What is NSA Tailored Access Operations?
The NSA's elite hacking unit (now called Computer Network Operations) that conducts targeted cyberattacks against specific high-value targets — implanting surveillance tools in routers, servers, and devices, and intercepting hardware shipments to install backdoors.
Also known as: TAO, NSA TAO, NSA Hacking Unit, Computer Network Operations
TAO is the NSA's offensive hacking team — the people who break into the computers, phones, and networks of specific targets when mass surveillance isn't enough.
What TAO Does
Remote Hacking
- Exploits zero-day vulnerabilities in operating systems, browsers, and applications
- Develops custom malware tailored to specific targets
- Maintains persistent access to compromised systems for years
Hardware Interdiction
One of TAO's most alarming capabilities (revealed by Snowden):
- Intercepting hardware shipments (routers, servers, networking equipment) in transit
- Installing surveillance implants in the hardware before it reaches the buyer
- Repackaging the equipment so the recipient never knows it was tampered with
- This was documented for Cisco routers and other networking equipment
ANT Catalog
Snowden documents revealed the ANT (Advanced Network Technology) catalog — an internal NSA shopping catalog of surveillance implants:
- DROPOUTJEEP: iPhone implant for complete device access
- HEADWATER: Backdoor for Huawei routers
- FEEDTROUGH: Persistent implant for Juniper Networks firewalls
- COTTONMOUTH: USB-based implant disguised as a normal USB plug
- RAGEMASTER: Implant that captures video signals from VGA cables
- Prices ranged from free to $250,000 per unit
Physical Operations
- "Close access" operations — operatives physically access targets' devices
- Embassy and facility implants
- Cooperation with CIA's Information Operations Center
Scale
At the time of the Snowden revelations:
- TAO had over 600 employees based at NSA headquarters in Fort Meade
- Additional personnel at regional facilities in Georgia, Texas, Colorado, and Hawaii
- Conducted tens of thousands of implant operations worldwide
Why It Matters
TAO demonstrates that the NSA isn't just passively collecting data flowing across the internet — it actively hacks into devices, intercepts hardware, and installs surveillance tools. If you're a target of TAO, no amount of encryption or software security can protect you if they've compromised your hardware before you received it.
Implications for Trust
The revelation that the NSA intercepted Cisco router shipments caused significant damage to US technology exports. Foreign governments and companies began questioning whether any American-made hardware could be trusted — a concern that persists today and has fueled the push for supply chain transparency and reproducible builds.
Related Terms
Backdoor
A hidden method of bypassing normal authentication or encryption in a computer system. Backdoors may be intentionally built in (for maintenance or surveillance) or secretly inserted by attackers. In privacy contexts, backdoors refer to deliberate weaknesses that allow authorities to access encrypted data.
PRISM
A classified NSA surveillance program revealed by Edward Snowden in 2013 that collects data directly from major tech companies including Google, Apple, Facebook, and Microsoft.
Supply Chain Attack
An attack that compromises a target by infiltrating a trusted supplier, vendor, or software dependency in their supply chain.
Vault 7
A series of documents published by WikiLeaks in 2017 revealing the CIA's extensive cyber weapons arsenal — including tools to hack iPhones, Android phones, smart TVs, Windows, macOS, Linux, and even connected cars.
XKEYSCORE
An NSA surveillance system that enables analysts to search and analyze global internet data including emails, browsing activity, and social media content in near real-time.
Zero-Day Exploit
An attack that exploits a previously unknown software vulnerability, giving defenders zero days to prepare a patch before it's used in the wild.
Have more questions?
Use our guided flow to get the right next privacy step for NSA Tailored Access Operations.
Open Guided Flow