The Washington Post

Key players in Operation Buckshot Yankee

Editor’s note: the name of the Joint Task Force-Functional Component Command-Network Warfare was incorrect in earlier versions of this information box.

Buckshot Yankee: The key players


Malicious computer software that was discovered on the military’s classified computer network in October 2008. It arrived via USB thumb drives, looking for documents to steal.

Operation Buckshot Yankee

A U.S. intelligence and military effort to neutralize the Agent.btz malware within the government computer networks and to clean the networks.

Advance Networks Operations team (ANO)

NSA analysts who hunt for suspicious activity on government networks. They determined the Agent.btz malware was present in the classified network.

Tailored Access Operations (TAO)

NSA unit that identified new variants of the malware outside the government networks via electronic spying.

Cyber Command

A new military unit that brings together Joint Task Force-Global Network Operations, which carried out the bulk of Buckshot Yankee, and Joint Functional Component Command-Network Warfare, the military’s cyber-offense arm.

Networks infected by Agent.btz

Secret Internet Protocol Router Network: Used by the Defense and State departments to transmit secret-level material.

Joint Worldwide Intelligence Communication System: Carries top-secret information.



Success! Check your inbox for details. You might also like:

Please enter a valid email address

See all newsletters

Show Comments

Sign up for email updates from the "Confronting the Caliphate" series.

You have signed up for the "Confronting the Caliphate" series.

Thank you for signing up
You'll receive e-mail when new stories are published in this series.
Most Read



Success! Check your inbox for details.

See all newsletters

Your Three. Videos curated for you.
Play Videos
What can babies teach students?
Unconventional warfare with a side of ale
A veteran finds healing on a dog sled
Play Videos
A fighter pilot helmet with 360 degrees of sky
Is fencing the answer to brain health?
Scenes from Brazil's Carajás Railway
Play Videos
How a hacker group came to Washington
The woman behind the Nats’ presidents ‘Star Wars’ makeover
How hackers can control your car from miles away
Play Videos
Philadelphia's real signature sandwich
Full disclosure: 3 bedrooms, 2 baths, 1 ghoul
Europe's migrant crisis, explained

To keep reading, please enter your email address.

You’ll also receive from The Washington Post:
  • A free 6-week digital subscription
  • Our daily newsletter in your inbox

Please enter a valid email address

I have read and agree to the Terms of Service and Privacy Policy.

Please indicate agreement.

Thank you.

Check your inbox. We’ve sent an email explaining how to set up an account and activate your free digital subscription.