CIA
From SNCApedia, the shit nobody cares about encyclopedia
The Central Intelligence Agency (CIA) is the main security department of the United States. Its members are commonly referred to as glowies or glowniggers because they are bioluminescent and emit a green light if that matters. Unlike jannies, glowies have a greater scope in terms of who or what they deal with; in most cases, they take down pedophiles and other disturbing criminals. They're also all full of aryans btw.
I dont know what to put here so have a list of every single glownigger datamining operation:

Pre-Snowden Era (publicly known or later confirmed)
- ECHELON (1947–ongoing) – Global signals intelligence collection network (NSA + Five Eyes)
- ThinThread (2001) – Precursor to StellarWind, had built-in privacy protections but was canceled
- Trailblazer Project (2002–2005) – Failed $4B+ data mining replacement for ThinThread
- StellarWind (Oct 2001–2011) – Bush's illegal warrantless wiretapping & bulk metadata program (revealed by Thomas Tamm & Snowden)
- PRISM (2007–present) – Direct access to the databases of Google, Facebook, Apple, Microsoft, Yahoo, etc.
- MYSTIC + SOMALGET (2009–present) – Records 100% of phone calls of entire countries (e.g. Bahamas, Afghanistan, Mexico, Philippines, Kenya)
- DISHFIRE (2010–present) – Collects ~200 million SMS text messages per day worldwide
- XKeyscore (2008–present) – "Widest-reaching" NSA system, lets analysts search nearly everything a user does on the internet without authorization
- Bullrun / Edgehill – NSA program to deliberately weaken encryption standards (RSA, Dual_EC_DRBG, etc.)
- MUSCULAR (2010–2013) – Tapped the private fiber links between Google/Yahoo data centers overseas (UK GCHQ joint op)
Snowden-Revealed Major Programs (2013)
- Boundless Informant – NSA's internal "heat map" of how many records it collects per country
- GHOSTMACHINE – Cloud analytics platform
- Tempora (GCHQ) – Full-take buffering of transatlantic fiber cables for 30 days
- Upstream collection (FAIRVIEW, STORMBREW, BLARNEY, OAKSTAR) – Tapping internet backbone inside US
- CO-TRAVELER – Tracking 5+ billion location records per day via cell phones
- Optic Nerve (GCHQ) – Captured webcam images from 1.8 million Yahoo users (many nude)
- QUANTUM (QUANTUMINSERT, QUANTUMHAND, QUANTUMBOT, etc.) – Man-on-the-side attacks to redirect targets to FOXACID exploit servers
- TURMOIL – Passive sensors on backbone
- TURBINE – Active command & control for millions of implants
- EGOTISTICALGIRAFFE – Breaking Tor (compromised 2013)
- HappyFeet / RoadBait – Geolocating targets via phone apps
CIA Vault 7 Leaks (WikiLeaks, March 2017) – "the largest leak in CIA history"
- Weeping Angel (2014) – Samsung Smart TV implant (turns TV into listening device even when "off")
- HammerDrill – Implants Windows machines via infected CD/DVD
- Archimedes – Man-in-the-middle attack tool
- Athena/Hera – Windows implant family (Athena can survive OS reinstall)
- AfterMidnight / Assassin – Windows malware frameworks
- Pandemic – Turns Windows file servers into infection vectors for entire networks
- Grasshopper – Custom malware builder to evade antivirus
- Marble – Obfuscates code to hide CIA authorship
- HIVE / CherryBlossom – Compromises home/business routers & wireless access points
- Brutal Kangaroo – Air-gapped network jumping via USB
- Fight Club / RickyBobby – iPhone & Android implants
- Sonic Agitator – Makes phones vibrate to trigger hardware implants
- Bee Sting – Infects via USB sticks
- SnowyOwl / Gyrfalcon – Linux implants
- BothanSpy / Gyrfalcon – Steals SSH credentials on Windows/X11
- YarnBall – iOS implant that steals location even when off
- UMBRAGE – Library of foreign malware signatures to frame other countries (Russia, China, Iran, NK)
- DarkSeaSkies / NightSkies – Mac OS X and iPhone implants (NightSkies was on new iPhones from factory as early as 2008)
- DerStarke / Protego – Missile control system implant (yes, actual missile guidance systems)
- PocketPutty – Remote command execution on Windows
- Cannoli – UEFI persistence
Shadow Brokers Leaks (2016–2017) – Mostly NSA Equation Group tools
- EternalBlue, EternalRomance, EternalSynergy, EternalChampion – SMB exploits (used in WannaCry, NotPetya)
- DoublePulsar – Backdoor implant used with above
- Exploits for Cisco, Juniper, Fortinet, TopSec firewalls
- UNITEDRAKE – Modular Windows implant (used since ~2006)
- DanderSpritz – Post-exploitation framework (like Metasploit but NSA)
- FuzzBunch – Exploit framework (like Metasploit)
- EPICBANANA – Privilege escalation on Cisco PIX
- ETERNALSYNAPSE – Remote root on HP printers
- BANANAGLEE – Persistent storage of stolen data on target
- ZESTYLEAK – iPhone bootrom exploit
- EWOKFRENZY – VMware ESXi exploitation
Later Revelations & Confirmed Ongoing Programs
- WINDSTOP / MONKEYCALENDAR (2016–present) – Collects all SMS in certain countries
- Project 6 (NSA) / DarkMatter (UAE) – iPhone zero-click exploits sold to UAE
- Quantum SquID – Skype video/audio interception
- SPINALTAP – Linux kernel implants
- INCENSER – Implant on fiber-optic repeaters
- GINSU / KONGUR – Persistent implant for air-gapped systems via PCIe hardware cards
- Cottonmouth-I, -II, -III – USB & Firewire hardware implants (look like normal cables, exfiltrate over RF)
- NIGHTSTAND – Wireless exploit injection from up to 8 miles away
- SURLYSPAWN – Keystroke logger over RF
- RAGEMASTER – Retro-reflector on VGA cable (records screen via radar from outside building)
- LOUDAUTO – Microphone implant hidden in audio jack
- DROPOUTJEEP – iPhone implant (claimed 100% success rate in 2013 docs)
- TOTEGHOSTLY – Mobile phone implant over WiFi
- PHOTOANGLO (GCHQ/NSA) – iPhone location/data exfil
- ICREACH (2007–present) – Google-like search engine sharing 850 billion+ records with 23 US agencies + Five Eyes