37 books
—
6 voters
Nsa Books
Showing 1-50 of 843

by (shelved 12 times as nsa)
avg rating 3.70 — 659,869 ratings — published 1998

by (shelved 10 times as nsa)
avg rating 4.07 — 14,982 ratings — published 2014

by (shelved 7 times as nsa)
avg rating 3.86 — 1,670 ratings — published 2008

by (shelved 5 times as nsa)
avg rating 3.94 — 40,092 ratings — published -411

by (shelved 5 times as nsa)
avg rating 3.90 — 1,310 ratings — published 1982

by (shelved 4 times as nsa)
avg rating 4.10 — 78 ratings — published 2022

by (shelved 4 times as nsa)
avg rating 4.01 — 54,973 ratings — published -430

by (shelved 4 times as nsa)
avg rating 3.91 — 1,797 ratings — published 2001

by (shelved 4 times as nsa)
avg rating 4.35 — 14,729 ratings — published 318

by (shelved 4 times as nsa)
avg rating 4.16 — 36,705 ratings — published 1985

by (shelved 4 times as nsa)
avg rating 3.94 — 313 ratings — published 2000

by (shelved 4 times as nsa)
avg rating 3.99 — 72,168 ratings — published 400

by (shelved 4 times as nsa)
avg rating 4.14 — 245 ratings — published 1998

by (shelved 4 times as nsa)
avg rating 4.02 — 232 ratings — published 2006

by (shelved 4 times as nsa)
avg rating 3.82 — 3,163 ratings — published 1986

by (shelved 4 times as nsa)
avg rating 4.14 — 11,790 ratings — published 1536

by (shelved 4 times as nsa)
avg rating 3.99 — 8,210 ratings — published 530

by (shelved 4 times as nsa)
avg rating 3.79 — 4,030 ratings — published 1996

by (shelved 4 times as nsa)
avg rating 3.94 — 13,528 ratings — published 426

by (shelved 3 times as nsa)
avg rating 4.30 — 56,960 ratings — published 2019

by (shelved 3 times as nsa)
avg rating 4.55 — 775 ratings — published 2007

by (shelved 3 times as nsa)
avg rating 3.95 — 1,967 ratings — published 2008

by (shelved 3 times as nsa)
avg rating 4.37 — 425 ratings — published 2008

by (shelved 3 times as nsa)
avg rating 3.83 — 1,166,242 ratings — published -700

by (shelved 3 times as nsa)
avg rating 3.44 — 39 ratings — published 2006

by (shelved 3 times as nsa)
avg rating 3.93 — 499,045 ratings — published -800

by (shelved 3 times as nsa)
avg rating 3.98 — 27,296 ratings — published 1940

by (shelved 3 times as nsa)
avg rating 3.97 — 221,793 ratings — published -400

by (shelved 3 times as nsa)
avg rating 4.20 — 5,371 ratings — published 1977

by (shelved 3 times as nsa)
avg rating 4.06 — 3,892 ratings — published 397

by (shelved 3 times as nsa)
avg rating 3.85 — 179,095 ratings — published 1667

by (shelved 3 times as nsa)
avg rating 4.19 — 1,496 ratings — published 1955

by (shelved 3 times as nsa)
avg rating 3.85 — 259 ratings — published 2007

by (shelved 3 times as nsa)
avg rating 4.22 — 14,223 ratings — published 2001

by (shelved 3 times as nsa)
avg rating 3.99 — 533 ratings — published -50

by (shelved 3 times as nsa)
avg rating 3.99 — 42,078 ratings — published 2006

by (shelved 3 times as nsa)
avg rating 4.34 — 2,678 ratings — published 1995

by (shelved 3 times as nsa)
avg rating 4.41 — 720 ratings — published 2000

by (shelved 3 times as nsa)
avg rating 4.13 — 764 ratings — published 2002

by (shelved 3 times as nsa)
avg rating 4.01 — 120,703 ratings — published 1859

by (shelved 3 times as nsa)
avg rating 3.84 — 19,838 ratings — published 1968

by (shelved 3 times as nsa)
avg rating 3.88 — 6,680 ratings — published -322

by (shelved 3 times as nsa)
avg rating 4.14 — 10,365 ratings — published 1974

by (shelved 3 times as nsa)
avg rating 4.08 — 260 ratings — published 2004

by (shelved 3 times as nsa)
avg rating 4.07 — 402 ratings — published 1993

“Like a black hole, NSA pulls in every signal that comes near, but no electron is ever allowed to escape.”
― The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America
― The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America

“Imagine yourself sitting at a computer, about to visit a website. You open a Web browser, type in a URL, and hit Enter. The URL is, in effect, a request, and this request goes out in search of its destination server. Somewhere in the midst of its travels, however, before your request gets to that server, it will have to pass through TURBULENCE, one of the NSA’s most powerful weapons.
Specifically, your request passes through a few black servers stacked on top of one another, together about the size of a four-shelf bookcase. These are installed in special rooms at major private telecommunications buildings throughout allied countries, as well as in US embassies and on US military bases, and contain two critical tools. The first, TURMOIL, handles “passive collection,” making a copy of the data coming through. The second, TURBINE, is in charge of “active collection”—that is, actively tampering with the users.
You can think of TURMOIL as a guard positioned at an invisible firewall through which Internet traffic must pass. Seeing your request, it checks its metadata for selectors, or criteria, that mark it as deserving of more scrutiny. Those selectors can be whatever the NSA chooses, whatever the NSA finds suspicious: a particular email address, credit card, or phone number; the geographic origin or destination of your Internet activity; or just certain keywords such as “anonymous Internet proxy” or “protest.”
If TURMOIL flags your traffic as suspicious, it tips it over to TURBINE, which diverts your request to the NSA’s servers. There, algorithms decide which of the agency’s exploits—malware programs—to use against you. This choice is based on the type of website you’re trying to visit as much as on your computer’s software and Internet connection. These chosen exploits are sent back to TURBINE (by programs of the QUANTUM suite, if you’re wondering), which injects them into the traffic channel and delivers them to you along with whatever website you requested. The end result: you get all the content you want, along with all the surveillance you don’t, and it all happens in less than 686 milliseconds. Completely unbeknownst to you.
Once the exploits are on your computer, the NSA can access not just your metadata, but your data as well. Your entire digital life now belongs to them.”
― Permanent Record
Specifically, your request passes through a few black servers stacked on top of one another, together about the size of a four-shelf bookcase. These are installed in special rooms at major private telecommunications buildings throughout allied countries, as well as in US embassies and on US military bases, and contain two critical tools. The first, TURMOIL, handles “passive collection,” making a copy of the data coming through. The second, TURBINE, is in charge of “active collection”—that is, actively tampering with the users.
You can think of TURMOIL as a guard positioned at an invisible firewall through which Internet traffic must pass. Seeing your request, it checks its metadata for selectors, or criteria, that mark it as deserving of more scrutiny. Those selectors can be whatever the NSA chooses, whatever the NSA finds suspicious: a particular email address, credit card, or phone number; the geographic origin or destination of your Internet activity; or just certain keywords such as “anonymous Internet proxy” or “protest.”
If TURMOIL flags your traffic as suspicious, it tips it over to TURBINE, which diverts your request to the NSA’s servers. There, algorithms decide which of the agency’s exploits—malware programs—to use against you. This choice is based on the type of website you’re trying to visit as much as on your computer’s software and Internet connection. These chosen exploits are sent back to TURBINE (by programs of the QUANTUM suite, if you’re wondering), which injects them into the traffic channel and delivers them to you along with whatever website you requested. The end result: you get all the content you want, along with all the surveillance you don’t, and it all happens in less than 686 milliseconds. Completely unbeknownst to you.
Once the exploits are on your computer, the NSA can access not just your metadata, but your data as well. Your entire digital life now belongs to them.”
― Permanent Record