• Thumbnail for Insider Threat Program
    The Insider Threat Program is the United States government's response to the massive data leaks of the early twenty-first century, notably the diplomatic...
    2 KB (173 words) - 08:57, 9 July 2023
  • Thumbnail for MUSCULAR
    (DS-200B), located in the United Kingdom, is the name of a surveillance program jointly operated by Britain's Government Communications Headquarters (GCHQ)...
    12 KB (1,105 words) - 16:00, 17 August 2023
  • Thumbnail for PRISM
    discussed the Business Insider article about the possible involvement of technologies from two secretive Israeli companies in the PRISM program—Verint Systems...
    186 KB (17,181 words) - 16:35, 5 July 2024
  • Thumbnail for XKeyscore
    XKeyscore (category American secret government programs)
    Bundesnachrichtendienst. In July 2013, Edward Snowden publicly revealed the program's purpose and use by the NSA in The Sydney Morning Herald and O Globo newspapers...
    34 KB (3,435 words) - 20:25, 3 July 2024
  • Thumbnail for Stellar Wind
    surveillance program begun under the George W. Bush administration's President's Surveillance Program (PSP). The National Security Agency (NSA) program was approved...
    11 KB (1,176 words) - 01:32, 22 February 2024
  • Thumbnail for Bullrun (decryption program)
    Bullrun (stylized BULLRUN) is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United...
    17 KB (1,769 words) - 23:16, 10 September 2023
  • Thumbnail for Edward Snowden
    program". Washington Post. ISSN 0190-8286. Retrieved May 13, 2024. Levy, Steven (January 7, 2014). "How the NSA Almost Killed the Internet | Threat Level"...
    259 KB (25,445 words) - 17:06, 10 July 2024
  • Thumbnail for William Binney (intelligence official)
    and that the Democratic National Committee e-mails were leaked by an insider instead. An investigation by Duncan Campbell later detailed how Binney...
    27 KB (2,362 words) - 13:05, 17 June 2024
  • Thumbnail for NSA warrantless surveillance (2001–2007)
    the National Security Agency (NSA) as part of the Terrorist Surveillance Program. In late 2001, the NSA was authorized to monitor, without obtaining a FISA...
    150 KB (16,693 words) - 12:27, 4 July 2024
  • Thumbnail for Room 641A
    U.S. National Security Agency, as part of its warrantless surveillance program as authorized by the Patriot Act. The facility commenced operations in...
    10 KB (1,066 words) - 15:00, 28 May 2024
  • Thumbnail for United States v. Moalin
    because the bulk telephone data collection program involved in the case ended in 2015, and the program that replaced it was also shut down.[verification...
    3 KB (260 words) - 14:06, 6 May 2024
  • Thumbnail for Verizon
    Verizon deal, the husk of Yahoo will rename itself 'Altaba'". Business Insider. Archived from the original on January 10, 2017. Retrieved January 9, 2017...
    132 KB (11,054 words) - 17:55, 5 July 2024
  • Thumbnail for Main Core
    American government database containing information on those believed to be threats to national security. The existence of the database was first asserted...
    4 KB (314 words) - 10:07, 13 October 2023
  • Thumbnail for MYSTIC
    MYSTIC is a former secret program used since 2009 by the US National Security Agency (NSA) to collect the metadata as well as the content of phone calls...
    7 KB (722 words) - 04:13, 9 April 2024
  • Thumbnail for Boundless Informant
    Boundless Informant (category American secret government programs)
    specifically with two superiors in the Hawaii regional base of the NSA Threat Operations Center and two superiors in the Technology Directorate of the...
    16 KB (1,561 words) - 17:50, 5 July 2024
  • Thumbnail for Upstream collection
    through arrangements with Internet companies under the program codenamed PRISM. Both the Upstream programs and PRISM are part of the Special Source Operations...
    9 KB (951 words) - 16:56, 5 July 2024
  • Thumbnail for Total Information Awareness
    Total Information Awareness (TIA) was a mass detection program[clarification needed] by the United States Information Awareness Office. It operated under...
    43 KB (4,444 words) - 05:55, 6 June 2024
  • Insider Threat, or CINDER, is a digital threat method. In 2010, DARPA initiated a program under the same name (Cyber Insider Threat (CINDER) Program)...
    10 KB (1,078 words) - 04:06, 27 May 2024
  • Thumbnail for ANT catalog
    More About Edward Snowden's Epic Heist — And It's Troubling". Business Insider. Archived from the original on 2022-04-06. Retrieved 2022-04-06. "Documents...
    34 KB (1,790 words) - 21:35, 6 July 2024
  • Thumbnail for Terrorist Surveillance Program
    The Terrorist Surveillance Program was an electronic surveillance program implemented by the National Security Agency (NSA) of the United States in the...
    34 KB (3,883 words) - 12:27, 4 July 2024
  • List of government mass surveillance projects (category Secret government programs)
    flight bans if the Communist Party deems them untrustworthy". Business Insider. Retrieved 7 January 2023.{{cite web}}: CS1 maint: multiple names: authors...
    34 KB (3,256 words) - 08:54, 5 May 2024
  • Thumbnail for ThinThread
    and would have automatically identified potential threats. The sources of the data for this program would have included "massive phone and e-mail data...
    13 KB (1,479 words) - 15:54, 22 April 2024
  • Thumbnail for Project Genoa II
    Projects Agency's Information Awareness Office and the successor to the Genoa program. Originally part of DARPA's wider Total Information Awareness project,...
    6 KB (604 words) - 06:06, 10 May 2022
  • Thumbnail for UKUSA Agreement
    Canada, an investigative television report on CBC News's newsmagazine program The Fifth Estate revealed the existence of the Communications Security...
    54 KB (4,071 words) - 14:26, 6 May 2024
  • Thumbnail for Omar R. Lopez
    cyber operations, threats to research, development, and acquisition programs; force protection activities, and insider threat programs. In May 2019, he...
    5 KB (432 words) - 23:03, 10 May 2024
  • Thumbnail for National Security Agency
    2014-02-09 at the Wayback Machine, Threat Level, Wired.com Mick, Jason (July 8, 2010). "DailyTech – NSA's "Perfect Citizen" Program: Big Brother or Cybersecurity...
    250 KB (24,018 words) - 13:00, 5 July 2024
  • Thumbnail for Jewel v. National Security Agency
    warrant. The EFF alleged that the NSA's surveillance program was an "illegal and unconstitutional program of dragnet communications surveillance" and claimed...
    18 KB (1,699 words) - 05:23, 16 April 2024
  • Thumbnail for RAMPART-A
    RAMPART-A (category American secret government programs)
    signals intelligence partnership program led by the United States National Security Agency (NSA). Aim of the program is to "gain access to high-capacity...
    10 KB (828 words) - 15:14, 28 December 2020
  • Thumbnail for Tailored Access Operations
    Tailored Access Operations (category American advanced persistent threat groups)
    responsible for how the NSA uses this advance information. Advanced persistent threat Cyberwarfare in the United States Equation Group Magic Lantern (software)...
    27 KB (2,472 words) - 00:21, 23 June 2024
  • to Booz Allen Hamilton. As an "infrastructure analyst" at the National Threat Operations Center, he monitored internet communication. In his own words...
    44 KB (3,738 words) - 00:43, 29 June 2024