Tailored Access Operations (Hungarian Wikipedia)

Analysis of information sources in references of the Wikipedia article "Tailored Access Operations" in Hungarian language version.

refsWebsite
Global rank Hungarian rank
634th place
1,935th place
34th place
167th place
712th place
1,527th place
3rd place
28th place
388th place
1,439th place
1st place
1st place
1,116th place
1,952nd place
14th place
47th place

archive.today

  • Barton Gellman. „U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show”, The Washington Post , 2013. augusztus 30.. [2013. szeptember 7-i dátummal az eredetiből archiválva] (Hozzáférés: 2013. szeptember 7.) „Much more often, an implant is coded entirely in software by an NSA group called Tailored Access Operations (TAO). As its name suggests, TAO builds attack tools that are custom-fitted to their targets. The NSA unit’s software engineers would rather tap into networks than individual computers because there are usually many devices on each network. Tailored Access Operations has software templates to break into common brands and models of “routers, switches and firewalls from multiple product vendor lines,” according to one document describing its work.” 

arstechnica.com

books.google.com

businessweek.com

foreignpolicy.com

usnews.com

washingtonpost.com

washingtonpost.com

articles.washingtonpost.com

  • Barton Gellman. „U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show”, The Washington Post , 2013. augusztus 30.. [2013. szeptember 7-i dátummal az eredetiből archiválva] (Hozzáférés: 2013. szeptember 7.) „Much more often, an implant is coded entirely in software by an NSA group called Tailored Access Operations (TAO). As its name suggests, TAO builds attack tools that are custom-fitted to their targets. The NSA unit’s software engineers would rather tap into networks than individual computers because there are usually many devices on each network. Tailored Access Operations has software templates to break into common brands and models of “routers, switches and firewalls from multiple product vendor lines,” according to one document describing its work.” 

web.archive.org