Global surveillance by category

This is a category of disclosures related to global surveillance.

Court orders, memos and policy documents

 * Memorandum of understanding between the NSA and the Israel SIGINT National Unit (ISNU)
 * April 2013 FISC Order demanding that Verizon hand over all telephony metadata to NSA. The order had been initially granted in May 2006. In 2009 the FISC discovered that the government had made repeated and substantial misrepresentations to the court about its use, and had routinely been "running queries of the metadata using querying terms that did not meet the required standard for querying." It further concluded that the violations had been routine and systematic.
 * Legal Justification of the bulk telephony metadata collection (officially released)
 * 2009 NSA Procedures for Targeting Foreigners for Surveillance
 * 2009 NSA Procedures for Minimizing collection on US Persons
 * 2011 NSA Procedures for Minimizing collection on US Persons (officially released)
 * Reference to a 2011 Change in the court-approved Minimization Procedures allowing analysts to run search queries using US persons' identifiers if there is "effective" oversight by NSA (it is not publicly known if such oversight has been established, or if any such searches have been conducted). The court order mentioned was later officially released.
 * October 2011 Court decision finding NSA's upstream collection program, which collected tens of thousands of non-target communications, to have violated the law. It held, citing multiple Supreme Court precedents, that the Fourth Amendment applies to the contents of all communications, whatever the means (they are "papers"). It also finds that the NSA's minimization and targeting policies to be legally and/or constitutionally deficient, and recommends changes. (officially released).       Additional findings:
 * The collection of Upstream data had begun before a court order approving it, in violation of 50 USC § 1809(a), which makes it a crime to engage in, use or disseminate surveillance knowing, or having reason to know such surveillance was not authorized.
 * March 2009 FISC ruling showing a consistent pattern of misrepresentations of the bulk telephone metadata collection program by the government to the Court. It also held that the data was being routinely queried in ways that did not meet "reasonable articulatable suspicion", demonstrating inadequate safeguards in the software and training of analysts. Showing that "thousands of violations resulted from the use of identifiers that were not "RAS-approved by analysts who were not even aware that they were accessing BR metadata," and that in 2006 "there was no single person [in the NSA] who had a complete understanding of the BR FISA system architecture," a situation which persisted until February 2009 or later. RAS is shorthand for Reasonable Articulatable Suspicion. The Court nonetheless reapproved the collection of bulk phone metadata, while mandating additional safeguards and training, and "end-to-end system engineering reviews," and reports from the review. (Officially released by court order)
 * October 2012 Presidential Policy Directive 20 (PPD20), outlining cyberwarfare.
 * 2007 Michael Mukasey memo proposing broader powers.
 * April 2013 list of US Spying targets and topics by priority. The top priority countries are: Iran, Russia, China, Pakistan, North Korea and Afghanistan. Germany, France, the European Union, and Japan are mid-level priorities; Italy and Spain rank lower.
 * FY 2013 Intelligence "Black Budget" Summary.
 * A memorandum of understanding concerning US sharing of raw SIGINT with Israel. The data has not been scrubbed to eliminate US persons, it asks Israel not to deliberately target US persons, however the agreement allows Israel to retain US person data for one full year. The memorandum is not legally binding. A separate document states "And there are other kinds of CI threats that are right on our midst. For example, one of NSA's biggest threats is actually from friendly intelligence services, like Israel.", it continues "Balancing the SIGINT exchange between US and Israeli needs has been a constant challenge. In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came and went, and with NSA's only true Third Party CT relationship being driven almost entirely driven by the needs of the partner."
 * September 13, 2013 FISC Court order declassifying all the legal opinions relating to Section 215 of the Patriot Act written after May 2011 not already the subject of Freedom of Information Act litigation. The FISA Court ruled that the White House must identify the opinions in question by October 4, 2013.
 * 1,000 pages of documents were released by James R. Clapper Jr. on November 19, 2013, in response to lawsuits filed by the American Civil Liberties Union and the Electronic Frontier Foundation and a directive by U.S. President Barack  Obama. Among the documents are what appeared to be the original court document authorizing the National Security Agency to conduct sweeping collections of Americans' electronic communications records for counterterrorism purposes, the NSA's failure to abide by court-imposed rules to protect Americans' privacy, reports to Congress, training slides and regulations issued under President Obama.
 * December 16, 2013 ruling by US district court judge for the District of Columbia Richard Leon     declaring  that the mass collection of metadata of Americans' telephone records by the National Security Agency probably violates the fourth amendment prohibition unreasonable searches and seizures. Leon granted the request for a preliminary injunction that blocks the collection of phone data for two private plaintiffs (Larry Klayman, a conservative lawyer, and Charles Strange, father of a cryptologist killed in Afghanistan when his helicopter was shot down in 2011) and ordered the government to destroy any of their records that have been gathered. But the judge stayed action on his ruling pending a government appeal, recognizing in his 68-page opinion the "significant national security interests at stake in this case and the novelty of the constitutional issues."
 * 2013-12-27 ruling by U.S. District Judge William H. Pauley III in New York City holding the U.S. government's global telephone data-gathering system is needed to thwart potential terrorist attacks, and that it can only work if everyone's calls are swept in. In his opinion, he wrote, "a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data" and noted that a similar collection of data prior to 9/11 might have prevented the attack. U.S. District Judge William H. Pauley III also ruled that Congress legally set up the program and that it does not violate anyone's constitutional rights. The judge also concluded that the telephone data being swept up by NSA did not belong to telephone users, but to the telephone companies. And further he ruled that, when NSA obtains such data from the telephone companies, and then probes into it to find links between callers and potential terrorists, this further use of the data was not even a search under the Fourth Amendment. He also concluded that the controlling precedent is Smith v. Maryland: "Smith's bedrock holding is that an individual has no legitimate expectation of privacy in information provided to third parties," Judge Pauley wrote.

Reports

 * 2009 OIG report on STELLARWIND
 * Extracts from reports relating to XKeyscore. One entitled "Tales from the Land of Brothers Grimm" and others detailing the successes of said software, another is a note from an analyst who felt that he always had one foot in prison when using it. XKeyscore is also described as "big and scary, strong and powerful" and lets an analyst do whatever they like.
 * Reports detailing thousands of privacy violations
 * Numerous reports relating to drones, including "Threats to Unmanned Aerial Vehicles", a report summarizing attempts to shoot down, intercept, control or otherwise spoof drones. While the report details vulnerabilities of specific aircraft, the document itself has not been published, but only excerpts described. Other reports detail American spin efforts, suggesting that the phrases "drone strike," "kill list," "robot warfare," "Aerial Assassins" be avoided, offering "lethal UAV operations" instead, and also terms like "Pre-emptive and Preventive Military Action" and "Inherent Right of Self Defense." Likewise, reports detail efforts by Al-Qaeda to spin, portraying attacks as cowardly and immoral. Analysts also questioned whether America was losing rhetorical battle in courts, media, and public opinion. Another report stated that drone strikes "could be brought under increased scrutiny, perceived to be illegitimate, openly resisted or undermined."
 * The US learned that Pakistan engaged in a pattern of extrajudicial killings, mostly against militants. However, not all targets militants, Pakistan also planned to murder a human rights activist, Asma Jahangir, while she was on a visit to India. The plot was aborted when she learned of it. The US sought to avoid public disclosure of this, and other incidents.
 * The NSA and GCHQ have access to user data in iPhones, BlackBerrys, and Android phones. They are able to read almost all smartphone information, including SMS, location, emails, and notes.

The following table describes what is known about the below SIGINT Activity Designators (SIGADs). It is not presumed to be complete.

Note: SIGADs not otherwise designated are presumed to operate under the legal authority of Section 702 of the FISA Amendments Act (FAA)


 * Cyber Hit Counts: no explanation has been provided in the source material.
 * Directory ONMR: no explanation has been provided in the source material.
 * DNI: Digital Network Intelligence.
 * DNR: Dial Number Recognition.
 * MARINA: An NSA Database of Internet metadata.
 * Timing Advances: no explanation has been provided in the source material.
 * Transit Authority: A legal authority that states communications that transit the United States are collectible, provided that both endpoints are foreign.

Collection and analysis programs or hardware

 * Boundless Informant – Computer program that physically performs the data collection.
 * Dropmire – A program that specifically targets foreign embassies and diplomats
 * XKeyscore – A program which allows searching collected data in a variety of ways.
 * SHELLTRUMPET – A metadata program that targets international communications.
 * Unified Targeting Tool (UTT) – A graphical frontend for querying databases.
 * LOPERS – A software based system to spy on PSTNs
 * TURBULENCE – Includes cyber-warfare capabilities, such as targeting enemies with malware. (updates to existing knowledge)
 * JUGGERNAUT – A system to intercept mobile networks, including voice, fax, data, and text.
 * SPYDER
 * CHALKFUN
 * VLR – Visitor Location Register
 * TransX
 * RAGTIME – A blanket term for any of four different surveillance programs
 * Special Collection Service – Joint CIA/NSA eavesdropping team focused based in about 80 US embassies and consulates around the world. There are known branches in Frankfurt and Vienna. According to Der Spiegel, many of their operations are a direct violation of at least 3 signed treaties: "The Convention on the Privileges and Immunities of the United Nations of 1946, the Vienna Convention on Diplomatic Relations of 1961, and a signed an agreement in 1947 that rules out all undercover operations.
 * STATEROOM – Surveillance on embassies and consulates. Highly Classified.
 * BULLRUN, named after the Battle of Bull Run. – Bullrun refers to the NSA's set of codebreaking capabilities, including the use of Computer Network Exploitation (hacking) to obtain keys, weakening of encryption standards and providing backdoors to the same. The following codenames are known to be related to BULLRUN: APERIODIC, AMBULANT, AUNTIE, PAINTEDEAGLE, PAWLEYS, PITCHFORD, PENDLETON, PICARESQUE, and PIEDMONT. No further explanation of the above codenames has been provided to date.
 * Treasure Map, near real-time, interactive map of the global Internet. Collects Wi-Fi network and geolocation data, and the traffic of 30–50 million unique Internet addresses. It can reveal the location and owner of a computer, mobile device or router on a daily basis. NSA boasts that the program can map "any device, anywhere, all the time."

Relationships with corporate partners

 * Special Source Operations (SSO) – Is a division of the NSA responsible for all programs which collaborate with corporate entities.


 * Upstream collects data from fiber-optic cables and internet backbones.
 * Codenames of companies participating in Upstream: BLARNEY (a surveillance program which was established by the NSA with AT&T and which operates at or near key fiber-optic landing points in the U.S. to capture foreign communications coming in and out of the country), STORMBREW, FAIRVIEW (a highly classified program for tapping into the world's intercontinental fiber-optic cables according to NSA whistleblower Thomas Andrews Drake), and OAKSTAR. There are conflicting sources: some that call these "programs", versus the official statement called "The National Security Agency: Missions, Authorities, Oversight and Partnerships" that describes them as codenames of cooperating companies.  A third source, just released groups them with describes them as "programs authorized to collect cable transit traffic passing through US Gateways with both sides of the communication being foreign. The FY 2013 budget for the above programs is as follows:
 * BLARNEY – $65.96 million
 * FAIRVIEW – $94.06 million
 * STORMBREW – $46.06 million
 * OAKSTAR – $9.41 million
 * Miscellaneous codenames of companies: LITHIUM
 * RAMPART – Described as being part of Special Source operations, there is at least one known subdivision.
 * RAMPART-T – Started in 1991 or earlier, documents describe this program as: "Penetration of hard targets at or near leadership level". The information is intended for "the president and his national security advisers". Rampart-T is aimed at China, Russia, and Eastern European countries, there are around 20 nations targeted.
 * Microsoft allows the NSA to bypass encryption on Outlook.com.
 * Names and Codenames of companies assisting GCHQ:
 * Verizon Business (codenamed "Dacron")
 * British Telecommunications (codenamed "Remedy")
 * Vodafone Cable (codenamed "Gerontic")
 * Global Crossing (codenamed "Pinnage")
 * Level 3 (codenamed "Little")
 * Viatel (codenamed "Vitreous")
 * Interoute (codenamed "Streetcar")

NSA databases

 * PINWALE – Stores email and text
 * NUCLEON – Stores voice data
 * MAINWAY – Stores telephony metadata (i.e. call records)
 * MARINA – Stores Internet metadata
 * TRAFFICTHIEF – Stores metadata from a subset of assigned targets.
 * CLOUD/ABR
 * DISHFIRE
 * FASTSCOPE
 * SIGINT NAVIGATOR
 * TRACFIN – A database of financial information.
 * TUNINGFORK
 * OCTAVE – A database with a graphical frontend
 * ANCHORY – A database of completed SIGINT reports.
 * Nymrod – Apparently a database of names (appears in UTT Screenshot)

Signals intelligence directorates (SIDs)

 * PRINTAURA – According to Ambinder, "NSA Unit involved in data filtering for TRAFFICTHIEF"
 * Protocol Exploitation – Sorts data types into specific databases

Technical directorates

 * SCISSORS – This team sorts data types for analysis.

Names associated with specific targets

 * Apalatchee = The EU mission by the East River, in New York.
 * Magothy = The EU embassy in Washington, DC. This embassy had its internal videoconferencing, and other areas of the computer network tapped. Both by the US, and by the Chinese. The US effort was conducted by the team working for the BLARNEY program.
 * Wabash = French diplomatic office in Washington. This office was bugged.
 * Blackfoot = French diplomatic office in the UN in New York. This office was bugged and computer screen captures obtained.
 * KATEEL = Brazilian embassy in Washington.
 * POCOMOKE = Brazilian Permanent Mission to the UN in New York.

Uncategorized or insufficiently described codenames

 * CERF CALL MOSES1
 * CONVEYANCE – Provides filtering for PRISM
 * EVILOLIVE – Collects internet traffic and data.
 * FACELIFT
 * FALLOUT – Provides filtering for PRISM
 * LONGHAUL – Involved in the process of decrypting communications.
 * MATRIX
 * MOONLIGHTPATH
 * SPINNERET
 * STEELKNIGHT
 * CASPORT
 * DANCINGOASIS

GCHQ operations
The Government Communications Headquarters (GCHQ) is the main British intelligence agency responsible for providing signals intelligence (SIGINT) and information assurance to the British government and armed forces.
 * Tempora – Collects data from transatlantic fibre-optic cables of major telecommunications corporations by directly tapping on them and from Internet backbones. Tempora uses intercepts on the fibre-optic cables that make up the backbone of the internet to gain access to swaths of internet users' personal data. The intercepts are placed in the United Kingdom and overseas, with the knowledge of companies owning either the cables or landing stations. It is a GCHQ program to create a large-scale "Internet buffer" which stores Internet content for three days and metadata for up to 30 days. Its component programs are Mastering the Internet and Global Telecoms Exploitation.
 * Karma Police – Internet metadata collection program designed to profile the web browsing habits of 'every visible user on the Internet'.
 * Britain runs a large-scale intercept station in the Middle East, capable of tapping underwater fiber-optic cables and satellites, and extracting email, telephone, and web traffic. The information is then passed to the GCHQ and shared with the NSA. The operation costs around £1 billion and is still being assembled. It is part of the "Tempora" project. Edward Snowden disputes the Independent's claim that he, or anyone he has had direct contact with is the source of this information. Süddeutsche Zeitung's fiber optic revelations were also described as having been obtained from GC-Wiki by Snowden.
 * GCHQ is believed to have forced some six global telecommunications and Internet companies to allow them to access more than 14 fiber optic cables that transport telephone communications. The six companies, BT, Vodafone, Viatel, Interoute, Verizon and Level-3, gave GCHQ access to the cables in return for payment, it is believed the companies had no choice in this decision. Three of the cables' terminal stations are on German territory; two of the cables are partially owned by Deutsche Telekom, who have denied knowledge of or participation in GCHQ's activities.
 * Spying on the 2009 G20 Summit in London.
 * GC-Wiki – An internal wiki at GCHQ.
 * Access to the majority of Internet and telephone communications throughout Europe, and occasionally as far as the United States.
 * GCHQ has a team dedicated to cracking encrypted traffic on Hotmail, Google, Yahoo and Facebook.
 * The Belgian telecom company Belgacom reports that it had been hacked, and has filed criminal charges, and will be cooperating with the investigation into the hacking. According to documents released by Der Spiegel, the operation against Belgacom was entitled 'Operation Socialist' and was done by the GCHQ for the purpose of enabling Man-in-the-middle attacks against smartphones.
 * Edgehill, named after the Battle of Edgehill, is a program operated by GCHQ similar to the NSA's BULLRUN program.
 * Other programs operated jointly with the NSA include MUSCULAR, Dishfire, Stateroom and Optic Nerve (GCHQ).
 * Other programs include Squeaky Dolphin, WARRIOR PRIDE, and XKeyscore.
 * Organizational groups within GCHQ include the Human Science Operations Cell, the Joint Threat Research Intelligence Group, and the Joint Operations Cell.

NSA operations

 * Hacking Tsinghua University, and also Pacnet in China.
 * Spying on Latin America with the help of Global Crossing.
 * The NSA operates the global monitoring network Special Collection Service that collects from more than 80 embassies and consulates worldwide, often without the knowledge or consent of the host country.
 * The NSA spied on a UN videoconferencing system, in violation of the US agreement with the UN not to do so. In the process NSA discovered that the Chinese had already done so, and then started analyzing what the Chinese were taking. Shortly thereafter, the NSA gained access to approximately 500 other UN channels of communications.
 * Additional details of the raid on Osama bin Laden's Abbottabad, Pakistan compound. The work of Tailored Access Operations, in installing spyware on phones is highlighted. Also highlighted are the roles of the CIA, other agencies, and the Navy SEALs.
 * The NSA's Network Analysis Center cracked the reservation system for Aeroflot, and also hacked Al Jazeera, accessing specially protected material, according to a document dated in 2006.
 * The NSA hacked the French Foreign Ministry, and bugged the French diplomatic offices in Washington and New York in 2010.
 * The NSA conducted extensive spying on Enrique Peña Nieto, and his aides, accessing their emails. Likewise, the NSA spied on the communications of Dilma Rousseff, and her aides, and also created a two hop contact graph. The source document is dated June 2012, it is unclear whether the operation is ongoing.
 * The NSA and GCHQ target banks and credit card companies by various means including "Tailored Access Operations", specifically by targeting printer traffic from banks. VISA has also been targeted. According to a GCHQ document, the collection involves "bulk data" containing "rich personal information" that is mostly "not about our targets".
 * From collection points outside the United States, the NSA gathers contact lists belonging to users of e-mail and instant messaging services, including Yahoo, Hotmail, Facebook and Gmail.

NSA relationships with foreign intelligence services

 * Payments to GCHQ from NSA totaling at least £100 million
 * Relationships with Germany's BND, exchange of technology: (XKeyscore, and the German programs and bulk metadata (500 Million records in one month alone)).
 * The US directly spies on most of its allies, even those with intelligence sharing agreements, with only the Five Eyes being immune.

Encryption
In cryptography, encryption is the process of encoding information in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. According to Snowden's recommendations published by The Guardian Edward in September 2013, properly implemented strong crypto systems were among the few things which one can rely on. However, endpoint security is often too weak to prevent the NSA from finding ways around it.

Underground bunkers
In September 2013, it was reported by the press that a number of countries deemed by the US and its allies to be rogue states, such as Syria, Iran and North Korea, had successfully evaded U.S. government surveillance by constructing secret bunkers deep below the Earth's surface.

China's underground megaproject, the 816 Nuclear Military Plant in Chongqing (now declassified and opened to tourists), was reported to be "most worrying" for the U.S. Defense Intelligence Agency.

Libya evaded surveillance by building "hardened and buried" bunkers at least 40 feet below ground level.

Unrelated to Edward Snowden

 * In 2002, the NSA, in cooperation with the FBI, and in cooperation with Qwest, monitored nearly all communications in the Salt Lake area in the six months surrounding the Olympic games.
 * Since 2005, Canada has been running a bulk phone metadata, email and text message program.
 * The NYPD is engaging in mass surveillance, particularly of Muslims, in mosques, in social gatherings, and even at home. The department employs "rakers" to troll Muslim neighborhoods. The unit employing said rakers, was once called "The Demographics Unit," the name was changed in 2010 to the "Zone Assessment Unit" to mask the appearance, though not change the fact of racial profiling. Knowledge of this program was kept from the city council.
 * Devices made by the American company Blue Coat Systems, which are used for Internet surveillance and censorship, have turned up repeatedly in countries that censor and surveil the Internet, and have a record of human rights abuses, such as Iran, Syria, China, Burma (Myanmar) and Sudan.
 * The ACLU has released a report on the proliferation of license plate readers and on the retention of data from them.
 * The FBI has been pressuring ISPs to install surveillance software, referred to as the "harvesting program".
 * The FBI has been using malware and hacking to surveil suspects. Reports indicate however, that hacking and malware usage remains a last resort, and that warrants are sought for individual cases.
 * The NSA collects the contents of emails that transit from the US to abroad, and searches them for keywords.
 * The Post Office scans all mail cover (envelopes, outsides of packages and postcards) and enables retroactively tracking mail correspondence by its Mail Isolation Control and Tracking programme.
 * France's Equivalent of PRISM
 * India will be building a mass domestic surveillance program called the "Central Monitoring System", which will be able to track all voice, fax, and text across all telephone networks in the country. It will also contract the Israeli company Verint Systems to monitor encrypted Gmail, BlackBerry, Skype and Yahoo! mail.
 * More than 230 thousand people were questioned under the United Kingdom's Schedule 7 of the Terrorism act of 2000 between April 2009 and March 2012.
 * New Zealand passed a bill allowing domestic spying against its citizens and residents, by a narrow margin (61–59).
 * Russ Tice, on June 19 gave an interview to Boiling Frogs Post, in which he expanded his previous disclosures. Specifically he names persons who had been wiretapped by the NSA, namely: Hillary Clinton, Barack Obama, Dianne Feinstein, Colin Powell, Evan Bayh, Samuel Alito and many others including journalists and political groups. He asserts that all telephony content is collected.
 * Blueprints of the Utah Data Center
 * "The Find," the NSA can locate cellphones even when they were turned off.
 * The DEA's and IRS's use of NSA data to start criminal investigations against US citizens, and their method of "Parallel Construction" to conceal the true origins of their evidence.
 * CIA operative De Sousa, convicted in absentia in Italy in the extraordinary rendition case of Osama Mustapha Hassan Nasr AKA Abu Omar goes on camera describing the case.
 * Insider Threat Program – policy requiring federal employees to report "high-risk persons or behaviors" from among co-workers, as well as to punish those who fail to report such colleagues. In 2013, the NSA planned to investigate over 4000 cases.
 * The German Federal Office for Information Security has warned that Windows 8 has a built-in backdoor, that could allow Microsoft, and by extension the NSA to access many Windows 8 machines via the Trusted Platform Module that comes embedded on many Windows 8 machines. Of the subset of CIA applicants whose backgrounds raised flags, one fifth were found to have ties to either terrorism or foreign hostile intelligence.
 * The NSA has admitted about a dozen cases of willful violations by analysts over the last 10 years. One common form, in which an analyst spies on a love interest, has been dubbed "LOVEINT"
 * The Hemisphere Project, a secret partnership between federal and local drug officials and AT&T since September 2007. Law enforcement has access to electronic call detail records for any telephone carrier that uses an AT&T switch to process a telephone call. Records go back to 1987 and about 4 billion are added every day. Officials are instructed to obfuscate the existence of the program, by a method similar to "Parallel Construction" in which a separate subpoena is obtained for records which had already been returned by the Hemisphere project, thus disguising the true origin of the data.
 * Sweden is helping the GCHQ tap fiber-optic cables and has become, effectively, a member of the 'Five Eyes', according to Duncan Campbell in a hearing of the EU parliament's LIBE committee. He further states that the codename for the tapping operation is "Sardine" and is classified several levels above top secret, and that the information about Sweden was withheld from publication in the Guardian, The New York Times, and Pro Publica.
 * CIA, BND and the Federal Office for the Protection of the Constitution ran Projekt 6 (P6 for short) from 2005 to 2010. Its aim was to gather intelligence on suspected jihadists and terrorism supporters. An American query request for the internal database, code name PX contains the passport number, date of birth and name of German investigative journalist Peter Buchen.
 * The ACLU released a 69-page report on the FBI entitled "Unleashed and Unaccountable" detailing warrantless wiretapping, spying on political activists and journalists, biased training and racial profiling, proxy detentions in foreign countries, use of the no-fly list as a means of pressuring people to become informants, bulk data collection (eGuardian and bulk telephony metadata), dodging oversight and misleading the public.
 * The NSA purchases zero-day exploits from Vupen, as revealed in a FOIA request. In response, the CEO of Vupen suggested that a FOIA request also be made for Raytheon, Lockheed Martin and Northrop, because they also sell exploits.