You are hereBlogs / dlindorff's blog / Gangsters, warriors, thugs TAO is the NSA's Band of Technology Criminals

Gangsters, warriors, thugs TAO is the NSA's Band of Technology Criminals


By dlindorff - Posted on 10 January 2014

By Alfredo Lopez


On this website, we've speculated that one outcome of the flood of NSA-centered revelations has been to desensitize U.S. citizens and diminish outrage at what is actually revealed. We are becoming conditioned to the horror story that is the National Security Administration.

Right before Christmas, we got another dose of breath-taking outrageousness through the reporting of a group of journalists courtesy of the German weekly news magazine Der Spiegel . The report profiles the work of a powerful unit of technological thugs called the Tailored Access Operations unit or TAO -- either an unfortunate coincidence in naming or a reflection of disdain for another culture.

By the NSA's own admission, this is among its most important programs and one of its fastest growing. Its existence has already been reported on by the Washington Post  based on Edward Snowden information. These Spiegel articles add disturbing details to the picture.

The unit, founded in 1997 and now comprised of an estimated 1,000 technologists and support staff in a half dozen offices nationwide, attacks highly selective and well-protected targets. It steals data, conducts on-line denial of service and other attacks against computers and servers in other countries (including government servers and websites), sneaks into offices and other locations to break open and tamper with computers, and intercepts shipments of equipment to break into those and insert modifications that will allow NSA data capture.

Yet, as frightening as this activity is, perhaps TAO's greatest attack is on the Internet itself. It has turned a technology that was designed to enable communication among the world's people into an implement of war and sabotage. In fact, one TAO paper explains the need to "support Computer Network Attacks as an integrated part of military operations."

In the NSA's on-line war effort, this is its shock troop, housed separately from all other NSA staff and drawn from the NSA's elite programmers and hackers. "Their job is breaking into, manipulating and exploiting computer networks, making them hackers and civil servants in one," the Spiegel report explains. And their assignments are usually to go after those "targets" that have proven most resistant to the NSA's normal spying and data-capture methods.

Snowden documents demonstrate how wide and pervasive this unit's work has become. According to Bloomberg Businessweek, TAO operations intercept and collect about two petabytes of data every hour -- for reference, a petabyte is a quadrillion bytes of data (the article you're reading contains about 12,000 bytes).

That almost unfathomable amount of spy information reflects a frenzied level of operation. "During the middle part of the last decade," the Spiegel report explains, "the special unit succeeded in gaining access to 258 targets in 89 countries -- nearly everywhere in the world. In 2010, it conducted 279 operations worldwide."...


For the rest of this article by ALFREDO LOPEZ in ThisCantBeHappening!, the new uncompromising four-time Project Censored Award-winning online alternative newspaper, please go to: www.thiscantbehappening.net/nsatao

Support WarIsACrime



Donate.








Tweet your Congress critters here.


Advertise on this site!




Facebook      Twitter





Our Store:



















Movie Memorabilia.



The log-in box below is only for bloggers. Nobody else will be able to log in because we have not figured out how to stop voluminous spam ruining the site. If you would like us to have the resources to figure that out please donate. If you would like to receive occasional emails please sign up. If you would like to be a blogger here please send your resume.
CAPTCHA
This question is for testing whether you are a human visitor and to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.