VictoryDance |
The NSA tested a technique for using drones to map "the Wi-Fi fingerprint of nearly every major town in Yemen."
|
NSA |
✓ |
|
✓ |
|
Hammerchant / Hammerstein |
NSA programs to spy on data sent through voice over IP calls and Virtual Private Networks.
|
NSA |
|
✓ |
✓ |
|
ANT catalog |
Various techniques - with names like IronChef and DropoutJeep - used to inject surveillance software into Apple, Cisco, Dell and other products.
|
NSA |
|
✓ |
✓ |
|
Cracking cellphone encryption |
The NSA has the capability to defeat a widely-used cellphone encryption technology.
|
NSA |
✓ |
|
✓ |
|
Optic Nerve |
A British program to bulk collect images from Yahoo webcam chats: "It would appear that a surprising number of people use webcam conversations to show intimate parts of their body to the other person."
|
NSA |
✓ |
|
✓ |
|
Swedish-American surveillance of Russia |
A Swedish-American effort to spy on Russian leadership.
|
NSA |
|
✓ |
✓ |
|
Gilgamesh |
An NSA program to geolocate people's SIM cards via Predator drones.
|
NSA |
|
✓ |
✓ |
|
Buddy List, Address Book Spying |
An NSA effort to collect hundreds of millions of contact lists from email and instant messaging accounts.
|
NSA |
✓ |
|
✓ |
|
Hacking Anonymous |
A British spy unit to monitor hacktivists such as the group Anonymous.
|
NSA |
|
✓ |
✓ |
|
Co-Traveler/ FASCIA |
The NSA collected 5 billion records a day of cellphone locations worldwide.
|
NSA |
✓ |
|
✓ |
|
Hacking OPEC |
NSA and GCHQ programs to infiltrate the OPEC oil cartel
|
NSA and GCHQ |
|
✓ |
✓ |
|
Tracfin |
Tracfin amasses gigabytes of data about credit card purchases.
|
NSA |
✓ |
|
✓ |
|
Wellspring |
An NSA program to collect images from emails for facial recognition.
|
NSA |
✓ |
|
✓ |
|
Honey Traps |
A British spy effort to conduct covert Internet investigations, including sexual "honey-traps."
|
NSA |
|
✓ |
✓ |
|
Surveillance of 2009 U.N. Climate Change conference |
NSA surveillance of the 2009 U.N. Climate Change conference.
|
NSA |
|
✓ |
✓ |
|
Spying on Gamers |
The NSA and GCHQ monitored games including World of Warcraft.
|
NSA and GCHQ |
✓ |
|
✓ |
|
Targeting Embassies |
An NSA operation targeting the Italian embassy in Washington D.C.
|
NSA |
|
✓ |
✓ |
|
Dishfire |
An NSA program to collect up to 200 million text messages a day worldwide.
|
NSA |
✓ |
|
✓ |
|
QuantumTheory |
NSA programs that inject spyware onto targets' computers through so-called "man on the side" attacks. Variants include QuantumInsert, QuantumBiscuit, and QuantumSmackdown.
|
NSA |
|
✓ |
✓ |
|
Muscular |
The NSA and GCHQ have jointly operated a program to intercept data from Yahoo and Google networks.
|
NSA and GCHQ |
✓ |
|
✓ |
|
Prism |
The Prism program collects data from the servers of U.S. technology companies.
|
NSA |
✓ |
|
|
✓ |
Hacking Angela Merkel |
The NSA targeted German Chancellor Angela Merkel's cellphone.
|
NSA |
|
✓ |
✓ |
|
Hacking Al Jazeera |
NSA hacked into Al Jazeera's internal communications system.
|
NSA |
|
✓ |
✓ |
|
Cellphone Location Test |
In 2010 and 2011, the NSA tested bulk collection of location data from Americans cellphones.
|
NSA |
✓ |
|
|
✓ |
Tapping Underseas Cables |
Companies - including BT, Vodafone, and Verizon Business - gave GCHQ access to their underseas cables.
|
NSA |
✓ |
|
✓ |
|
Angry Birds |
NSA and GCHQ efforts to intercept information transmitted by phone apps, including Angry Birds.
|
NSA and GCHQ |
✓ |
|
✓ |
|
Royal Concierge |
A GCHQ program to monitor hotel reservations for "governmental hard targets."
|
NSA |
|
✓ |
✓ |
|
Monitoring Privacy Software |
The NSA collected information about users of privacy software including visitors to two Massachussetts Institute of Technology computers.
|
NSA |
|
✓ |
|
✓ |
SecondDate |
A so-called man-in-the-middle attack for "mass exploitation" of traffic "passing through network choke points" as well as "surgical target selection."
|
NSA |
|
✓ |
✓ |
|
NoseySmurf, TrackerSmurf, DreamySmurf, ParanoidSmurf |
The Smurf programs get inside iPhones and Android devices, turning on microphones, tracking location, and managing power.
|
NSA |
|
✓ |
✓ |
|
Internet Metadata |
A program, ended in 2011, to sweep up domestic Internet metadata such as the To and From fields in emails.
|
NSA |
✓ |
|
|
✓ |
EgotisticalGoat and EgotisticalGiraffe |
The Egotistical animal programs are techniques to track users of Tor anonymizing software.
|
NSA |
|
✓ |
✓ |
|
Program to Discredit Militants |
An NSA effort to spy on targets' online sexual activity.
|
NSA |
|
✓ |
✓ |
|
LinkedIn Hack |
Engineers at a Belgian telcom were infected with malware, via a technique called QuantumInsert, when they pulled up their LinkedIn profiles.
|
NSA |
|
✓ |
✓ |
|
Bullrun |
Joint NSA and GCHQ effort to undermine and weaken cryptography standards and tools.
|
NSA and GCHQ |
✓ |
|
✓ |
✓ |
Shotgiant |
An NSA program to break into Chinese-owned Huawei networks and products.
|
NSA |
|
✓ |
✓ |
|
WillowVixen |
An NSA technique to deploy malware by sending out emails that trick targets into clicking a malicious link.
|
NSA |
|
✓ |
✓ |
|
Turmoil |
A large network of clandestine surveillance "sensors" to collect data from satellites, cables, and microwave communications around the world.
|
NSA |
✓ |
|
✓ |
|
Turbine |
A network of active command and control servers around the world that can be used for "industrial scale exploitation."
|
NSA |
✓ |
|
✓ |
|
Squeaky Dolphin |
A British effort to monitor YouTube video views, URLS "liked" on Facebook and Blogger visits.
|
NSA |
✓ |
|
✓ |
|
Spying on American Muslims |
FBI monitored e-mail of 200 Americans including prominent Muslims such as a former Bush Administration official, two professors, an attorney and the leader of a Muslim civil rights group.
|
NSA |
|
✓ |
|
✓ |
Upstream |
The Upstream program collects communications transiting the Internet via commercial partners codenamed Fairview, Stormbrew, Blarney, and Oakstar.
|
NSA |
✓ |
|
✓ |
✓ |
50,000 implants |
An NSA map of the 50,000 computers worldwide it has implanted with surveillance malware.
|
NSA |
|
✓ |
✓ |
|
G8 and G20 Summit Spying |
The NSA conducted surveillance during the 2010 G8 and G20 summits in Canada.
|
NSA |
|
✓ |
✓ |
|
Phone Metadata |
The well-known and controversial program to collect phone call records - aka metadata - of nearly all Americans.
|
NSA |
✓ |
|
|
✓ |
HappyFoot |
An NSA effort to use Web cookies and data from phone apps to identify users' devices and physical locations.
|
NSA |
|
✓ |
✓ |
|