TURBINE (US government project)
Misawa, Japan (Misawa Air Base) and Menwith Hill, England (RAF Menwith Hill). Codenamed as TURMOIL, the sensors operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or "tips" to TURBINE, enabling the initiation of a malware attack. To identify surveillance targets, the NSA uses a series of data "selectors" as they flow across Internet cables. These selectors can include email addresses, IP addresses, or the unique "cookies" containing a username or other identifying information.[1][2][3][4][5][6][7][8][9][10][11][12][13]
See also
- Global surveillance disclosures (2013–present)
- PRISM (surveillance program)
- Law Enforcement Information Exchange
References
- ^ "Thousands of Implants". The Intercept. March 12, 2014. Retrieved March 12, 2014.
- ^ "Industrial-Scale Exploitation". The Intercept. March 12, 2014. Retrieved March 12, 2014.
- ^ "NSA Technology Directorate Analysis of Converged Data". The Intercept. March 12, 2014. Retrieved March 12, 2014.
- ^ "There Is More Than One Way to Quantum". The Intercept. March 12, 2014. Retrieved March 12, 2014.
- ^ "NSA Phishing Tactics and Man in the Middle Attacks". The Intercept. March 12, 2014. Retrieved March 12, 2014.
- ^ "Quantum Insert Diagrams". The Intercept. March 12, 2014. Retrieved March 12, 2014.
- ^ "TURBINE and TURMOIL". The Intercept. March 12, 2014. Retrieved March 12, 2014.
- ^ "The NSA and GCHQ's QUANTUMTHEORY Hacking Tactics". The Intercept. March 12, 2014. Retrieved March 12, 2014.
- ^ "Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail". The Intercept. March 12, 2014. Retrieved March 12, 2014.
- ^ "Five Eyes Hacking Large Routers". The Intercept. March 12, 2014. Retrieved March 12, 2014.
- ^ "Selector Types". The Intercept. March 12, 2012. Retrieved March 12, 2014.
- ^ "VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN". The Intercept. March 12, 2014. Retrieved March 12, 2014.
- ^ "Thousands of Implants". The Intercept. March 12, 2014. Retrieved March 13, 2014.
- Counter-terrorism in the United States
- Crime in the United States
- Espionage
- Human rights in the United States
- Mass surveillance
- National Security Agency
- Privacy in the United States
- Privacy of telecommunications
- Secret government programs
- Surveillance scandals
- United States national security policy
- War on Terror
- Computer surveillance
- American secret government programs
- United States government stubs