• Thumbnail for Insider Threat Program
    The Insider Threat Program is the United States government's response to the massive data leaks of the early twenty-first century, notably the diplomatic...
    2 KB (173 words) - 08:57, 9 July 2023
  • Thumbnail for Mark Klein
    outlining the technology, the program’s existence, and AT&T's involvement with the NSA. He also found evidence that the program was active in other cities...
    8 KB (723 words) - 03:10, 11 June 2025
  • Thumbnail for Room 641A
    S. National Security Agency, as part of an American mass surveillance program. The facility commenced operations in 2003 and its purpose was publicly...
    10 KB (1,053 words) - 20:10, 9 June 2025
  • Thumbnail for MUSCULAR
    (DS-200B), located in the United Kingdom, is the name of a surveillance program jointly operated by Britain's Government Communications Headquarters (GCHQ)...
    12 KB (1,105 words) - 16:00, 17 August 2023
  • Thumbnail for XKeyscore
    XKeyscore (category American secret government programs)
    Bundesnachrichtendienst. In July 2013, Edward Snowden publicly revealed the program's purpose and use by the NSA in The Sydney Morning Herald and O Globo newspapers...
    34 KB (3,463 words) - 07:17, 8 June 2025
  • Thumbnail for Edward Snowden
    secret program". The Washington Post. Retrieved May 13, 2024. Levy, Steven (January 7, 2014). "How the NSA Almost Killed the Internet | Threat Level"...
    260 KB (25,117 words) - 02:44, 11 June 2025
  • Thumbnail for PRISM
    discussed the Business Insider article about the possible involvement of technologies from two secretive Israeli companies in the PRISM program—Verint Systems...
    187 KB (17,256 words) - 20:06, 9 June 2025
  • Thumbnail for Bullrun (decryption program)
    Bullrun (stylized BULLRUN) is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United...
    17 KB (1,769 words) - 16:09, 1 October 2024
  • Thumbnail for Total Information Awareness
    Total Information Awareness (TIA) was a mass detection program[clarification needed] by the United States Information Awareness Office. It operated under...
    43 KB (4,453 words) - 17:29, 2 May 2025
  • Insider Threat, or CINDER, is a digital threat method. In 2010, DARPA initiated a program under the same name (Cyber Insider Threat (CINDER) Program)...
    10 KB (1,099 words) - 21:07, 20 February 2025
  • Thumbnail for Tailored Access Operations
    responsible for how the NSA uses this advance information. Advanced persistent threat Cyberwarfare in the United States Equation Group Magic Lantern (software)...
    31 KB (2,596 words) - 14:22, 26 May 2025
  • Thumbnail for Stellar Wind
    surveillance program begun under the George W. Bush administration's President's Surveillance Program (PSP). The National Security Agency (NSA) program was approved...
    11 KB (1,179 words) - 20:26, 16 March 2025
  • Thumbnail for MARINA
    (2013-06-15). "Washington Post Provides New History of NSA Surveillance Programs". Mother Jones. Archived from the original on 2014-02-26. Retrieved 2014-03-23...
    2 KB (215 words) - 18:42, 26 May 2025
  • Thumbnail for Thomas A. Drake
    technical documents for the Bush administration's warrantless surveillance program, typing the documents on a Tempest-shielded computer across from his desk...
    49 KB (5,232 words) - 01:18, 9 June 2025
  • Thumbnail for Project MINARET
    which disclosed the program. Britain's intelligence agency Government Communications Headquarters (GCHQ) took part in the program, targeting several anti-Vietnam...
    8 KB (822 words) - 00:02, 26 May 2025
  • Thumbnail for Fairview (surveillance program)
    FAIRVIEW is a secret program under which the National Security Agency cooperates with the American telecommunications company AT&T in order to collect...
    11 KB (927 words) - 02:04, 19 February 2025
  • Thumbnail for MYSTIC
    a National Security Agency (NSA) program between 2009 and 2014 that collected metadata and telephony. The program's existence was revealed in March 2014...
    6 KB (631 words) - 17:53, 5 January 2025
  • Thumbnail for FISA of 1978 Amendments Act of 2008
    Surveillance Act. It has been used as the legal basis for surveillance programs disclosed by Edward Snowden in 2013, including PRISM. Warrantless wiretapping...
    28 KB (2,699 words) - 01:38, 2 February 2025
  • server and backbone monitoring, many of the programs overlapped and interrelated with one another. These programs were often carried out with the assistance...
    121 KB (11,345 words) - 07:55, 23 May 2025
  • Thumbnail for Main Core
    American government database containing information on those believed to be threats to national security. The existence of the database was first asserted...
    4 KB (317 words) - 23:15, 12 April 2025
  • and monitor threats or any suspicious or abnormal activity, and prevent and investigate criminal activities. With the advent of programs such as the Total...
    46 KB (5,098 words) - 17:25, 28 May 2025
  • to Booz Allen Hamilton. As an "infrastructure analyst" at the National Threat Operations Center, he monitored internet communication. In his own words...
    44 KB (3,750 words) - 01:19, 13 May 2025
  • Thumbnail for Terrorist Surveillance Program
    The Terrorist Surveillance Program was an electronic surveillance program implemented by the National Security Agency (NSA) of the United States in the...
    36 KB (3,996 words) - 20:19, 9 June 2025
  • Thumbnail for MAINWAY
    bill. He promised to "carefully monitor" the program for abuse, but said that, "Given the legitimate threats we face, providing effective intelligence collection...
    58 KB (5,987 words) - 05:02, 13 May 2025
  • Thumbnail for ThinThread
    and would have automatically identified potential threats. The sources of the data for this program would have included "massive phone and e-mail data...
    13 KB (1,479 words) - 01:10, 3 December 2024
  • Thumbnail for National Security Agency
    2014-02-09 at the Wayback Machine, Threat Level, Wired.com Mick, Jason (July 8, 2010). "DailyTech – NSA's "Perfect Citizen" Program: Big Brother or Cybersecurity...
    260 KB (24,829 words) - 20:14, 12 June 2025
  • Thumbnail for 2010s global surveillance disclosures
    However, Süddeutsche Zeitung and NDR claim to have confirmation from NSA insiders that the surveillance authorisation pertains not to the individual, but...
    295 KB (27,129 words) - 18:55, 9 June 2025
  • Thumbnail for Verizon
    Verizon deal, the husk of Yahoo will rename itself 'Altaba'". Business Insider. Archived from the original on January 10, 2017. Retrieved January 9, 2017...
    126 KB (10,534 words) - 21:53, 10 June 2025
  • Thumbnail for President's Surveillance Program
    requested information from the program and used this information in its intelligence analyses. The CIA also initially prepared threat assessment memoranda that...
    54 KB (7,314 words) - 01:11, 9 June 2025
  • Thumbnail for Mass surveillance
    project are: Trial of intelligent analysis of video and audio data for threat detection in urban environments, Creation of tools and technology for privacy...
    111 KB (12,314 words) - 02:45, 11 June 2025