US Government Mass Surveillance Programs
Chinese Operations Against United States Targets
100
The role of the NSA is to protect government and information systems from the effects of network penetration and cyber warfare from occurring with a procedure called signals intelligence (SIGINT)
What is the role of National Security Agency in Cyber Warfare?
100
Advance Persistent Threat. process where group of hackers are focused on hacking specific source or network.
Define APT?
200
by concentrating their focus on different organizations and individuals whom may pose an attack.
How does the NSA justify mass surveillance programs?
200
1. a government server 2. can be used to steal information from any computer 3. can be used as a listening device
Name 3 capabilities of Ghost net.
300
the FBI and CIA agencies
What other agencies have been implicated in mass surveillance programs?
300
The goal of Chinese operations against United States targets is to continue hacking into private sectors and steal private information from US companies. However US president and Chinese president filed an agreement where both nation-states should refrain from cyber attacks.
What has been the Ultimate goal of Chinese operations against United States targets up to now?
400
due to the number of advancements in software and technology in present day.
Why do some groups object to mass surveillance programs?
400
a procedure that was used for China and the US to settle their differences in hacking wars. In the aftermath Titan Rain stole information that included unclassified information and caused distrust between countries.
What was the purpose and Aftermath of Titan Rain?
500
by being able to obtain vital information. mass surveillance has the feature of gathering all information on an attacker in order to track down their specific location.
How has the United States government benefited from mass surveillance?
500
target of OP Aurora was to be on major internet companies such as Yahoo, Dow, Adobe which Google was behind the scenes of operation. Aftermath was codes used by internet explorer had been released into public domain causing attack to be more of issue with security.
What was the target and aftermath of Operation Aurora?
M
e
n
u