Preview warning: Page using Template:Infobox organization with unknown parameter "role"
National Security Agency surveillance
Map of global NSA data collection as of 2007[update], with countries subject to the most data collection shown in red
Programs
Pre-1978
ECHELON
MINARET
SHAMROCK
PROMIS
Since 1978
Upstream collection
BLARNEY
FAIRVIEW
Main Core
ThinThread
Genoa
Since 1990
RAMPART-A
Since 1998
Tailored Access Operations
Since 2001
OAKSTAR
STORMBREW
Trailblazer
Turbulence
Genoa II
Total Information Awareness
President's Surveillance Program
Terrorist Surveillance Program
Since 2007
PRISM
Dropmire
Stateroom
Bullrun
MYSTIC
Databases, tools etc.
PINWALE
MARINA
Main Core
MAINWAY
TRAFFICTHIEF
DISHFIRE
XKeyscore
ICREACH
BOUNDLESSINFORMANT
GCHQ collaboration
MUSCULAR
Tempora
Legislation
Safe Streets Act
Privacy Act of 1974
FISA
ECPA
Patriot Act
Homeland Security Act
Protect America Act of 2007
FISA Amendments Act of 2008
Institutions
FISC
Senate Intelligence Committee
National Security Council
Lawsuits
ACLU v. NSA
Hepting v. AT&T
Jewel v. NSA
Clapper v. Amnesty
Klayman v. Obama
ACLU v. Clapper
Wikimedia v. NSA
US v. Moalin
Whistleblowers
William Binney
Thomas Drake
Mark Klein
Thomas Tamm
Russ Tice
Edward Snowden
Publication
2005 warrantless surveillance scandal
Global surveillance disclosures (2013–present)
Related
Cablegate
Surveillance of reporters
Mail tracking
UN diplomatic spying
Insider Threat Program
Mass surveillance in the United States
Mass surveillance in the United Kingdom
Concepts
SIGINT
Metadata
Collaboration
United States
CSS
CYBERCOM
DOJ
FBI
CIA
DHS
IAO
Five Eyes
CSEC
GCHQ
ASD
GCSB
Other
DGSE
BND
v
t
e
The Office of Tailored Access Operations (TAO), now Computer Network Operations, and structured as S32,[1] is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA).[2] It has been active since at least 1998, possibly 1997, but was not named or structured as TAO until "the last days of 2000," according to General Michael Hayden.[3][4][5]
TAO identifies, monitors, infiltrates, and gathers intelligence on computer systems being used by entities foreign to the United States.[6][7][8][9]
^Nakashima, Ellen (1 December 2017). "NSA employee who worked on hacking tools at home pleads guilty to spy charge". The Washington Post. Retrieved 4 December 2017.
^Loleski, Steven (2018-10-18). "From cold to cyber warriors: the origins and expansion of NSA's Tailored Access Operations (TAO) to Shadow Brokers". Intelligence and National Security. 34 (1): 112–128. doi:10.1080/02684527.2018.1532627. ISSN 0268-4527. S2CID 158068358.
^Hayden, Michael V. (23 February 2016). Playing to the Edge: American Intelligence in the Age of Terror. Penguin Press. ISBN 978-1594206566. Retrieved 1 April 2021.
^Aid, Matthew M. (10 June 2013). "Inside the NSA's Ultra-Secret China Hacking Group". Foreign Policy. Retrieved 11 June 2013.
^Paterson, Andrea (30 August 2013). "The NSA has its own team of elite hackers". The Washington Post. Retrieved 31 August 2013.
^Kingsbury, Alex (June 19, 2009). "The Secret History of the National Security Agency". U.S. News & World Report. Retrieved 22 May 2013.
^Kingsbury, Alex; Mulrine, Anna (November 18, 2009). "U.S. is Striking Back in the Global Cyberwar". U.S. News & World Report. Retrieved 22 May 2013.
^Riley, Michael (May 23, 2013). "How the U.S. Government Hacks the World". Bloomberg Businessweek. Archived from the original on May 25, 2013. Retrieved 23 May 2013.
^Aid, Matthew M. (8 June 2010). The Secret Sentry: The Untold History of the National Security Agency. Bloomsbury USA. p. 311. ISBN 978-1-60819-096-6. Retrieved 22 May 2013.
and 27 Related for: Tailored Access Operations information
The Office of TailoredAccessOperations (TAO), now Computer Network Operations, and structured as S32, is a cyber-warfare intelligence-gathering unit...
Operations (SSO) division. Hacking operations, which fall under the responsibility of the TailoredAccessOperations (TAO) division. "Echelon" was created...
spying software were published. The items are available to the TailoredAccessOperations unit and are mostly targeted at products from US companies such...
Equation Group threat actor, who have been tied to the NSA's TailoredAccessOperations unit. Several news sources noted that the group's name was likely...
highly sophisticated threat actor suspected of being tied to the TailoredAccessOperations (TAO) unit of the United States National Security Agency (NSA)...
virtually unlimited access to NSA data. Snowden was offered a position on the NSA's elite team of hackers, TailoredAccessOperations, but turned it down...
name): The open secret code name for four surveillance programs. TailoredAccessOperations: Intelligence-gathering unit of the NSA that is capable of harvesting...
the National Security Agency. She also worked for NSA's elite TailoredAccessOperations. From 2009 to 2010, Easterly served on the United States Cyber...
information collected under the President's Surveillance Program TailoredAccessOperations, NSA's hacking program Terrorist Surveillance Program, an NSA...
Glenn Greenwald's book No Place to Hide details how the agency's TailoredAccessOperations (TAO) unit and other NSA employees intercept servers, routers...
would give the hacker access to their computer. Advanced persistent threat DigiNotar Duqu PLA Unit 61398 TailoredAccessOperations Jim Finkle (2011-08-03)...
measures were an arm of the National Security Agency known as the TailoredAccessOperations group which, among other things, is specialized in surreptitiously...
surveillance program as authorized by the Patriot Act. The facility commenced operations in 2003 and its purpose was publicly revealed in 2006. Room 641A is located...
trigger other systems, which perform "active" attacks through TailoredAccessOperations which are "tipping", for example, the QUANTUM family of programs...
Afghanistan. According to a 2013 Foreign Policy magazine article, NSA's TailoredAccessOperations (TAO) unit "has successfully penetrated Chinese computer and telecommunications...
This conclusion was supported by the exposure of Room 641A in AT&T's operations center in San Francisco in 2006. In June 2013, The Washington Post and...
government's latest rulebook on security bug disclosures". The Register. Retrieved November 16, 2017. Cyber-arms industry TailoredAccessOperations v t e v t e...
by U.S. special operations forces on May 2, 2011. STATEROOM Central Security Service Signals intelligence TailoredAccessOperations Brown, David W. (April...
variety of roles. From 2013 to 2017, he was head of the NSA's TailoredAccessOperations (TAO), a cyber-warfare intelligence-gathering unit. In that role...
Agency of the United States PLA Unit 61486 Signals intelligence TailoredAccessOperations of the United States Mandiant FireEye "APT1: Exposing One of China's...
specifically with two superiors in the Hawaii regional base of the NSA Threat Operations Center and two superiors in the Technology Directorate of the NSA, Snowden...
FAIRVIEW Main Core ThinThread Genoa Since 1990 RAMPART-A Since 1998 TailoredAccessOperations Since 2001 OAKSTAR STORMBREW Trailblazer Turbulence Genoa II Total...