635:
605:
615:
625:
595:
778:
38:
24:
689:
585:
665:
677:
1107:
701:
1121:
732:
898:
720:
645:
837:
of all the programs that have been leaked by
Snowden, the Bullrun Decryption Program is by far the most expensive. Snowden claims that since 2011, expenses devoted to Bullrun amount to $ 800 million. The leaked documents reveal that Bullrun seeks to "defeat the encryption used in specific network communication technologies".
966:
reported that: "But by 2006, an N.S.A. document notes, the agency had broken into communications for three foreign airlines, one travel reservation system, one foreign government's nuclear department and another's
Internet service by cracking the virtual private networks that protected them. By 2010,
836:
presentation which claims that "vast amounts of encrypted
Internet data which have up till now been discarded are now exploitable". A number of technical details regarding the program found in Snowden's documents were additionally censored by the press at the behest of US intelligence officials. Out
995:
until
September 2013. While RSA Security has denied knowingly inserting a backdoor into BSAFE, it has not yet given an explanation for the continued usage of Dual_EC_DRBG after its flaws became apparent in 2006 and 2007. It was reported on December 20, 2013, that RSA had accepted a payment of $ 10
946:
The NSA encourages the manufacturers of security technology to disclose backdoors to their products or encryption keys so that they may access the encrypted data. However, fearing widespread adoption of encryption, the NSA set out to stealthily influence and weaken encryption standards and obtain
849:(SCI) control system or compartment, but the codeword has to be shown in the classification line, after all other classification and dissemination markings. Furthermore, any details about specific cryptographic successes were recommended to be additionally restricted (besides being marked
1063:
Revelations of the NSA backdoors and purposeful complication of standards has led to a backlash in their participation in standards bodies. Prior to the revelations the NSA's presence on these committees was seen as a benefit given their expertise with encryption.
1384:
there was an effort to regulate the use and sale of encryption tools, domestically and abroad. By 1996, the administration had abandoned the
Clipper Chip as such, but it continued to lobby both at home and abroad for software-based "key escrow" encryption
978:
contains a back door, which would allow the NSA to break encryption keys generated by the random number generator. Even though this random number generator was known to be insecure and slow soon after the standard was published, and a potential NSA
1059:
Many other software projects, companies and organizations responded with an increase in the evaluation of their security and encryption processes. For example, Google doubled the size of their TLS certificates from 1024 bits to 2048 bits.
861:
labels; a non-exclusive list of possible
Bullrun ECI labels was given as: APERIODIC, AMBULANT, AUNTIE, PAINTEDEAGLE, PAWLEYS, PITCHFORD, PENDLETON, PICARESQUE, and PIEDMONT without any details as to what these labels mean.
996:
million from the NSA to set the random number generator as the default. Leaked NSA documents state that their effort was “a challenge in finesse” and that “Eventually, N.S.A. became the sole editor” of the standard.
1003:
community's most fragile, and the inadvertent disclosure of the simple 'fact of' could alert the adversary and result in immediate loss of the capability." The document later states that "there will be NO
999:
By 2010, the leaked documents state that the NSA had developed "groundbreaking capabilities" against encrypted
Internet traffic. A GCHQ document warned however "These capabilities are among the
970:
As part of
Bullrun, NSA has also been actively working to "Insert vulnerabilities into commercial encryption systems, IT systems, networks, and endpoint communications devices used by targets".
832:. Although Snowden's documents do not contain technical information on exact cryptanalytic capabilities because Snowden did not have clearance access to such information, they do contain a 2010
1409:
Although we do not control the use of encryption within the US, we do, with some exceptions, limit the export of non-escrowed mass market encryption to products using a key length of 40 bits.
342:
1851:
522:
388:
724:
935:, the U.S. government had publicly attempted in the 1990s to ensure its access to communications and ability to decrypt. In particular, technical measures such as
1490:
307:
512:
1345:
489:
1730:
the big companies involved ... are all in bed with NSA to make damn sure that working end-to-end encryption never becomes the default on mobile phones
918:
1606:
634:
1448:
967:
the
Edgehill program, the British counterencryption effort, was unscrambling VPN traffic for 30 targets and had set a goal of an additional 300."
1287:
889:). Signals that cannot be decrypted with current technology may be retained indefinitely while the agencies continue to attempt to decrypt them.
1583:
1798:
1020:, an encryption algorithm used in at least 50 percent of all SSL/TLS traffic at the time, was a plausible avenue, given several publicly known
1743:
926:
1071:
bug, which caused major websites to be vulnerable to password theft, but did not reveal this information in order to exploit it themselves.
1841:
1831:
669:
1430:
441:
764:
484:
1320:
614:
1244:
705:
1149:
537:
370:
360:
1693:
1513:
604:
1793:
1154:
1087:. Its predecessor "Manassas", is both an alternate name for the battle and where the battle took place. "EDGEHILL" is from the
983:
backdoor was found in 2007 while alternative random number generators without these flaws were certified and widely available,
804:
681:
532:
624:
594:
1654:
878:
322:
317:
1467:
858:
822:
846:
608:
517:
181:
922:
799:, highly classified program to crack encryption of online communications and data, which is run by the United States
1214:
403:
210:
584:
1029:
638:
618:
284:
100:
1557:
1033:
882:
757:
693:
186:
78:
365:
220:
1482:
1166:
905:
diagramming the high-level architecture of NSA's "Exploitation of Common
Internet Encryption Technologies"
648:
628:
598:
337:
176:
1803:
1633:
1856:
1836:
1171:
948:
931:
139:
1808:
1721:
1262:
750:
1846:
1816:
1176:
1080:
959:
800:
588:
28:
1811:
1053:
736:
423:
644:
527:
1678:
1543:
992:
947:
master keys—either by agreement, by force of law, or by computer network exploitation (
796:
332:
1372:
1032:
keys. RC4 has since been prohibited for all versions of TLS by RFC 7465 in 2015, due to the
37:
23:
1514:"$ 10m NSA contract with security firm RSA led to encryption 'back door' | World news"
1112:
1013:
1000:
955:
954:
According to a Bullrun briefing document, the agency had successfully infiltrated both the
940:
870:
854:
777:
555:
446:
917:
cipher with an intentional backdoor, and using various specifically designed laws such as
8:
312:
272:
161:
95:
90:
42:
1531:
1088:
1084:
1025:
393:
1766:
1666:
1397:
1144:
1092:
914:
418:
408:
171:
166:
73:
1263:"Computer Network Exploitation vs. Computer Network Attack - Schneier on Security"
1210:
1126:
782:
413:
68:
1751:
1009:
829:
676:
466:
1825:
1634:"Torvalds shoots down call to yank 'backdoored' Intel RdRand in Linux crypto"
1607:""We cannot trust" Intel and Via's chip-based crypto, FreeBSD developers say"
1181:
1024:
of RC4. Others have speculated that NSA has gained ability to crack 1024-bit
988:
980:
817:, the program uses multiple methods including computer network exploitation,
115:
1052:, have seen an increase in their reluctance to (fully) trust hardware-based
1698:
1638:
1611:
1219:
1005:
984:
975:
910:
818:
813:
398:
252:
45:
as of 2007, with countries subject to the most data collection shown in red
1208:
1044:
In the wake of Bullrun revelations, some open source projects, including
700:
456:
327:
1242:
1120:
1449:"New York Times provides new details about NSA backdoor in crypto spec"
1420:("NSA is Changing User's Internet Experience.") Info Security Institute
1248:
1068:
936:
850:
451:
110:
1694:"The US government has betrayed the internet. We need to take it back"
845:
According to the NSA's Bullrun Classification Guide, Bullrun is not a
1558:"That earth-shattering NSA crypto-cracking: Have spooks smashed RC4?"
866:
688:
655:
507:
461:
262:
242:
156:
127:
105:
1215:"US and UK spy agencies defeat privacy and security on the internet"
865:
Access to the program is limited to a group of top personnel at the
1584:"Google strengthens its SSL configuration against possible attacks"
1483:"Exclusive: Secret contract tied NSA and security industry pioneer"
1288:"NSA Bullrun, 9/11 and Why Enterprises Should Walk Before They Run"
1161:
560:
257:
205:
1243:
Perlroth, Nicole; Larson, Jeff; Shane, Scott (September 5, 2013).
1021:
897:
1245:"The NSA's Secret Campaign to Crack, Undermine Internet Security"
1049:
1045:
731:
289:
267:
247:
232:
151:
63:
1817:
https://www.cs.auckland.ac.nz/~pgut001/pubs/crypto_wont_help.pdf
1373:"Rendering Unto CESA: Clinton's contradictory encryption policy"
828:
Information about the program's existence was leaked in 2013 by
719:
664:
237:
1652:
1139:
1134:
811:. According to the Bullrun classification guide published by
200:
1794:
Crucial Unanswered Questions about the NSA's BULLRUN Program
1431:"Secret Documents Reveal N.S.A. Campaign Against Encryption"
1319:
Perlroth, Nicole; Larson, Jeff; Shane, Scott (2013-09-05).
886:
874:
833:
1744:"NSA Said to Have Used Heartbleed Bug, Exposing Consumers"
1398:"Administration Statement on Commercial Encryption Policy"
1852:
Intelligence agency programmes revealed by Edward Snowden
1809:
Cryptography Opening Discussion: Speculation on "BULLRUN"
1804:
Defending Against Crypto Backdoors - Schneier on Security
1067:
There has been speculation that the NSA was aware of the
1017:
1511:
1321:"N.S.A. Able to Foil Basic Safeguards of Privacy on Web"
1767:"Snowden leaks: US and UK 'crack online encryption'"
1102:
1799:
Documents Reveal N.S.A. Campaign Against Encryption
1346:"Edward Snowden Reveals Secret Decryption Programs"
1318:
1285:
821:, industry relationships, collaboration with other
1204:
1202:
1200:
1198:
1196:
1016:, had speculated that a successful attack against
1823:
825:entities, and advanced mathematical techniques.
16:Code name of a decryption program run by the NSA
1193:
1722:"Opening Discussion: Speculation on 'BULLRUN'"
1468:"RSA warns developers not to use RSA products"
987:continued using Dual_EC_DRBG in the company's
974:has reported that the random number generator
943:, have met with criticism and little success.
490:Global surveillance disclosures (2013–present)
1741:
1631:
1465:
1390:
927:restrictions on export of encryption software
758:
1719:
1653:Tim Bray, Google Identity Team (July 2013).
1480:
1238:
1236:
1234:
1232:
1230:
1370:
1036:weakening or breaking RC4 used in SSL/TLS.
1364:
1314:
1312:
1310:
1308:
1306:
1304:
781:Bullrun classification guide published by
765:
751:
1655:"Google certificates upgrade in progress"
1227:
1691:
896:
776:
1512:Reuters in San Francisco (2013-12-20).
1493:from the original on September 24, 2015
1474:
1301:
1150:Mass surveillance in the United Kingdom
807:(GCHQ) has a similar program codenamed
538:Mass surveillance in the United Kingdom
1824:
1604:
1155:Mass surveillance in the United States
1079:The name "Bullrun" was taken from the
805:Government Communications Headquarters
533:Mass surveillance in the United States
1459:
485:2005 warrantless surveillance scandal
1764:
1692:Schneier, Bruce (5 September 2013).
859:Exceptionally Controlled Information
840:
1842:National Security Agency operations
1832:American secret government programs
1758:
847:Sensitive Compartmented Information
13:
1481:Menn, Joseph (December 20, 2013).
1286:Sean Michael Kerner (2013-09-09).
14:
1868:
1787:
1728:. The Cryptography Mailing List.
43:Map of global NSA data collection
1119:
1105:
1083:, the first major battle of the
873:agencies of the United Kingdom (
730:
718:
699:
687:
675:
663:
643:
633:
623:
613:
603:
593:
583:
182:President's Surveillance Program
36:
22:
1765:Ward, Mark (6 September 2013).
1735:
1713:
1685:
1646:
1625:
1598:
1576:
1550:
1505:
1441:
1423:
1008:.'" Several experts, including
1414:
1338:
1279:
1255:
187:Terrorist Surveillance Program
1:
1209:Ball, James; Borger, Julian;
1187:
366:Senate Intelligence Committee
1742:Michael Riley (2014-04-11).
1632:Security News (2013-09-10).
1466:Matthew Green (2013-09-20).
1350:International Business Times
1074:
7:
1720:John Gilmore (6 Sep 2013).
1098:
343:FISA Amendments Act of 2008
338:Protect America Act of 2007
177:Total Information Awareness
10:
1873:
1605:Goodin, Dan (2013-12-10).
1172:Tailored Access Operations
1091:, the first battle of the
1039:
932:Bernstein v. United States
892:
140:Tailored Access Operations
909:Through the NSA-designed
513:Surveillance of reporters
371:National Security Council
1371:Mike Godwin (May 2000).
1177:Transport Layer Security
1081:First Battle of Bull Run
1054:cryptographic primitives
960:virtual private networks
869:(FVEY), the NSA and the
801:National Security Agency
29:National Security Agency
993:Data Protection Manager
906:
823:intelligence community
785:
528:Insider Threat Program
1659:Google Developer Blog
1213:(September 5, 2013).
900:
780:
333:Homeland Security Act
227:Databases, tools etc.
1113:United States portal
1014:Christopher Soghoian
956:Secure Sockets Layer
939:, a euphemism for a
885:), and New Zealand (
871:signals intelligence
523:UN diplomatic spying
901:Slide published by
803:(NSA). The British
394:Hepting v. AT&T
313:Privacy Act of 1974
91:Upstream collection
1677:has generic name (
1542:has generic name (
1089:Battle of Edgehill
1085:American Civil War
972:The New York Times
907:
786:
404:Clapper v. Amnesty
279:GCHQ collaboration
273:BOUNDLESSINFORMANT
1857:Encryption debate
1837:Mass surveillance
1489:. San Francisco.
1145:Mass surveillance
1093:English Civil War
913:, which used the
841:Naming and access
775:
774:
1864:
1782:
1781:
1779:
1777:
1762:
1756:
1755:
1739:
1733:
1732:
1726:The Mail Archive
1717:
1711:
1710:
1708:
1706:
1689:
1683:
1682:
1676:
1672:
1670:
1662:
1650:
1644:
1643:
1629:
1623:
1622:
1620:
1619:
1602:
1596:
1595:
1593:
1591:
1580:
1574:
1573:
1571:
1569:
1554:
1548:
1547:
1541:
1537:
1535:
1527:
1525:
1524:
1509:
1503:
1502:
1500:
1498:
1478:
1472:
1471:
1463:
1457:
1456:
1445:
1439:
1438:
1427:
1421:
1418:
1412:
1411:
1406:
1405:
1394:
1388:
1387:
1381:
1380:
1368:
1362:
1361:
1359:
1357:
1342:
1336:
1335:
1333:
1331:
1316:
1299:
1298:
1296:
1295:
1283:
1277:
1276:
1274:
1273:
1267:www.schneier.com
1259:
1253:
1252:
1240:
1225:
1224:
1211:Greenwald, Glenn
1206:
1129:
1124:
1123:
1115:
1110:
1109:
1108:
958:as well as some
929:as evidenced by
767:
760:
753:
735:
734:
723:
722:
704:
703:
692:
691:
680:
679:
668:
667:
647:
637:
627:
617:
607:
597:
587:
419:Wikimedia v. NSA
409:Klayman v. Obama
308:Safe Streets Act
40:
26:
19:
18:
1872:
1871:
1867:
1866:
1865:
1863:
1862:
1861:
1847:GCHQ operations
1822:
1821:
1790:
1785:
1775:
1773:
1763:
1759:
1740:
1736:
1718:
1714:
1704:
1702:
1690:
1686:
1674:
1673:
1664:
1663:
1651:
1647:
1630:
1626:
1617:
1615:
1603:
1599:
1589:
1587:
1582:
1581:
1577:
1567:
1565:
1556:
1555:
1551:
1539:
1538:
1529:
1528:
1522:
1520:
1518:theguardian.com
1510:
1506:
1496:
1494:
1479:
1475:
1464:
1460:
1447:
1446:
1442:
1429:
1428:
1424:
1419:
1415:
1403:
1401:
1400:. July 12, 1996
1396:
1395:
1391:
1378:
1376:
1369:
1365:
1355:
1353:
1344:
1343:
1339:
1329:
1327:
1317:
1302:
1293:
1291:
1284:
1280:
1271:
1269:
1261:
1260:
1256:
1241:
1228:
1207:
1194:
1190:
1127:Politics portal
1125:
1118:
1111:
1106:
1104:
1101:
1077:
1042:
895:
843:
783:theguardian.com
771:
742:
741:
729:
717:
698:
686:
674:
662:
574:
566:
565:
551:
543:
542:
503:
495:
494:
480:
472:
471:
437:
429:
428:
414:ACLU v. Clapper
384:
376:
375:
356:
348:
347:
303:
295:
294:
54:
46:
27:
17:
12:
11:
5:
1870:
1860:
1859:
1854:
1849:
1844:
1839:
1834:
1820:
1819:
1814:
1806:
1801:
1796:
1789:
1788:External links
1786:
1784:
1783:
1757:
1734:
1712:
1684:
1645:
1624:
1597:
1575:
1549:
1504:
1473:
1458:
1440:
1435:New York Times
1422:
1413:
1389:
1363:
1337:
1325:New York Times
1300:
1278:
1254:
1226:
1191:
1189:
1186:
1185:
1184:
1179:
1174:
1169:
1164:
1159:
1158:
1157:
1152:
1142:
1137:
1131:
1130:
1116:
1100:
1097:
1076:
1073:
1041:
1038:
1010:Bruce Schneier
964:New York Times
894:
891:
881:), Australia (
842:
839:
830:Edward Snowden
773:
772:
770:
769:
762:
755:
747:
744:
743:
740:
739:
727:
714:
713:
709:
708:
696:
684:
672:
659:
658:
652:
651:
641:
631:
621:
611:
601:
591:
580:
579:
575:
572:
571:
568:
567:
564:
563:
558:
552:
549:
548:
545:
544:
541:
540:
535:
530:
525:
520:
515:
510:
504:
501:
500:
497:
496:
493:
492:
487:
481:
478:
477:
474:
473:
470:
469:
467:Edward Snowden
464:
459:
454:
449:
444:
442:William Binney
438:
436:Whistleblowers
435:
434:
431:
430:
427:
426:
421:
416:
411:
406:
401:
396:
391:
385:
382:
381:
378:
377:
374:
373:
368:
363:
357:
354:
353:
350:
349:
346:
345:
340:
335:
330:
325:
320:
315:
310:
304:
301:
300:
297:
296:
293:
292:
287:
281:
280:
276:
275:
270:
265:
260:
255:
250:
245:
240:
235:
229:
228:
224:
223:
218:
213:
208:
203:
197:
196:
192:
191:
190:
189:
179:
174:
169:
164:
159:
154:
148:
147:
143:
142:
136:
135:
131:
130:
124:
123:
119:
118:
113:
108:
103:
98:
93:
87:
86:
82:
81:
76:
71:
66:
60:
59:
55:
52:
51:
48:
47:
41:
33:
32:
15:
9:
6:
4:
3:
2:
1869:
1858:
1855:
1853:
1850:
1848:
1845:
1843:
1840:
1838:
1835:
1833:
1830:
1829:
1827:
1818:
1815:
1813:
1810:
1807:
1805:
1802:
1800:
1797:
1795:
1792:
1791:
1772:
1768:
1761:
1753:
1749:
1748:Bloomberg.com
1745:
1738:
1731:
1727:
1723:
1716:
1701:
1700:
1695:
1688:
1680:
1675:|author=
1668:
1660:
1656:
1649:
1641:
1640:
1635:
1628:
1614:
1613:
1608:
1601:
1585:
1579:
1563:
1559:
1553:
1545:
1540:|author=
1533:
1519:
1515:
1508:
1492:
1488:
1484:
1477:
1469:
1462:
1454:
1450:
1444:
1436:
1432:
1426:
1417:
1410:
1399:
1393:
1386:
1374:
1367:
1351:
1347:
1341:
1326:
1322:
1315:
1313:
1311:
1309:
1307:
1305:
1289:
1282:
1268:
1264:
1258:
1250:
1246:
1239:
1237:
1235:
1233:
1231:
1222:
1221:
1216:
1212:
1205:
1203:
1201:
1199:
1197:
1192:
1183:
1182:Voice over IP
1180:
1178:
1175:
1173:
1170:
1168:
1165:
1163:
1160:
1156:
1153:
1151:
1148:
1147:
1146:
1143:
1141:
1138:
1136:
1133:
1132:
1128:
1122:
1117:
1114:
1103:
1096:
1094:
1090:
1086:
1082:
1072:
1070:
1065:
1061:
1057:
1055:
1051:
1047:
1037:
1035:
1031:
1027:
1023:
1019:
1015:
1011:
1007:
1002:
997:
994:
990:
989:BSAFE toolkit
986:
982:
981:kleptographic
977:
973:
968:
965:
961:
957:
952:
950:
944:
942:
938:
934:
933:
928:
924:
920:
916:
912:
904:
899:
890:
888:
884:
880:
876:
872:
868:
863:
860:
856:
852:
848:
838:
835:
831:
826:
824:
820:
816:
815:
810:
806:
802:
798:
794:
790:
784:
779:
768:
763:
761:
756:
754:
749:
748:
746:
745:
738:
733:
728:
726:
721:
716:
715:
711:
710:
707:
702:
697:
695:
690:
685:
683:
678:
673:
671:
666:
661:
660:
657:
654:
653:
650:
646:
642:
640:
636:
632:
630:
626:
622:
620:
616:
612:
610:
606:
602:
600:
596:
592:
590:
586:
582:
581:
578:United States
577:
576:
573:Collaboration
570:
569:
562:
559:
557:
554:
553:
547:
546:
539:
536:
534:
531:
529:
526:
524:
521:
519:
518:Mail tracking
516:
514:
511:
509:
506:
505:
499:
498:
491:
488:
486:
483:
482:
476:
475:
468:
465:
463:
460:
458:
455:
453:
450:
448:
445:
443:
440:
439:
433:
432:
425:
422:
420:
417:
415:
412:
410:
407:
405:
402:
400:
397:
395:
392:
390:
387:
386:
380:
379:
372:
369:
367:
364:
362:
359:
358:
352:
351:
344:
341:
339:
336:
334:
331:
329:
326:
324:
321:
319:
316:
314:
311:
309:
306:
305:
299:
298:
291:
288:
286:
283:
282:
278:
277:
274:
271:
269:
266:
264:
261:
259:
256:
254:
251:
249:
246:
244:
241:
239:
236:
234:
231:
230:
226:
225:
222:
219:
217:
214:
212:
209:
207:
204:
202:
199:
198:
194:
193:
188:
185:
184:
183:
180:
178:
175:
173:
170:
168:
165:
163:
160:
158:
155:
153:
150:
149:
145:
144:
141:
138:
137:
133:
132:
129:
126:
125:
121:
120:
117:
114:
112:
109:
107:
104:
102:
99:
97:
94:
92:
89:
88:
84:
83:
80:
77:
75:
72:
70:
67:
65:
62:
61:
57:
56:
50:
49:
44:
39:
35:
34:
30:
25:
21:
20:
1812:John Gilmore
1774:. Retrieved
1770:
1760:
1747:
1737:
1729:
1725:
1715:
1703:. Retrieved
1699:The Guardian
1697:
1687:
1658:
1648:
1639:The Register
1637:
1627:
1616:. Retrieved
1612:Ars Technica
1610:
1600:
1588:. Retrieved
1586:. 2013-11-19
1578:
1566:. Retrieved
1564:. 2013-09-06
1562:The Register
1561:
1552:
1521:. Retrieved
1517:
1507:
1497:December 20,
1495:. Retrieved
1486:
1476:
1461:
1453:Ars Technica
1452:
1443:
1434:
1425:
1416:
1408:
1402:. Retrieved
1392:
1383:
1377:. Retrieved
1366:
1354:. Retrieved
1352:. 2013-09-06
1349:
1340:
1328:. Retrieved
1324:
1292:. Retrieved
1281:
1270:. Retrieved
1266:
1257:
1220:The Guardian
1218:
1078:
1066:
1062:
1058:
1043:
1006:need to know
998:
985:RSA Security
976:Dual_EC_DRBG
971:
969:
963:
962:(VPNs). The
953:
945:
930:
911:Clipper chip
908:
903:The Guardian
902:
864:
844:
827:
819:interdiction
814:The Guardian
812:
808:
792:
788:
787:
447:Thomas Drake
424:US v. Moalin
399:Jewel v. NSA
355:Institutions
253:TRAFFICTHIEF
215:
31:surveillance
1776:6 September
1290:. Eweek.com
1034:RC4 attacks
877:), Canada (
797:clandestine
479:Publication
457:Thomas Tamm
389:ACLU v. NSA
328:Patriot Act
302:Legislation
162:Trailblazer
1826:Categories
1618:2014-01-23
1523:2014-01-23
1404:2013-09-09
1385:standards.
1379:2013-09-09
1294:2014-01-23
1272:2016-09-11
1249:ProPublica
1188:References
1069:Heartbleed
1022:weaknesses
937:key escrow
851:Top Secret
791:(stylized
452:Mark Klein
195:Since 2007
167:Turbulence
146:Since 2001
134:Since 1998
122:Since 1990
111:ThinThread
85:Since 1978
1752:Bloomberg
1705:9 January
1532:cite news
1075:Etymology
867:Five Eyes
656:Five Eyes
508:Cablegate
462:Russ Tice
263:XKeyscore
243:Main Core
211:Stateroom
157:STORMBREW
128:RAMPART-A
106:Main Core
1771:BBC News
1667:cite web
1590:16 April
1568:16 April
1491:Archived
1375:. Reason
1356:16 April
1330:16 April
1162:MUSCULAR
1099:See also
941:backdoor
915:Skipjack
809:Edgehill
599:CYBERCOM
561:Metadata
550:Concepts
383:Lawsuits
285:MUSCULAR
258:DISHFIRE
206:Dropmire
172:Genoa II
101:FAIRVIEW
74:SHAMROCK
58:Pre-1978
53:Programs
1487:Reuters
1455:. 2013.
1050:OpenSSL
1046:FreeBSD
1040:Fallout
949:hacking
893:Methods
857:) with
795:) is a
793:BULLRUN
789:Bullrun
502:Related
290:Tempora
268:ICREACH
248:MAINWAY
233:PINWALE
216:Bullrun
152:OAKSTAR
96:BLARNEY
69:MINARET
64:ECHELON
1001:SIGINT
556:SIGINT
238:MARINA
221:MYSTIC
79:PROMIS
1167:PRISM
1140:IPsec
1135:HTTPS
919:CALEA
712:Other
201:PRISM
116:Genoa
1778:2013
1707:2017
1679:help
1592:2015
1570:2015
1544:help
1499:2013
1358:2015
1332:2015
1048:and
1012:and
991:and
925:and
923:CESA
887:GCSB
875:GCHQ
834:GCHQ
725:DGSE
706:GCSB
682:GCHQ
670:CSEC
361:FISC
323:ECPA
318:FISA
1026:RSA
1018:RC4
951:).
883:ASD
879:CSE
737:BND
694:ASD
649:IAO
639:DHS
629:CIA
619:FBI
609:DOJ
589:CSS
1828::
1769:.
1750:.
1746:.
1724:.
1696:.
1671::
1669:}}
1665:{{
1657:.
1636:.
1609:.
1560:.
1536::
1534:}}
1530:{{
1516:.
1485:.
1451:.
1433:.
1407:.
1382:.
1348:.
1323:.
1303:^
1265:.
1247:.
1229:^
1217:.
1195:^
1095:.
1056:.
1030:DH
921:,
855:SI
853://
1780:.
1754:.
1709:.
1681:)
1661:.
1642:.
1621:.
1594:.
1572:.
1546:)
1526:.
1501:.
1470:.
1437:.
1360:.
1334:.
1297:.
1275:.
1251:.
1223:.
1028:/
1004:'
766:e
759:t
752:v
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.