To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Special Source Operations

From Wikipedia, the free encyclopedia

Special Source Operations (SSO) is a division in the US National Security Agency (NSA)[1] which is responsible for all programs aimed at collecting data from major fiber-optic cables and switches, both inside the US and abroad, and also through corporate partnerships.[2] Its existence was revealed through documents provided by Edward Snowden to media outlets in 2013 and, according to him, it is the "crown jewel" of the NSA.[3]

YouTube Encyclopedic

  • 1/3
    Views:
    29 882
    146 238
    91 064
  • Counter-Intelligence Special Operations (1969)
  • US ARMY SPECIAL FORCES - Inside the Green Berets - Rare Film | SPECIAL OPERATIONS FORCES
  • A look at the U.S. Army Special Forces Underwater Operations School

Transcription

History

The program began in 2006, according to one of Snowden's documents, when the NSA was collecting the equivalent of "one Library of Congress every 14.4 seconds". The Washington Post described the official seal of the SSO division as something "that might have been parody: an eagle with all the world's cables in its grasp."[4]

Notable programs

The five biggest collection programs of the Special Source Operations division are codenamed:[5]

  • DANCINGOASIS
  • SPINNERET
  • MOONLIGHTPATH
  • INCENSER
  • AZUREPHOENIX

Other known programs include:

See also

References

  1. ^ Greenwald, Glenn; MacAskill, Ewen; Poitras, Laura; Ackerman, Spencer; Rushe, Dominic (July 11, 2013). "How Microsoft handed the NSA access to encrypted messages". The Guardian. Retrieved July 12, 2013.
  2. ^ Gellman, Barton; Poitras, Laura (June 6, 2013). "US Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program". The Washington Post. Retrieved July 12, 2013.
  3. ^ Greenwald, Glenn (2014). No Place to Hide. New York: Metropolitan Books. p. 102. ISBN 978-1-62779-161-8.
  4. ^ "Edward Snowden, after months of NSA revelations, says his mission's accomplished" – The Washington Post, December 23, 2013.
  5. ^ Top Level Telecommunications, Some numbers about NSA's data collection, June 5, 2014

External links

This page was last edited on 12 April 2024, at 16:25
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.