Nestled in the vast complex of the U.S. National Security Agency, with a few units are not known. It has breached the data network of U.S. rivals for 15 years now, does not exclude China.
This unit is called the Office of Special campaigns (TAO). It
has successfully penetrated the computer systems and communications
around the world, gather intelligence information truest and most
precious of what is happening inside the country as well as
organizations or that individuals identified as targets.
Located
in the secluded large complexes of NSA at Fort Meade, Maryland, in
separate suites with the rest of the NSA, even TAO mystery even to many
NSA employees. Few officials NSA access complete information for TAO by unusual susceptibility of its activities. Each person must have the permission of the particular security can access the locations of TAO.
The door to the center of the art operating unit is protected by armed guards. A
solid metal door can only enter by passing through 6 key figure in the
table, and distribution of retinal disk, ensure that only certain
individuals can through the door.
According to former NSA official, TAO task quite simple. It
collects intelligence from foreign targets by secretly hacking into the
computer system and their communication systems, decrypt password,
disable the security barrier system of the computer goal,
stealing the data stored on your computer's hard drive, then copy all
the data and information via the email and messaging system of the
target. The technical term that describes the NSA activities are computer network exploitation (CNE).
TAO
is also responsible for the development of information tools allow
America to destroy or damage the computer and communications systems of
other countries by attacking the network if the President ordered. Organizations
responsible for implementing a network attack such as U.S. Agency
Network Controller (CYBERCOM), headquartered at Fort Meade and the head
of the NSA Director Gen. Keith Alexander.
From
May 4/2013, the TAO operations under the command of Robert Joyce, a
former deputy director of the NSA's Information Assurance (responsible
for protecting computer systems and communications of the U.S.
Government). The
sources said, the TAO is the largest component and can be considered
the most important offices of the NSA signals intelligence (SIGINT),
gathered more than 1,000 military and civilian hackers, the analysts report, the experts identified goals, hardware designers and computer software and electronic engineers.
The
soul is the center of TAO ultramodern operation at Fort Meade, known as
Operation Center remote control (ROC), where about 600 military and
civilian hackers to work rotating 24-hour per day, 7 days a week.
These
people work during the night or morning to find computer systems and
communication support system that is used by, for example, terrorists
overseas move messages to accomplices them or those who support them.
When
these computers are identified and locate, the hacker will infiltrate
computer systems targeting electronically, using special software loads
the contents of the computer's hard drive, and software
installation or set transplants into other devices called "buggy"
within the operating system of the computer, allowing the staff of TAO
in Fort Meade continue to monitor email or a message on computer or handheld device.
Mỹ do thám Trung Quốc như thế nào?
Ấn mình trong
khu phức hợp mênh mông của Cơ quan An ninh Quốc gia Mỹ, có một đơn vị
không mấy ai biết đến. Nó đã chọc thủng mạng dữ liệu của các đối thủ của
Mỹ suốt 15 năm nay, không loại trừ Trung Quốc. > Trung Quốc giữ im lặng trước vụ "kẻ lộ bí mật"
> 'Tin tặc Trung Quốc trộm dữ liệu vũ khí Mỹ'
Trên tạp chí uy tín Foreign Policy tuần này, tác giả Matthew M. Aid tiết lộ cách thức mà chính phủ Mỹ sử dụng để lấy các thông tin tình báo và nhạy cảm của các nước và tổ chức khác suốt hơn một thập niên qua. Bài báo củng cố thêm lời tiết lộ của một cựu nhân viên nhà thầu của NSA rằng Mỹ đã đánh cắp dữ liệu của Trung Quốc - vấn đề đang gây đau đầu nhức óc cho Washington từ một tuần nay. Matthew M. Aid là tác giả cuốn "Chiến tranh thông tin: Lịch ssr bí mật của cuộc chiến chống khủng bố", và "Lịch sử bí mật của Cơ quan An ninh Quốc gia NSA". |
There is a separate unit within the branch called TAO digital communications networks (TNT), specializing in the development of techniques that allow the hacker underground TAO access to computer systems and networks contact target without being detected.
Meanwhile, the technical arm of TAO infrastructure (Infrastructure Technologies Mission Branch) is responsible for developing and building computer and communications systems to help monitor hardware and support infrastructure, ensuring that every effort was smooth.
TAO unit even collect intelligence secrets of his own called active branch access technologies (Access Technologies Operations Branch), including the CIA and FBI were recruited. They made what was described as "operating outside the system" (off-net operations), is a euphemism to conceal their arrangements for CIA agents secretly installed eavesdropping devices to the computer systems or communications equipment abroad, from which the TAO hacker can access remotely from their headquarters.
TAO is not designed to do things against targets in the United States or where the U.S. occupation. It is the responsibility of the FBI, U.S. intelligence agencies only qualified domestic surveillance contacts. But before the NSA information "intervention" wider, some people have concerns about the ability to collect data TAO intelligence overseas without access to the source information from the U.S. or transit through the United States or not?
Since its founding in 1997, TAO has obtained a reputation as the best intelligence the U.S. intelligence community, not only in China, but also to terrorist groups overseas operations Intelligence spy against the U.S. by foreign governments, ballistic missiles and weapons of mass destruction throughout the developing world, and the economic changes, political and military latest worldwide.
According to a former NSA official, in 2007, approximately 600 employees of TAO secretly infiltrate thousands of computer systems in foreign countries and access to computer hard drive with password and email of targets across bridge. As documented in the history of the NSA in 2009, guards a secret (The Secret Sentry), the program was highly classified security, known then as Stump-cursor, proved to be extremely important in the fight services of the U.S. military surge in Iraq in 2007, to help "identify and define" more than 100 locations of Iraqi insurgents and Al Qaeda in and around Baghdad in a very gentle way. That same year, the news source reports that TAO is awarded because of important intelligence about Iran trying to build atomic bombs or not.
At the time Obama became U.S. president to 1/2009, TAO has become something similar to the "miracle" - wunderkind of the U.S. intelligence community. "It's become an industry," said a former NSA officials of TAO. "They reach out to every corner, collecting things that no one else in the intelligence community can".
Because of the politically sensitive and highly specific nature of its work, should of course always and still afraid TAO publicly. Everything about TAO is classified top-secret encryption, even extreme secrecy even within the NSA. His name appeared in the newspaper a few times in the past decade, and only a few reporters dare ask about it, though very polite, but immediately received a stern warning of high intelligence officials American level that should not describe the work of this unit. According to a senior official in the defense of the United States, people familiar with the work of creation, "NSA agencies believe that the less people know about TAO as possible".
TAO continues to grow in size and importance since Obama took office in 2009, expressed its huge role. In recent years, the TAO collection activities are extended from Fort Meade to a listening position of the most important in the U.S. NSA.
The problem is that TAO has become very extensive and informative gathering valuable intelligence, becomes more difficult to conceal. The Chinese government certainly aware of the activities of the TAO. The official in charge of China's leading Internet, Huang Chengqing, said Beijing is "mountain of data" proving the United States has a large scale hacking program to steal the secret of the Chinese government. Clearly if China announced the "mountain of data", it is a threat to the U.S., so the U.S. President can have no more than forcing Chinese President Xi Jinping at a summit last week in California about the activities of Chinese cyber spies. Any one that all players know that he's only on his opponent will not know if you have any cards in hand.
0 comments:
Post a Comment