Barton Gellman. „U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show”, The Washington Post , 2013. augusztus 30.. [2013. szeptember 7-i dátummal az eredetiből archiválva] (Hozzáférés: 2013. szeptember 7.) „Much more often, an implant is coded entirely in software by an NSA group called Tailored Access Operations (TAO). As its name suggests, TAO builds attack tools that are custom-fitted to their targets. The NSA unit’s software engineers would rather tap into networks than individual computers because there are usually many devices on each network. Tailored Access Operations has software templates to break into common brands and models of “routers, switches and firewalls from multiple product vendor lines,” according to one document describing its work.”
Barton Gellman. „U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show”, The Washington Post , 2013. augusztus 30.. [2013. szeptember 7-i dátummal az eredetiből archiválva] (Hozzáférés: 2013. szeptember 7.) „Much more often, an implant is coded entirely in software by an NSA group called Tailored Access Operations (TAO). As its name suggests, TAO builds attack tools that are custom-fitted to their targets. The NSA unit’s software engineers would rather tap into networks than individual computers because there are usually many devices on each network. Tailored Access Operations has software templates to break into common brands and models of “routers, switches and firewalls from multiple product vendor lines,” according to one document describing its work.”