Browse Wiki & Semantic Web

Jump to: navigation, search
Http://dbpedia.org/resource/Tailored Access Operations
  This page has no properties.
hide properties that link here 
  No properties link to this page.
 
http://dbpedia.org/resource/Tailored_Access_Operations
http://dbpedia.org/ontology/abbreviation TAO
http://dbpedia.org/ontology/abstract The Office of Tailored Access Operations (The Office of Tailored Access Operations (TAO), now Computer Network Operations, and structured as S32, is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA). It has been active since at least 1998, possibly 1997, but was not named or structured as TAO until "the last days of 2000," according to General Michael Hayden. TAO identifies, monitors, infiltrates, and gathers intelligence on computer systems being used by entities foreign to the United States. by entities foreign to the United States. , Operações de acesso adaptado (TAO) NSA é aOperações de acesso adaptado (TAO) NSA é a divisão de coleta de inteligência para Ciberguerra da agência americana NSA, em funcionamento desde 1998 ao menos. TAO identifica, monitora, infiltra, e reúne informações sobre sistemas de computadores sendo usado por entidades fora dos Estados Unidos. Segundo Bruce Schneier esta é a divisão da NSA que deveria estar sob o comando do Departamento americano de Ciberguerra, o US Cyber Command uma vez que desenvolve e possui capacidades de guerra cibernética por ataque direto aos sistemas de redes, como mostram os equipamentos usados pelo pessoal da divisão revelados através da publicação parcial do Catálogo ANT (NSA) pelo Der Spiegel em 30 de dezembro de 2013. O Catálogo ANT (NSA) foi publicado na íntegra pela LeakSource. O pesquisador de segurança Jacob Appelbaum fez uma palestra em 31 de dezembro de 2013, no Congresso de Comunicação Chaos em Hamburgo, Alemanha, com base nos documentos revelados por Edward Snowden, na qual detalhou as funções de alguns dos dispositivos utilizados pela NSA nos seus programas de vigilância global e em massa, militarizando a Internet.obal e em massa, militarizando a Internet. , Le bureau des Tailored Access Operations (Le bureau des Tailored Access Operations (français : Opérations d'accès sur mesure) (TAO) est un service de la National Security Agency (NSA), une agence de renseignement des États-Unis. Active depuis 1997, cette équipe identifie, surveille, infiltre et recueille des renseignements sur les systèmes informatiques utilisés par des entités étrangères aux États-Unis.par des entités étrangères aux États-Unis. , 特定入侵行動辦公室(英語:Office of Tailored Access Operations,缩写TAO)也译作获取特定情报行动办公室,是美国国家安全局的部門之一,約在1998年設立,主要工作是识别、监视、渗透和收集其他国家的電腦系统中的情报。 该机构现名“Computer Network Operations”(计算机网络运作),是NSA的网络战情报搜集单位。 , La Oficina de Tailored Access Operations (La Oficina de Tailored Access Operations (español: Acceso a Operaciones a la medida o TAO por sus siglas en inglés) es un centro de recopilación de información, relacionada con la ciberguerra, de la Agencia de Seguridad Nacional (NSA por sus siglas en inglés). Ha estado en funcionamiento aproximadamente desde el año 1998.​​ La TAO identifica, vigila, infiltra y reúne información de los sistemas informáticos utilizados por entidades extranjeras a los Estados Unidos.​​​​ En la actualidad, la TAO es "el componente más grande y más importante de la Signals Intelligence Directorate (en español, Dirección de Inteligencia de Señales o SID por sus siglas en inglés)​ de la NSA (SIGINT), que cuenta con más de 1.000 piratas informáticos, militares y civiles, analistas de inteligencia, ingenieros eléctricos, especialistas en selección de objetivos y diseñadores de hardware y software. Un documento filtrado por Edward Snowden, un exempleado de la NSA, describe el trabajo del centro de la siguiente manera "la TAO cuenta con plantillas de software que le permite infiltrarse en hardware de uso común, incluyendo routers, conmutadores y cortafuegos de múltiples proveedores".​ Según The Washington Post, los ingenieros de la TAO prefieren intervenir redes en lugar de ordenadores aislados, ya que normalmente hay muchos dispositivos conectados a una única red. Actualmente el centro se llama Computer Network Operations (español: Red de Operaciones Informáticas).​spañol: Red de Operaciones Informáticas).​
http://dbpedia.org/ontology/headquarter http://dbpedia.org/resource/Fort_Meade +
http://dbpedia.org/ontology/language http://dbpedia.org/resource/English_language +
http://dbpedia.org/ontology/leaderFunction http://dbpedia.org/resource/Tailored_Access_Operations__PersonFunction__1 +
http://dbpedia.org/ontology/purpose Cyberespionage,cyberwarfare
http://dbpedia.org/ontology/regionServed http://dbpedia.org/resource/United_States +
http://dbpedia.org/ontology/thumbnail http://commons.wikimedia.org/wiki/Special:FilePath/Tailored_Access_Operations_logo.png?width=300 +
http://dbpedia.org/ontology/type http://dbpedia.org/resource/Advanced_persistent_threat +
http://dbpedia.org/ontology/wikiPageExternalLink http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-3.html + , https://www.theguardian.com/world/2013/dec/29/der-spiegel-nsa-hacking-unit-tao + , https://www.wired.com/threatlevel/2013/09/nsa-router-hacking/ + , https://theintercept.com/snowden-sidtoday/5987439-getting-the-ungettable-intelligence-an-interview/ + , https://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html + , http://williamaarkin.wordpress.com/2013/09/03/nsa-tailored-access-operations/ +
http://dbpedia.org/ontology/wikiPageID 39477018
http://dbpedia.org/ontology/wikiPageLength 27279
http://dbpedia.org/ontology/wikiPageRevisionID 1113314140
http://dbpedia.org/ontology/wikiPageWikiLink http://dbpedia.org/resource/OPEC + , http://dbpedia.org/resource/Category:Cyberwarfare_in_Iran + , http://dbpedia.org/resource/USS_Jimmy_Carter + , http://dbpedia.org/resource/MUSCULAR_%28surveillance_program%29 + , http://dbpedia.org/resource/Zero-day_attack + , http://dbpedia.org/resource/Hotmail + , http://dbpedia.org/resource/Government_Communications_Headquarters + , http://dbpedia.org/resource/Hamburg + , http://dbpedia.org/resource/Cyber-warfare + , http://dbpedia.org/resource/Category:National_Security_Agency + , http://dbpedia.org/resource/Hi5 + , http://dbpedia.org/resource/Race_condition + , http://dbpedia.org/resource/Georgia_Cryptologic_Center + , http://dbpedia.org/resource/Hawaii_Cryptologic_Center + , http://dbpedia.org/resource/Gmail + , http://dbpedia.org/resource/Stuxnet + , http://dbpedia.org/resource/Chaos_Communication_Congress + , http://dbpedia.org/resource/National_Defence_Radio_Establishment_%28Sweden%29 + , http://dbpedia.org/resource/Tor_%28anonymity_network%29 + , http://dbpedia.org/resource/Doubleclick + , http://dbpedia.org/resource/Rocketmail + , http://dbpedia.org/resource/Internet_backbone + , http://dbpedia.org/resource/WARRIOR_PRIDE + , http://dbpedia.org/resource/Zero-day_%28computing%29 + , http://dbpedia.org/resource/Man-in-the-middle_attack + , http://dbpedia.org/resource/Dell + , http://dbpedia.org/resource/Colorado_Cryptologic_Center + , http://dbpedia.org/resource/Twitter + , http://dbpedia.org/resource/Category:Cyberwarfare_in_the_United_States + , http://dbpedia.org/resource/Michael_Hayden_%28general%29 + , http://dbpedia.org/resource/Northwestern_Polytechnical_University + , http://dbpedia.org/resource/Tencent_QQ + , http://dbpedia.org/resource/Germany + , http://dbpedia.org/resource/Syniverse + , http://dbpedia.org/resource/HTTP + , http://dbpedia.org/resource/Yahoo + , http://dbpedia.org/resource/NSA_ANT_catalog + , http://dbpedia.org/resource/Submarine_communications_cable + , http://dbpedia.org/resource/GPRS_roaming_exchange + , http://dbpedia.org/resource/CIA + , http://dbpedia.org/resource/Access_Technologies_Operations_Branch + , http://dbpedia.org/resource/Chaos_Communications_Congress + , http://dbpedia.org/resource/File:QUANTUMSQUIRREL.jpg + , http://dbpedia.org/resource/Secretariat_of_Public_Security_%28Mexico%29 + , http://dbpedia.org/resource/United_States + , http://dbpedia.org/resource/English_language + , http://dbpedia.org/resource/Mail.Ru + , http://dbpedia.org/resource/VMware_ESX + , http://dbpedia.org/resource/Category:Computer_surveillance + , http://dbpedia.org/resource/Rob_Joyce + , http://dbpedia.org/resource/LinkedIn + , http://dbpedia.org/resource/Belgacom + , http://dbpedia.org/resource/European_Council + , http://dbpedia.org/resource/Fort_Meade + , http://dbpedia.org/resource/Spyware + , http://dbpedia.org/resource/China + , http://dbpedia.org/resource/Fort_Gordon%2C_Georgia + , http://dbpedia.org/resource/Classified_information + , http://dbpedia.org/resource/PLA_Unit_61398 + , http://dbpedia.org/resource/Fort_Meade%2C_Maryland + , http://dbpedia.org/resource/XKeyscore + , http://dbpedia.org/resource/Advanced_persistent_threat + , http://dbpedia.org/resource/Cyberwarfare + , http://dbpedia.org/resource/Edward_Snowden + , http://dbpedia.org/resource/Tor_%28network%29 + , http://dbpedia.org/resource/National_Security_Agency + , http://dbpedia.org/resource/MiniPanzer_and_MegaPanzer + , http://dbpedia.org/resource/YouTube + , http://dbpedia.org/resource/Alibaba_Group + , http://dbpedia.org/resource/Category:Cybercrime_in_India + , http://dbpedia.org/resource/Cyberespionage + , http://dbpedia.org/resource/Five_Eyes + , http://dbpedia.org/resource/Verizon + , http://dbpedia.org/resource/Foreign_Policy + , http://dbpedia.org/resource/Magic_Lantern_%28software%29 + , http://dbpedia.org/resource/Joint_Base_San_Antonio + , http://dbpedia.org/resource/Web_browser + , http://dbpedia.org/resource/SEA-ME-WE_4 + , http://dbpedia.org/resource/Facebook + , http://dbpedia.org/resource/MSN + , http://dbpedia.org/resource/Special_Collection_Sites + , http://dbpedia.org/resource/Simbar + , http://dbpedia.org/resource/Firefox + , http://dbpedia.org/resource/Telecommunications_Network_Technologies_Branch + , http://dbpedia.org/resource/Data_Network_Technologies_Branch + , http://dbpedia.org/resource/Texas_Cryptologic_Center + , http://dbpedia.org/resource/Information_Assurance_Directorate + , http://dbpedia.org/resource/Category:American_advanced_persistent_threat_groups + , http://dbpedia.org/resource/Spear-phishing + , http://dbpedia.org/resource/Syrian_Electronic_Army + , http://dbpedia.org/resource/Comfone + , http://dbpedia.org/resource/File:NSA_QUANTUMTHEORY.jpg + , http://dbpedia.org/resource/European_Parliament + , http://dbpedia.org/resource/File:NSA_quantum_cat.jpg + , http://dbpedia.org/resource/File:XKeyscore_presentation_from_2008.pdf + , http://dbpedia.org/resource/MyNOC + , http://dbpedia.org/resource/Virtual_machine + , http://dbpedia.org/resource/Equation_Group + , http://dbpedia.org/resource/Sprint_Corporation + , http://dbpedia.org/resource/Wahiawa + , http://dbpedia.org/resource/Der_Spiegel + , http://dbpedia.org/resource/Man-on-the-side_attack + , http://dbpedia.org/resource/Router_%28computing%29 + , http://dbpedia.org/resource/AT&T + , http://dbpedia.org/resource/Buckley_Space_Force_Base + , http://dbpedia.org/resource/Cisco + , http://dbpedia.org/resource/Windows_Error_Reporting + , http://dbpedia.org/resource/Jacob_Appelbaum + , http://dbpedia.org/resource/European_Commission + , http://dbpedia.org/resource/Microsoft + , http://dbpedia.org/resource/Cyberwarfare_in_the_United_States + , http://dbpedia.org/resource/Category:Hacker_groups + , http://dbpedia.org/resource/FBI +
http://dbpedia.org/property/abbreviation TAO
http://dbpedia.org/property/formation 1997
http://dbpedia.org/property/headquarters http://dbpedia.org/resource/Fort_Meade +
http://dbpedia.org/property/language http://dbpedia.org/resource/English_language +
http://dbpedia.org/property/leaderName http://dbpedia.org/resource/Rob_Joyce +
http://dbpedia.org/property/logo File:Tailored Access Operations logo.png
http://dbpedia.org/property/logoSize 165
http://dbpedia.org/property/methods Zero-days, spyware
http://dbpedia.org/property/name Tailored Access Operations
http://dbpedia.org/property/parentOrganization S3 Data Acquisition
http://dbpedia.org/property/purpose http://dbpedia.org/resource/Cyberwarfare + , http://dbpedia.org/resource/Cyberespionage +
http://dbpedia.org/property/region http://dbpedia.org/resource/United_States +
http://dbpedia.org/property/role Cyberwarfare Intelligence Gathering
http://dbpedia.org/property/type http://dbpedia.org/resource/Advanced_persistent_threat +
http://dbpedia.org/property/wikiPageUsesTemplate http://dbpedia.org/resource/Template:Infobox_organization + , http://dbpedia.org/resource/Template:Ref + , http://dbpedia.org/resource/Template:Reflist + , http://dbpedia.org/resource/Template:Main + , http://dbpedia.org/resource/Template:Circa + , http://dbpedia.org/resource/Template:NSA_surveillance + , http://dbpedia.org/resource/Template:Short_description + , http://dbpedia.org/resource/Template:Sic + , http://dbpedia.org/resource/Template:Div_col + , http://dbpedia.org/resource/Template:Div_col_end + , http://dbpedia.org/resource/Template:National_Security_Agency + , http://dbpedia.org/resource/Template:See_also +
http://purl.org/dc/terms/subject http://dbpedia.org/resource/Category:Cybercrime_in_India + , http://dbpedia.org/resource/Category:Computer_surveillance + , http://dbpedia.org/resource/Category:Hacker_groups + , http://dbpedia.org/resource/Category:American_advanced_persistent_threat_groups + , http://dbpedia.org/resource/Category:Cyberwarfare_in_Iran + , http://dbpedia.org/resource/Category:National_Security_Agency + , http://dbpedia.org/resource/Category:Cyberwarfare_in_the_United_States +
http://purl.org/linguistics/gold/hypernym http://dbpedia.org/resource/Unit +
http://www.w3.org/ns/prov#wasDerivedFrom http://en.wikipedia.org/wiki/Tailored_Access_Operations?oldid=1113314140&ns=0 +
http://xmlns.com/foaf/0.1/depiction http://commons.wikimedia.org/wiki/Special:FilePath/NSA_QUANTUMTHEORY.jpg + , http://commons.wikimedia.org/wiki/Special:FilePath/NSA_quantum_cat.jpg + , http://commons.wikimedia.org/wiki/Special:FilePath/Tailored_Access_Operations_logo.png + , http://commons.wikimedia.org/wiki/Special:FilePath/QUANTUMSQUIRREL.jpg +
http://xmlns.com/foaf/0.1/isPrimaryTopicOf http://en.wikipedia.org/wiki/Tailored_Access_Operations +
http://xmlns.com/foaf/0.1/name Tailored Access Operations
owl:sameAs http://rdf.freebase.com/ns/m.0vpq29q + , http://dbpedia.org/resource/Tailored_Access_Operations + , http://fa.dbpedia.org/resource/%D8%B9%D9%85%D9%84%DB%8C%D8%A7%D8%AA_%D8%AF%D8%B3%D8%AA%D8%B1%D8%B3%DB%8C_%D8%AF%D8%B1%D8%AE%D9%88%D8%B1 + , http://es.dbpedia.org/resource/Tailored_Access_Operations + , http://pt.dbpedia.org/resource/Tailored_Access_Operations + , https://global.dbpedia.org/id/MDvv + , http://fr.dbpedia.org/resource/Tailored_Access_Operations + , http://zh.dbpedia.org/resource/%E7%89%B9%E5%AE%9A%E5%85%A5%E4%BE%B5%E8%A1%8C%E5%8B%95%E8%BE%A6%E5%85%AC%E5%AE%A4 + , http://www.wikidata.org/entity/Q13442819 + , http://hu.dbpedia.org/resource/Tailored_Access_Operations +
rdf:type http://www.wikidata.org/entity/Q24229398 + , http://www.wikidata.org/entity/Q43229 + , http://dbpedia.org/ontology/Organisation + , http://schema.org/Organization + , http://www.ontologydesignpatterns.org/ont/dul/DUL.owl#SocialPerson + , http://www.ontologydesignpatterns.org/ont/dul/DUL.owl#Agent + , http://dbpedia.org/ontology/Agent +
rdfs:comment The Office of Tailored Access Operations (The Office of Tailored Access Operations (TAO), now Computer Network Operations, and structured as S32, is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA). It has been active since at least 1998, possibly 1997, but was not named or structured as TAO until "the last days of 2000," according to General Michael Hayden. TAO identifies, monitors, infiltrates, and gathers intelligence on computer systems being used by entities foreign to the United States. by entities foreign to the United States. , La Oficina de Tailored Access Operations (La Oficina de Tailored Access Operations (español: Acceso a Operaciones a la medida o TAO por sus siglas en inglés) es un centro de recopilación de información, relacionada con la ciberguerra, de la Agencia de Seguridad Nacional (NSA por sus siglas en inglés). Ha estado en funcionamiento aproximadamente desde el año 1998.​​ La TAO identifica, vigila, infiltra y reúne información de los sistemas informáticos utilizados por entidades extranjeras a los Estados Unidos.​​​​ Actualmente el centro se llama Computer Network Operations (español: Red de Operaciones Informáticas).​spañol: Red de Operaciones Informáticas).​ , 特定入侵行動辦公室(英語:Office of Tailored Access Operations,缩写TAO)也译作获取特定情报行动办公室,是美国国家安全局的部門之一,約在1998年設立,主要工作是识别、监视、渗透和收集其他国家的電腦系统中的情报。 该机构现名“Computer Network Operations”(计算机网络运作),是NSA的网络战情报搜集单位。 , Le bureau des Tailored Access Operations (Le bureau des Tailored Access Operations (français : Opérations d'accès sur mesure) (TAO) est un service de la National Security Agency (NSA), une agence de renseignement des États-Unis. Active depuis 1997, cette équipe identifie, surveille, infiltre et recueille des renseignements sur les systèmes informatiques utilisés par des entités étrangères aux États-Unis.par des entités étrangères aux États-Unis. , Operações de acesso adaptado (TAO) NSA é aOperações de acesso adaptado (TAO) NSA é a divisão de coleta de inteligência para Ciberguerra da agência americana NSA, em funcionamento desde 1998 ao menos. TAO identifica, monitora, infiltra, e reúne informações sobre sistemas de computadores sendo usado por entidades fora dos Estados Unidos.ado por entidades fora dos Estados Unidos.
rdfs:label Tailored Access Operations , 特定入侵行動辦公室
rdfs:seeAlso http://dbpedia.org/resource/Signals_intelligence +
hide properties that link here 
http://dbpedia.org/resource/Equation_Group + http://dbpedia.org/ontology/parentOrganisation
http://dbpedia.org/resource/Tao_%28disambiguation%29 + http://dbpedia.org/ontology/wikiPageDisambiguates
http://dbpedia.org/resource/FOXACID + , http://dbpedia.org/resource/Remote_Operations_Center + , http://dbpedia.org/resource/Office_of_Tailored_Access_Operations + , http://dbpedia.org/resource/QUANTUM + , http://dbpedia.org/resource/QUANTUMINSERT + http://dbpedia.org/ontology/wikiPageRedirects
http://dbpedia.org/resource/Special_Source_Operations + , http://dbpedia.org/resource/Special_Collection_Service + , http://dbpedia.org/resource/Equation_Group + , http://dbpedia.org/resource/Crash_reporter + , http://dbpedia.org/resource/Man-on-the-side_attack + , http://dbpedia.org/resource/Edward_Snowden + , http://dbpedia.org/resource/XKeyscore + , http://dbpedia.org/resource/Stuxnet + , http://dbpedia.org/resource/Cyberwarfare + , http://dbpedia.org/resource/Interdiction + , http://dbpedia.org/resource/List_of_government_mass_surveillance_projects + , http://dbpedia.org/resource/Global_surveillance_disclosures_%282013%E2%80%93present%29 + , http://dbpedia.org/resource/Computer_and_Internet_Protocol_Address_Verifier + , http://dbpedia.org/resource/Harold_T._Martin + , http://dbpedia.org/resource/Vulnerabilities_Equities_Process + , http://dbpedia.org/resource/Rob_Joyce + , http://dbpedia.org/resource/Operation_Shady_RAT + , http://dbpedia.org/resource/The_Blacklist_%28season_1%29 + , http://dbpedia.org/resource/FOXACID + , http://dbpedia.org/resource/Cybersecurity_information_technology_list + , http://dbpedia.org/resource/Timeline_of_global_surveillance_disclosures_%282013%E2%80%93present%29 + , http://dbpedia.org/resource/The_Shadow_Brokers + , http://dbpedia.org/resource/Trojan_horse_%28computing%29 + , http://dbpedia.org/resource/Hardware_backdoor + , http://dbpedia.org/resource/PLA_Unit_61398 + , http://dbpedia.org/resource/Remote_Operations_Center + , http://dbpedia.org/resource/ANT_catalog + , http://dbpedia.org/resource/Turbulence_%28NSA%29 + , http://dbpedia.org/resource/Jen_Easterly + , http://dbpedia.org/resource/National_Security_Agency + , http://dbpedia.org/resource/Cisco + , http://dbpedia.org/resource/Computer_and_network_surveillance + , http://dbpedia.org/resource/Great_Cannon + , http://dbpedia.org/resource/WARRIOR_PRIDE + , http://dbpedia.org/resource/Bullrun_%28decryption_program%29 + , http://dbpedia.org/resource/FinFisher + , http://dbpedia.org/resource/Tr%C3%A9sor_public + , http://dbpedia.org/resource/Advanced_persistent_threat + , http://dbpedia.org/resource/Cyber-collection + , http://dbpedia.org/resource/Matt_Suiche + , http://dbpedia.org/resource/Global_surveillance_by_category + , http://dbpedia.org/resource/DigiNotar + , http://dbpedia.org/resource/Windows_Error_Reporting + , http://dbpedia.org/resource/Syrian_Electronic_Army + , http://dbpedia.org/resource/Office_of_Tailored_Access_Operations + , http://dbpedia.org/resource/Bureau_121 + , http://dbpedia.org/resource/Tao_%28disambiguation%29 + , http://dbpedia.org/resource/QUANTUM + , http://dbpedia.org/resource/QUANTUMINSERT + , http://dbpedia.org/resource/Quantum_insert + http://dbpedia.org/ontology/wikiPageWikiLink
http://en.wikipedia.org/wiki/Tailored_Access_Operations + http://xmlns.com/foaf/0.1/primaryTopic
http://dbpedia.org/resource/Tailored_Access_Operations + owl:sameAs
 

 

Enter the name of the page to start semantic browsing from.