 672: 659: 658: 652: 651: 641: 631: 621: 611: 601: 591: 580: 579: 575: 572: 571: 568: 567: 564: 563: 558: 552: 549: 548: 545: 544: 541: 540: 535: 530: 525: 520: 515: 510: 504: 501: 500: 497: 496: 493: 492: 487: 481: 478: 477: 474: 473: 470: 469: 467:Edward Snowden 464: 459: 454: 449: 444: 442:William Binney 438: 436:Whistleblowers 435: 434: 431: 430: 427: 426: 421: 416: 411: 406: 401: 396: 391: 385: 382: 381: 378: 377: 374: 373: 368: 363: 357: 354: 353: 350: 349: 346: 345: 340: 335: 330: 325: 320: 315: 310: 304: 301: 300: 297: 296: 293: 292: 287: 281: 280: 276: 275: 270: 265: 260: 255: 250: 245: 240: 235: 229: 228: 224: 223: 218: 213: 208: 203: 197: 196: 192: 191: 190: 189: 179: 174: 169: 164: 159: 154: 148: 147: 143: 142: 136: 135: 131: 130: 124: 123: 119: 118: 113: 108: 103: 98: 93: 87: 86: 82: 81: 76: 71: 66: 60: 59: 55: 52: 51: 48: 47: 41: 33: 32: 15: 9: 6: 4: 3: 2: 1869: 1858: 1855: 1853: 1850: 1848: 1845: 1843: 1840: 1838: 1835: 1833: 1830: 1829: 1827: 1818: 1815: 1813: 1810: 1807: 1805: 1802: 1800: 1797: 1795: 1792: 1791: 1772: 1768: 1761: 1753: 1749: 1748:Bloomberg.com 1745: 1738: 1731: 1727: 1723: 1716: 1701: 1700: 1695: 1688: 1680: 1675:|author= 1668: 1660: 1656: 1649: 1641: 1640: 1635: 1628: 1614: 1613: 1608: 1601: 1585: 1579: 1563: 1559: 1553: 1545: 1540:|author= 1533: 1519: 1515: 1508: 1492: 1488: 1484: 1477: 1469: 1462: 1454: 1450: 1444: 1436: 1432: 1426: 1417: 1410: 1399: 1393: 1386: 1374: 1367: 1351: 1347: 1341: 1326: 1322: 1315: 1313: 1311: 1309: 1307: 1305: 1289: 1282: 1268: 1264: 1258: 1250: 1246: 1239: 1237: 1235: 1233: 1231: 1222: 1221: 1216: 1212: 1205: 1203: 1201: 1199: 1197: 1192: 1183: 1182:Voice over IP 1180: 1178: 1175: 1173: 1170: 1168: 1165: 1163: 1160: 1156: 1153: 1151: 1148: 1147: 1146: 1143: 1141: 1138: 1136: 1133: 1132: 1128: 1122: 1117: 1114: 1103: 1096: 1094: 1090: 1086: 1082: 1072: 1070: 1065: 1061: 1057: 1055: 1051: 1047: 1037: 1035: 1031: 1027: 1023: 1019: 1015: 1011: 1007: 1002: 997: 994: 990: 989:BSAFE toolkit 986: 982: 981:kleptographic 977: 973: 968: 965: 961: 957: 952: 950: 944: 942: 938: 934: 933: 928: 924: 920: 916: 912: 904: 899: 890: 888: 884: 880: 876: 872: 868: 863: 860: 856: 852: 848: 838: 835: 831: 826: 824: 820: 816: 815: 810: 806: 802: 798: 794: 790: 784: 779: 768: 763: 761: 756: 754: 749: 748: 746: 745: 738: 733: 728: 726: 721: 716: 715: 711: 710: 707: 702: 697: 695: 690: 685: 683: 678: 673: 671: 666: 661: 660: 657: 654: 653: 650: 646: 642: 640: 636: 632: 630: 626: 622: 620: 616: 612: 610: 606: 602: 600: 596: 592: 590: 586: 582: 581: 578:United States 577: 576: 573:Collaboration 570: 569: 562: 559: 557: 554: 553: 547: 546: 539: 536: 534: 531: 529: 526: 524: 521: 519: 518:Mail tracking 516: 514: 511: 509: 506: 505: 499: 498: 491: 488: 486: 483: 482: 476: 475: 468: 465: 463: 460: 458: 455: 453: 450: 448: 445: 443: 440: 439: 433: 432: 425: 422: 420: 417: 415: 412: 410: 407: 405: 402: 400: 397: 395: 392: 390: 387: 386: 380: 379: 372: 369: 367: 364: 362: 359: 358: 352: 351: 344: 341: 339: 336: 334: 331: 329: 326: 324: 321: 319: 316: 314: 311: 309: 306: 305: 299: 298: 291: 288: 286: 283: 282: 278: 277: 274: 271: 269: 266: 264: 261: 259: 256: 254: 251: 249: 246: 244: 241: 239: 236: 234: 231: 230: 226: 225: 222: 219: 217: 214: 212: 209: 207: 204: 202: 199: 198: 194: 193: 188: 185: 184: 183: 180: 178: 175: 173: 170: 168: 165: 163: 160: 158: 155: 153: 150: 149: 145: 144: 141: 138: 137: 133: 132: 129: 126: 125: 121: 120: 117: 114: 112: 109: 107: 104: 102: 99: 97: 94: 92: 89: 88: 84: 83: 80: 77: 75: 72: 70: 67: 65: 62: 61: 57: 56: 50: 49: 44: 39: 35: 34: 30: 25: 21: 20: 1812:John Gilmore 1774:. Retrieved 1770: 1760: 1747: 1737: 1729: 1725: 1715: 1703:. Retrieved 1699:The Guardian 1697: 1687: 1658: 1648: 1639:The Register 1637: 1627: 1616:. Retrieved 1612:Ars Technica 1610: 1600: 1588:. Retrieved 1586:. 2013-11-19 1578: 1566:. Retrieved 1564:. 2013-09-06 1562:The Register 1561: 1552: 1521:. Retrieved 1517: 1507: 1497:December 20, 1495:. Retrieved 1486: 1476: 1461: 1453:Ars Technica 1452: 1443: 1434: 1425: 1416: 1408: 1402:. Retrieved 1392: 1383: 1377:. Retrieved 1366: 1354:. Retrieved 1352:. 2013-09-06 1349: 1340: 1328:. Retrieved 1324: 1292:. Retrieved 1281: 1270:. Retrieved 1266: 1257: 1220:The Guardian 1218: 1078: 1066: 1062: 1058: 1043: 1006:need to know 998: 985:RSA Security 976:Dual_EC_DRBG 971: 969: 963: 962:(VPNs). The 953: 945: 930: 911:Clipper chip 908: 903:The Guardian 902: 864: 844: 827: 819:interdiction 814:The Guardian 812: 808: 792: 788: 787: 447:Thomas Drake 424:US v. Moalin 399:Jewel v. NSA 355:Institutions 253:TRAFFICTHIEF 215: 31:surveillance 1776:6 September 1290:. Eweek.com 1034:RC4 attacks 877:), Canada ( 797:clandestine 479:Publication 457:Thomas Tamm 389:ACLU v. NSA 328:Patriot Act 302:Legislation 162:Trailblazer 1826:Categories 1618:2014-01-23 1523:2014-01-23 1404:2013-09-09 1385:standards. 1379:2013-09-09 1294:2014-01-23 1272:2016-09-11 1249:ProPublica 1188:References 1069:Heartbleed 1022:weaknesses 937:key escrow 851:Top Secret 791:(stylized 452:Mark Klein 195:Since 2007 167:Turbulence 146:Since 2001 134:Since 1998 122:Since 1990 111:ThinThread 85:Since 1978 1752:Bloomberg 1705:9 January 1532:cite news 1075:Etymology 867:Five Eyes 656:Five Eyes 508:Cablegate 462:Russ Tice 263:XKeyscore 243:Main Core 211:Stateroom 157:STORMBREW 128:RAMPART-A 106:Main Core 1771:BBC News 1667:cite web 1590:16 April 1568:16 April 1491:Archived 1375:. Reason 1356:16 April 1330:16 April 1162:MUSCULAR 1099:See also 941:backdoor 915:Skipjack 809:Edgehill 599:CYBERCOM 561:Metadata 550:Concepts 383:Lawsuits 285:MUSCULAR 258:DISHFIRE 206:Dropmire 172:Genoa II 101:FAIRVIEW 74:SHAMROCK 58:Pre-1978 53:Programs 1487:Reuters 1455:. 2013. 1050:OpenSSL 1046:FreeBSD 1040:Fallout 949:hacking 893:Methods 857:) with 795:) is a 793:BULLRUN 789:Bullrun 502:Related 290:Tempora 268:ICREACH 248:MAINWAY 233:PINWALE 216:Bullrun 152:OAKSTAR 96:BLARNEY 69:MINARET 64:ECHELON 1001:SIGINT 556:SIGINT 238:MARINA 221:MYSTIC 79:PROMIS 1167:PRISM 1140:IPsec 1135:HTTPS 919:CALEA 712:Other 201:PRISM 116:Genoa 1778:2013 1707:2017 1679:help 1592:2015 1570:2015 1544:help 1499:2013 1358:2015 1332:2015 1048:and 1012:and 991:and 925:and 923:CESA 887:GCSB 875:GCHQ 834:GCHQ 725:DGSE 706:GCSB 682:GCHQ 670:CSEC 361:FISC 323:ECPA 318:FISA 1026:RSA 1018:RC4 951:). 883:ASD 879:CSE 737:BND 694:ASD 649:IAO 639:DHS 629:CIA 619:FBI 609:DOJ 589:CSS 1828:: 1769:. 1750:. 1746:. 1724:. 1696:. 1671:: 1669:}} 1665:{{ 1657:. 1636:. 1609:. 1560:. 1536:: 1534:}} 1530:{{ 1516:. 1485:. 1451:. 1433:. 1407:. 1382:. 1348:. 1323:. 1303:^ 1265:. 1247:. 1229:^ 1217:. 1195:^ 1095:. 1056:. 1030:DH 921:, 855:SI 853:// 1780:. 1754:. 1709:. 1681:) 1661:. 1642:. 1621:. 1594:. 1572:. 1546:) 1526:. 1501:. 1470:. 1437:. 1360:. 1334:. 1297:. 1275:. 1251:. 1223:. 1028:/ 1004:' 766:e 759:t 752:v

Index


National Security Agency

Map of global NSA data collection
ECHELON
MINARET
SHAMROCK
PROMIS
Upstream collection
BLARNEY
FAIRVIEW
Main Core
ThinThread
Genoa
RAMPART-A
Tailored Access Operations
OAKSTAR
STORMBREW
Trailblazer
Turbulence
Genoa II
Total Information Awareness
President's Surveillance Program
Terrorist Surveillance Program
PRISM
Dropmire
Stateroom
Bullrun
MYSTIC
PINWALE

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑