{"id":173697,"date":"2016-09-11T17:22:01","date_gmt":"2016-09-11T21:22:01","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tailored-access-operations-wikipedia-the-free-encyclopedia\/"},"modified":"2016-09-11T17:22:01","modified_gmt":"2016-09-11T21:22:01","slug":"tailored-access-operations-wikipedia-the-free-encyclopedia","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/tailored-access-operations-wikipedia-the-free-encyclopedia\/","title":{"rendered":"Tailored Access Operations &#8211; Wikipedia, the free encyclopedia"},"content":{"rendered":"<p><p>    The Office of Tailored Access Operations (TAO) is    a cyber-warfare intelligence-gathering unit    of the National Security Agency (NSA).    It has been active since at least circa 1998.[1][2] TAO    identifies, monitors, infiltrates, and gathers intelligence on    computer systems being used by entities foreign to the United    States.[3][4][5][6] The NSA terms these    activities \"computer network    exploitation\".  <\/p>\n<p>    TAO is reportedly \"now the largest and arguably the most    important component of the NSA's huge Signals Intelligence    Directorate (SID)[7] (SIGINT),    consisting of more than 1,000 military and civilian computer    hackers, intelligence analysts, targeting specialists, computer    hardware and software designers, and electrical    engineers.\"[1]  <\/p>\n<p>    A document leaked by former NSA contractor Edward    Snowden describing the unit's work says[not    in citation given] TAO has software    templates allowing it to break into commonly used hardware,    including routers, switches, and firewalls from multiple    product vendor lines\".[8]    According to The Washington Post, TAO engineers prefer    to tap networks rather than isolated computers, because there    are typically many devices on a single network.[8]  <\/p>\n<p>    TAO's headquarters are termed the Remote Operations    Center (ROC) and are based at the NSA headquarters at    Fort Meade, Maryland. TAO also has    expanded to NSA Hawaii (Wahiawa, Oahu), NSA Georgia (Fort    Gordon, Georgia), NSA Texas (San Antonio,    Texas), and NSA Colorado (Buckley Air Force Base,    Denver).[1]  <\/p>\n<p>    Since 2013, the head of TAO is Rob Joyce, a 25-plus year    employee who previously worked in the NSA's Information    Assurance Directorate (IAD). In January 2016, Joyce had a rare    public appearance when he gave a presentation at the Usenixs    Enigma conference. [9]  <\/p>\n<p>    In the Remote Operations Center, 600 employees gather    information from around the world.[10][11] Their motto is \"Your data is our    data, your equipment is our equipment - anytime, any place, by    any legal means.\"  <\/p>\n<p>    Details[citation    needed] on a program titled    QUANTUMSQUIRREL indicate NSA ability to masquerade as any    routable IPv4 or IPv6 host. This enables an NSA computer to    generate false geological location and personal identification    credentials when accessing the Internet utilizing    QUANTUMSQUIRREL.[15]  <\/p>\n<p>    The NSA    ANT catalog is a 50-page classified document listing    technology available to the United States National Security Agency (NSA)    Tailored Access Operations (TAO) by the Advanced Network    Technology (ANT) Division to aid in cyber surveillance. Most    devices are described as already operational and available to    US nationals and members of the Five Eyes alliance. According to    Der    Spiegel, which released the catalog to the public on    December 30, 2013, \"The list reads like a mail-order catalog,    one from which other NSA employees can order technologies from    the ANT division for tapping their targets' data.\" The document    was created in 2008.[16] Security    researcher Jacob Appelbaum gave a speech at the    Chaos    Communications Congress in Hamburg, Germany, in which he detailed techniques that the    simultaneously published Der Spiegel article he    coauthored disclosed from the catalog.[16]  <\/p>\n<p>    The TAO has developed an attack suite they call QUANTUM. It    relies on a compromised router that duplicates internet    traffic, typically HTTP requests, so that they go both to the    intended target and to an NSA site (indirectly). The NSA site    runs FOXACID software which sends back exploits that load in    the background in the target web browser before the intended destination    has had a chance to respond (it's unclear if the compromised    router facilitates this race on the return trip). Prior to the    development of this technology, FOXACID software made spear-phishing attacks the NSA referred to    as spam. If the browser is exploitable, further permanent    \"implants\" (rootkits etc.) are deployed in the target computer,    e.g. OLYMPUSFIRE for Windows, which give complete remote access    to the infected machine.[17] This type of    attack is part of the man-in-the-middle attack    family, though more specifically it is called man-on-the-side attack. It is    difficult to pull off without controlling some of the Internet    backbone.[18]  <\/p>\n<p>    There are numerous services that FOXACID can exploit this way.    The names of some FOXACID modules are given below:[19]  <\/p>\n<p>    By collaboration with the British Government    Communications Headquarters (GCHQ) (MUSCULAR), Google    services could be attacked too, including Gmail.[20]  <\/p>\n<p>    Finding machines that are exploitable and worth attacking is    done using analytic databases such as XKeyscore.[21] A specific    method of finding vulnerable machines is interception of    Windows Error Reporting traffic,    which is logged into XKeyscore.[22]  <\/p>\n<p>    QUANTUM attacks launched from NSA sites can be too slow for    some combinations of targets and services as they essentially    try to exploit a race condition, i.e. the NSA server is    trying to beat the legitimate server with its response.[23] As of mid-2011, the NSA was    prototyping a capability codenamed QFIRE, which involved    embedding their exploit-dispensing servers in virtual    machines (running on VMware ESX) hosted closer    to the target, in the so-called Special Collection Sites (SCS)    network worldwide. The goal of QFIRE was to lower the latency    of the spoofed response, thus increasing the probability of    success.[24][25][26]  <\/p>\n<p>    COMMENDEER [sic] is    used to commandeer (i.e. compromise) untargeted computer    systems. The software is used as a part of QUANTUMNATION, which    also includes the software vulnerability scanner VALIDATOR. The    tool was first described at the 2014 Chaos Communication Congress    by Jacob Appelbaum, who characterized it as    tyrannical.[27][28][29]  <\/p>\n<p>    QUANTUMCOOKIE is a more complex form of attack which can be    used against Tor users.[30]  <\/p>\n<p>    According to a 2013 article in Foreign    Policy, \"TAO has become increasingly accomplished at    its mission, thanks in part to the high-level cooperation it    secretly receives from the 'big three' American telecom    companies (AT&T, Verizon and Sprint), most of the large US-based    Internet service providers, and many of the top computer    security software manufactures and consulting    companies.\"[36] A 2012    TAO budget document claims that these companies, on TAO's    behest, \"insert vulnerabilities into commercial encryption    systems, IT systems, networks and endpoint communications    devices used by targets\".[36] A number    of US companies, including Cisco and Dell, have subsequently made public statements    denying that they insert such back doors into their    products.[37]Microsoft provides advance warning to the NSA    of vulnerabilities it knows about, before fixes or information    about these vulnerabilities is available to the public; this    enables TAO to execute so-called zero-day attacks.[38] A    Microsoft official who declined to be identified in the press    confirmed that this is indeed the case, but said that Microsoft    can't be held responsible for how the NSA uses this advance    information.[39]  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Tailored_Access_Operations\" title=\"Tailored Access Operations - Wikipedia, the free encyclopedia\">Tailored Access Operations - Wikipedia, the free encyclopedia<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The Office of Tailored Access Operations (TAO) is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA). It has been active since at least circa 1998.[1][2] TAO identifies, monitors, infiltrates, and gathers intelligence on computer systems being used by entities foreign to the United States.[3][4][5][6] The NSA terms these activities \"computer network exploitation\". TAO is reportedly \"now the largest and arguably the most important component of the NSA's huge Signals Intelligence Directorate (SID)[7] (SIGINT), consisting of more than 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.\"[1] A document leaked by former NSA contractor Edward Snowden describing the unit's work says[not in citation given] TAO has software templates allowing it to break into commonly used hardware, including routers, switches, and firewalls from multiple product vendor lines\".[8] According to The Washington Post, TAO engineers prefer to tap networks rather than isolated computers, because there are typically many devices on a single network.[8] TAO's headquarters are termed the Remote Operations Center (ROC) and are based at the NSA headquarters at Fort Meade, Maryland.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/tailored-access-operations-wikipedia-the-free-encyclopedia\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-173697","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/173697"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=173697"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/173697\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=173697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=173697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=173697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}