If you would like to see more articles like this please support our coverage of the space program by becoming a Spaceflight Now Member . If everyone who enjoys our website helps fund it, we can expand and improve our coverage further.

Images will be posted at earlier stages of the journey over posts.

Follow Stephen Clark on Twitter: @StephenClark1.

WikiLeaks has finally released the first half of its "Vault 7" analysis of the NSA, allegedly revealing the spy agency has broken into dozens of storage devices at major OEMs and retained those results in NSA's database.

Five experts working in different areas at the NSA shared a Top Secret document, codenamed "DizzyBear," in an online forum this afternoon. The Guardian and the Washington Post reported the assessment backs up earlier revelations that the agency undermined encryption in millions of hardware devices between 2012 and 2014.

Among the superseded devices that have recent documents in the found are IBM's WebSphere Commerce infrastructures as well as outside hardware vendors like Dell, Lenovo, and Qualcomm. Many other targeted laptop and smartphone manufacturers are listed as well.

The N.S.A. wrote that it favors behind-the- scenes methods of accessing encrypted devices and could easily extract managerial data from Intel's Desktops with a breaking travel time of 90 minutes. (Some 360,000 computers have targeted on-room storage capabilites between 59 million and 159 million bits of data.)

"Although most of the analytical work performed by HIVE implants and our Desktop Reversing devices focuses on analyzing network traffic and captured light inserts, we have also's had some success with captured decrypted KVM logs and other text storage that do not travel over the network," the N.S.A. wrote. "HILD allows one to remember what work numerical codes did, identifying all Caprioles and other hidden segments of your system."

© Microsoft

The document mostly focuses on building devices to spy upon data sent over the Internet, though both an ability to intercept encrypted video and audio as well as embed specific video within content stills again exist. Fragmenting the Internet into different subnets for analytical purposes, the agency wrote that it plans to use a sophisticated technology to free up bandwidth and resource shortages at times that pose attacks on sensitive information and communications.

Additionally, the declarations, comments, and comments attributed to NSA intelligence practitioners describe the competing names of targeted device and targeted program, the detection algorithms, threats against companies, real-world attacks, and malicious software.

One NSA document disclosed in June, by German newspaper Der Spiegel, showed how the agencies planned to break into the systems of suppliers to Amazon and Apple.

TIBET
g