Q.1
Squeaky Dolphin
A British effort to monitor YouTube video views, URLs "liked" on Facebook and Blogger visits
An NSA program to gather gigabytes of data about credit card purchases
Q.2
HappyFoot
An NSA effort to use Web cookies and data from phone apps to identify users' devices and physical location
An NSA technique to deploy malware by sending out emails that trick targets into clicking a malicious link
Q.3
Egotistical Goat – Egotistical Giraffe
NSA implants used to inject surveillance software in to Apple, Cisco, Dell and other devices
NSA efforts to track users of Tor anonymizing software
Q.4
VictoryDance
Program tested by the NSA to use drones to map "the Wi-Fi fingerprint of nearly every major town in Yemen"
An NSA effort to collect hundreds of millions of contact lists from email and instant messaging accounts
Q.5
SecondDate
NSA program to collect images from emails for facial recognition
An NSA attack designed for "mass exploitation" of traffic "passing through network choke points" as well as "surgical target selection"
Q.6
NoseySmurf – TrackerSmurf – DreamySmurf – ParanoidSmurf
NSA programs that get inside iPhones and Android devices, turning on microphones, tracking location and managing power
NSA efforts to geolocate people's SIM cards via Predator drones
Q.7
Royal Concierge
NSA network of command/control servers that can be used for "industrial scale exploitation"
GCHQ program to monitor hotel reservations for "governmental hard targets"
Q.8
Honey Traps
GCHQ effort to conduct covert Internet investigations, including sexual “honey-traps."
NSA and GCHQ programs to infiltrate the OPEC oil cartel
Q.9
Hacking Angela Merkel
Hacking Angela Merkel
Was "hacking Angela Merkel" not specific enough?
Q.10
Muscular
NSA/GCHQ joint program to intercept data from Yahoo and Google networks
An NSA operation targeting the Italian embassy in D.C.