Scanning your connection...
Back to Glossary
Surveillance

What is NSA Tailored Access Operations?

The NSA's elite hacking unit (now called Computer Network Operations) that conducts targeted cyberattacks against specific high-value targets — implanting surveillance tools in routers, servers, and devices, and intercepting hardware shipments to install backdoors.

Also known as: TAO, NSA TAO, NSA Hacking Unit, Computer Network Operations

TAO is the NSA's offensive hacking team — the people who break into the computers, phones, and networks of specific targets when mass surveillance isn't enough.

What TAO Does

Remote Hacking

  • Exploits zero-day vulnerabilities in operating systems, browsers, and applications
  • Develops custom malware tailored to specific targets
  • Maintains persistent access to compromised systems for years

Hardware Interdiction

One of TAO's most alarming capabilities (revealed by Snowden):

  • Intercepting hardware shipments (routers, servers, networking equipment) in transit
  • Installing surveillance implants in the hardware before it reaches the buyer
  • Repackaging the equipment so the recipient never knows it was tampered with
  • This was documented for Cisco routers and other networking equipment

ANT Catalog

Snowden documents revealed the ANT (Advanced Network Technology) catalog — an internal NSA shopping catalog of surveillance implants:

  • DROPOUTJEEP: iPhone implant for complete device access
  • HEADWATER: Backdoor for Huawei routers
  • FEEDTROUGH: Persistent implant for Juniper Networks firewalls
  • COTTONMOUTH: USB-based implant disguised as a normal USB plug
  • RAGEMASTER: Implant that captures video signals from VGA cables
  • Prices ranged from free to $250,000 per unit

Physical Operations

  • "Close access" operations — operatives physically access targets' devices
  • Embassy and facility implants
  • Cooperation with CIA's Information Operations Center

Scale

At the time of the Snowden revelations:

  • TAO had over 600 employees based at NSA headquarters in Fort Meade
  • Additional personnel at regional facilities in Georgia, Texas, Colorado, and Hawaii
  • Conducted tens of thousands of implant operations worldwide

Why It Matters

TAO demonstrates that the NSA isn't just passively collecting data flowing across the internet — it actively hacks into devices, intercepts hardware, and installs surveillance tools. If you're a target of TAO, no amount of encryption or software security can protect you if they've compromised your hardware before you received it.

Implications for Trust

The revelation that the NSA intercepted Cisco router shipments caused significant damage to US technology exports. Foreign governments and companies began questioning whether any American-made hardware could be trusted — a concern that persists today and has fueled the push for supply chain transparency and reproducible builds.

Related Terms

Have more questions?

Use our guided flow to get the right next privacy step for NSA Tailored Access Operations.

Open Guided Flow